Professional Documents
Culture Documents
A thesis presented to
Pagadian City
In Partial Fulfillment
By:
Chapter I
Introduction
Project Context
Security in the homes and office/corporate setting is a big concern for everyone these days, whether they are
away from home or at home. It is one of the most effective protection systems available. one of the most pressing
issues in today's fast-paced world, where humans cannot protect their personal belongings manually. Instead, they
develop a different solution that provides stronger, more dependable, and atomized protection. This is an age in
which everything is linked by a network, and Anyone can obtain information from anywhere on the planet. As a result,
the possibility of having one's information stolen is a serious concern. Due to these dangers, it is critical to have
some personal identification in order to access one's own information. In a 448 bits with several sub key arrays
produce a 4168 bytes on a role key expansion (Panda, 2017). Personal identity is becoming increasingly relevant in
today's world. We often see password and identification card techniques among mainstream personal identification
methods. However, passwords and identity cards are now easily hacked (Encarnacion et al., 2020b). These methods
are inaccurate since data can get lost (Encarnacion et al., 2020a; Salunke et al., 2019).
Certain cases are incredibly aggravating, such as when a person locks himself out of his house or office or
leaves his key inside or when a thief breaks the lock. People who use a manual door lock or keys are still troubled by
circumstances like this. While smart cards are used in some areas, there might be a case where someone loses or
holds the card. In another case, some people are responsible for locking up houses or offices and maintaining the
keys secure. However, there are occasions when the person in possession of the keys is unavailable or has gone
through an emergency procedure. This can trigger an unwelcome delay for those who need the key immediately.
These are the problems that people can encounter while using keys or smart cards. That's where our fingerprint-
based lock system comes in handy. Our design is exclusive. They are implemented to improve security by
eliminating the need for users to recall passwords or carry around keys or cards that are often misplaced. If a
person's fingerprint is approved in the system, he will not experience any delays when entering a room.
There are also some instances that many countries now employ both public and private video surveillance system as
a primary tool to monitor people’s movements and to prevent crime and terrorism, both indoor and outdoor setting.
Focusing on the private and indoor sector, the installation of video surveillance is highly recommended to improve
security in a room. But, having a bit obvious or noticeable surveillance camera, robbers can easily remove the
modules and memories of the Video Monitoring System, leaving them committing the robbery safely, and
unrecorded.
Our proposed system overcomes all the security problems in the existing system and provides high security
and efficiency. This is a perfect/optimal solution for saving/protecting one from the hassle of a stolen/lost key or an
unauthorized entry. The fingerprint and camera monitoring is a boon solution for these problems, which provides a
high level of recognition accuracy. The skin on our palms and soles exhibits a flow-like pattern of ridges called friction
ridges. The pattern of friction ridges on each finger is unique and immutable. This makes fingerprint a unique
identification for everyone. A fingerprint scanner scans the fingerprints of users and is used for ensuring
authentication.
Fingerprint scanning is a more accurate and cost-effective method, and duplication is virtually impossible. A
fingerprint recognition system can efficiently perform verification. In verification, the system compares an input
fingerprint to the enrolled fingerprint of a specific user to ensure if they are from the same finger. Now the security of
our home/office is literally in our hands or rather at our fingertips. Installing camera monitoring is highly
The main purpose of this study is to integrate the different concepts from Fingerprint Technology, GSM
technology, SD Module, RTC module, Ultrasonic sensor, Magnetic Sensor, Keypad, PIR sensor , Camera ,
Raspberry pi technology and the Arduino technology. This study was inspired by the knowledge of researchers in
the field of Computer Science. In the implementation of this knowledge, the researcher must meet the objectives of
this study which to embed the use of Fingerprint Reader and Arduino to control the locker.
This system aims to grant access to authorized personnel and deny access to unauthorized personnel by
using the Fingerprint sensor instead of padlocks. An unwanted person cannot easily hack this locker with the use of
This study aimed to Biometric Lock System with Motion Monitoring Capability that allowed user to control the
To be aware of the current issues and concerns regarding lock systems and monitoring
To develop a new locking system with algorithm innovations considering the current issues and concerns
and combine biometric technology, sensors, video cams and motion detector for access monitoring.
To test the efficiency and reliability of the developed locking system and its monitoring capability for better
It can also be used at organizations to ensure authorized access to highly secured places.
The system has SD card module to save all the data or attempt to open the locker system.
The system has its own admin to control the locker system
The systems have Real time module for the time and SD card module for the saving data.
The systems have Ultrasonic sensor is for the alarm they recognize the presence of any person at the door
if the system is activated and it will make sounds. The sensor module involves an ultrasonic transmitter,
receiver as well as a control circuit. It includes two circular eyes out of which one is utilized to transmit the
The system has magnetic sensor to determine when the locker is open and send us alert message to the
user
The system has security camera to capture any movement in front of the locker.
The system can send the video capture to the google drive and the admin can view the video.
The new user or member can enroll in the locker system because they need the fingerprint confirmation of
the admin.
The camera of the system is not for night vision during at night the video captured is clear
All movement or motion in front of the system will be detected by the PIR sensor and ultrasonic sensor.
The system cannot send alert messages to the user if it is shortage of power.
The system cannot send messages if the GSM module has no load balance.
Definition of Terms:
Algorithm – a procedure or set of rules to be followed in computation or other problem like solving operations
especially by a computer
Arduino – The Arduino is an open-source hardware microcontroller board based on the Arduino UNO R3 and
Alta Mega 2560
Buzzer – It is an electrical device, similar to a bell, that makes a buzzing noise and is used for signaling.
GSM module – It is a chip or circuit that will be used to establish communication between mobile devices.
Liquid Crystal Display – It is a flat panel display technology commonly used in and computer monitors it also
used in screens for mobile devices, such as laptops, tablets, and smartphones.
LED – In this study, this refers to a light-emitting diode (a semiconductor diode that glows when a voltage is applied)
Power Adapter– in this study, this refers to a device that will Plugin into a wall outlet and convert AC to a
single DC voltage.
Servo motor – It is an electrical device that can push or rotate an object with great precision.
SMS – Short Message Service and is the most widely used type of text messaging
Real Time Clock - RTC modules are simply TIME and DATE remembering systems which have battery setup which
SD Card Module - is a breakout board used for SD card processes such as reading and writing with a
microcontroller.
Raspberry Pi - is a series of small single-board computers developed in the United Kingdom by the Raspberry Pi
Encarnacion, P. C., Gerardo, B. D., & Hernandez, A. A. (2020a). Modified Round Function of SIMECK 32/64 Block
Cipher. International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE), ISSN:
2278-3091, May-June.
Encarnacion, P. C., Gerardo, B. D., & Hernandez, A. A. (2020b). Performance Analysis on Enhanced Round
Function of SIMECK Block Cipher. 2020 12th International Conference on Communication Software and
Panda, M. (2017). Performance analysis of encryption algorithms for security. International Conference on Signal
Processing, Communication, Power and Embedded System, SCOPES 2016 - Proceedings, 278–284.
https://doi.org/10.1109/SCOPES.2016.7955835
Salunke, R., Bansod, G., & Naidu, P. (2019). Design and Implementation of a Lightweight Encryption Scheme for
Wireless Sensor Nodes. In Advances in Intelligent Systems and Computing (Vol. 998). Springer International
Publishing. https://doi.org/10.1007/978-3-030-22868-2_41
Chapter II
There are many different studies in accordance with Scanning, Reading, and Access Controls. The
researcher chooses several of these topics that will give enough information and understanding regarding the study
on Biometric Lock System with Motion Monitoring Capability. These are the following.
1. Security
2. Arduino Technology
3. Rasp-pi Technology
4. Fingerprint
5. GSM
6. Face Recognition
7. Sensors
8. Door Access System
8.1. Fingerprint Based Door Access System using Arduino
offices. Security issues can be fixed using traditional locks but there is always possibility of someone opening the
lock even without breaking it with the use of duplicate key. Using these kinds of locks also create problem if we lose
keys and also we have to carry keys along with us always. Again, using patterns in the locks can increase security
but again it can be opened if somehow the passwords or patterns are known. So, leaving every system in this project
we will implement a system using biometrics. In case of biometrics, the pattern which will be used as key will be
unique. Here, to implement the project we will use fingerprint as the key. This Arduino project will make use of
different devices for the implementation of the security lock where there will be different features to increase the
security level.
Figure 1: Functional Block Diagram of the Fingerprint Based Door Access System using Arduino.
2.2. Title: “ A Biometric Solution for Door Locking System using Real time Embedded System and Arduino
as a Microcontroller”
The biometric fingerprint device is an excellent security solution. This paper proposes and implements a novel
framework for a cost-effective Fingerprint biometric technology. It explains how to detect a fingerprint with the R305,
Arduino Uno, and Ardiono (IDE). This technology comes at a very low price. This project is based on the Arduino
FOSS platform and uses low-cost off-the-shelf components (Free Open Source Software). As a result, the total
implementation cost is low and accessible to a wide range of people a regular citizen. The aim of this low-cost
system is to improve the security system and some recommendation such as the addition of cameras to take a
picture of a bad match outcome. The whole system can be fabricated as economic commercial hardware package.
Figure 2: Functional Block Diagram of the A Biometric Solution for Door Locking System using
2.3. Title: “Biometrics Authentication Technique for Intrusion Detection System using Fingerprint Recognition”
This research is about using fingerprint recognition as a biometric authentication technique for intrusion detection
systems. Biometrics is a branch of statistics that uses biological terminology to deal with data. It confirms his
individuality by examining his physical characteristics or behaviors (e.g., face, fingerprint, voice, signature, keystroke
rhythms). The systems keep track of the user's information and compare it every time the user is claimed. A biometric
device is a computer that uses biometric recognition algorithms to identify people. Sensing, feature extraction, and
matching modules make up a standard biometric framework. They divided biometric techniques into two categories:
Facial recognition, fingerprinting, hand geometry, retinal analysis, DNA, and measuring a person's physiological
features are examples of physiological-based techniques. A signature, primary stroke, speech, scent, sweat pores
analysis, and behavioral characteristics measurement are all examples of behavior-based strategies. The Iris
recognition is a biometric identification system that employs mathematical pattern-recognition techniques on video
images of an individual's irises, which have complex random patterns that are distinctive and visible from a distance.
Iris cameras analyze the random patterns seen within the iris of an eye from various distances to conduct recognition
Figure 3: Functional Block Diagram of the Biometrics Authentication Technique for Intrusion Detection System using
Fingerprint Recognition.
They implemented a fingerprint-based locker, a robust protection mechanism in various security domains, to replace
the conventional locking systems for bikes. In their prototype, a software module is used to store valid users'
information in a database, and hardware is given for interfacing. Visual Basics, Visual C, and Visual C++ were used
for programming. Visual Basic 6.0 Enterprise Edition was used to program this prototype. Twenty reference images
were stored in the database to test the prototype. The implementation went smoothly and allowed, and unauthorized
users were clearly distinguished on the microcontroller. For approved users, logic one is transferred, while for
2.5. Title: “Security System Based on Knock-Pattern Using Arduino and GSM Communication”
This system made up of devices like Arduino, GSM Module, Servo Motor, and the use of a ‘Secret Knocking
Pattern,’ which is known only to the user of that particular safe or any other possession or object that the device is
installed. The knocking pattern has to be executed only in a specific place for the lock to open and close. Also, that
place is known only to the user. The only way to change a secret pattern is to unlocking first through the secret
knock. This system completely eliminates the fear of replication as there is no key affected to be replicated. The
design is an attempt towards the cost-effective solution for safety. This can also integrated with technology like
be made. The Arduino Uno will manage and control all unit of this system that receives, processes and controls the
data from all the sensors. The GSM Module unit acts as an interface between Arduino and the user’s mobile and is
responsible for communication between them. The sensor detects the knocking pattern and generates pulses that
are read by the Arduino. According to the pattern received by the microcontroller, an alarm is triggered, and an SMS
is established to the mobile station through the GSM module and thus warns about the suspicious activity at home to
the owner. The Piezo sensor can be attached to any place, which can be kept as a secret.
Arduino Based Door Access Control produces security for homes, offices, shops, banks, etc., through a
security password that is providential for the user alone. Users have the freedom to set a new code for their locking
systems. The system will allow access to the person who knows the security password and not grant access to
unauthorized persons. This is an excellent solution for protecting one from the hassle of illegal entry. This project is
realized using an ATMega 328 board using the Arduino kit, which is the most popular microcontroller having six
Figure 6: Functional Block Diagram of the Arduino Base Door Access Control
2.7. Title: “Password Protected Locking System Using Arduino”
This project provides enough security to satisfy the user's needs. The user will be prompted to enter a
password to open the door. On a successful password entered, the door open for a specified amount of time,
enabling him/her to store or restore his/her valuables things. The user enters an invalid password. Then the
corresponding equivalent message will be displayed. This project, "Arduino-based password-protected locking
system," can be used to provide enough security like bank lockers, security doors.
2.8. Title: “Design And Implementation Of A Door Locking System Using Android App”
Bluetooth technology is a wireless standard for exchanging data over short or near distances from steady
and mobile devices and building a private area network. Invented by telecom vendor Ericsson in 1994, it was initially
conceived as a wireless alternative to RS-232 data cables. It connects to several devices, overcoming problems of
synchronization. Bluetooth technology is many products, such as tablets, media players, robotics systems, laptops,
and console gaming equipment, and some high definition wireless headsets, modems, and watches. The technology
is useful for transferring information or data between two or more devices that are near each other in low-bandwidth
situations.
2.9. Title: “Microcontroller Based Electronic Digital Lock with Security Notification”
The innovative home design application that allows the user to manage his/her home through the internet
was proposed — using a PC as a server, which increases the price and power consumption. Some need web page
hosting that incurs extra cost. The author concluded that the use of a PC requires a considerable value and can be
reduced by using a microcontroller. The concept behind this project is a door-latch opening using a password. A
microcontroller-based Digital Code Lock that serves the purpose of security was created. The system comprises a
push-button keypad connected to the 8-bit microcontroller ATmega328P. It allows the user to reset a password. The
lock will open if the password is correct, the present one. If the entered password is not matched, a buzzer will be
activated. In this design, the central part of this is a Finite State Machine (FSM). Based on the controller, a function of
the controller is to detect if a user has entered the four digits secret code. Now an FSM is basically a sequential
circuit that follows the user to define number states to control the number of inputs, and every state is a fixed entity
that can be inhabited. The AT89C52 microcontroller is the core mainly composed of the microcontroller, LED, digital
tubes, and relays. And the C programming language completes the functions of unlocking a password, prompt an
error, LED display and timing, and even achieving a task that when power is low, the lock can remember passwords.
The Atmega328 microcontroller was used as the main component in the research. Every part used is directly
or indirectly connected to a microcontroller. The codes for the display all unit, setting, and resetting of the password
are all stored in a microcontroller. The lock was designed such that if any wrong key is pressed in the process of
inputting the password, it resets automatically, thereby sending a signal to a security post, which will let the security
know that if an intruder is accessing the system. As compared to another microcontroller based on a digital lock, it is
easy, and it required less hardware. It doesn’t need an additional Analogue and Digital converter. Also, the distinctive
Figure 9: Functional Block Diagram of the Microcontroller Based Electronic Digital Lock
with Security Notification
This project uses an electromagnetic lock triggered to open or close using an electric signal from the
controller board. This project uses a controller board called Arduino. This board is simple to use and program
compared to other controller boards available in the open market. It is a open-source physical computing platform
based on a simple microcontroller. Arduino board takes inputs from various sensors or an array of sensors and
makes a respective digital signal. Arduino can quickly establish a link to a computer and controller using the
individual software. Arduino uses an Atmega microcontroller as its heart to perform various operations. In this
project, they established a link between the lock and the android phone using the phone's Bluetooth. The main
Arduino board contains a serial Bluetooth module connected to it. The android phone includes an application that is
openly available to anyone free of cost on the android play store. This application establishes a connection with the
Figure 10: Functional Block Diagram of Android based security system Using Arduino
The security alarm system for residential and other applications had been developed — the central
monitoring system for continuous indication of sensors. Transmitters were connected with sensors, and receivers
were associated with a monitoring system for essential communication. The display with central monitoring, the
message with respect to each transmitter connected with a particular sensor. A home security system with the
GSM/GPRD technology services to achieve control of door lock by short message service (SMS). ARDUINO is the
microcontroller that controls the whole driver unit. Keypad, GSM module Buzzer, is connected to the microcontroller.
ARDUINO board can be used as a tool to interchange information with a computer or other microcontrollers. GSM
system for sending the alert message to the mobile for three unsuccessful attempts of the password. At the present
time, door security is the most important, and so we designed and implemented a digital door lock system that works
in three different modules. The Keypad module is used for entering the 4-digit password. GSM module is the most
secure mode in which the owner has to enter the password through his mobile via text message to open or close the
lock.
Figure 11: Functional Block Diagram of GSM Based Door Lock System
This project provides knowledge of radio frequency identification (RFID) technology. Initially, RFID tags were
made to replace barcodes in different chains eventually. Their advantages are they can be read wirelessly and with
no line of sight, contain more data than barcodes, and are stronger. The paper described the recent technology,
including the frequency ranges used and the standards required. With the increase in the ubiquity of RFID tags,
however, privacy became uneasy. The paper outlines a probable attack that can go against privacy and also
describes the contradictory measures. The RFID technology did not stop at the thing-level tagging. Since the uses for
RFID tags are so extensive, there is a great interest in lowering the costs for the production of RFID tags. It turns out
The aim of this project is to make a smart surveillance system which can be monitored by owner remotely
through android application. As it is connected with the system with IOT, system will send the push notification to
android device when an intrusion is detected inside the room. It is required to develop and implement and affordable
low cost web-camera based surveillance system for remote security monitoring. Authorized user can access to their
monitoring system remotely via internet with the use a mobile phone and monitor the situation on application. This
entire work is done on raspberry pi with Raspbian operating system ported on it.
Figure 13: Functional Block Diagram of Smart Motion Detection System using Raspberry Pi
2.14. Title: “Smart Surveillance Monitoring System using Raspberry pi and pir sensor”
This paper deals with the design and implementation of Smart surveillance monitoring system using
Raspberry pi and PIR sensor for mobile devices. It increases the usage of mobile technology to provide essential
security to our homes and for other control applications. The proposed home security system captures information
and transmits it to the respective mail using the internet. Raspberry pi operates and controls motion detectors and
video cameras for remote sensing and surveillance, streams live video and records it for future playback. It can also
find the number of persons located with the help of the Infrared sensor. For example, when motion is detected, the
cameras automatically initiate recording and the Raspberry pi device alerts the owner of the possible intrusion having
a smart phone. Raspberry- Pi has two main components interacting with each other. we can able send it to the email
GAni (2017)
Arduino
Security: Door
Accesss Gallo (2015)
GAni (2017)
Gallo (2015)
Raspberry FingerPrint
GAni (2017) pi
2.2. Literature Mapping
Chapter III
Theoretical Background
The theoretical framework is the foundational theory that is used to provide a visual perspective to the
The "Arduino Uno" is an open-source hardware microcontroller board based on the ATmega328. It has a14
digital pins, of which 6 can be used as (Pulse Width Modulation) outputs), 6 analog inputs, and 16 MHz crystal
oscillator, a USB connection, and a power jack, and the ICSP header, and the reset button. It holds everything
needed to help the microcontroller; simply connected to a computer with a USB cable or to power it with an AC or DC
The "Arduino Uno" can be powered through the USB connections or with an external power supply. The power
External (the non-USB) power can happen either from an AC or DC adapter or battery. The adapter can attach by
plugging the 2.1mm center-positive plug into the board's power jack. Leads from the battery can be placed in the Gnd
The Arduino board can run on an external supply of 6 to 20 volts only. If supplied with less than 7 volts,
though, the 5 volts pin may supply less than five volts, and the Arduino board may be unstable. If employing more
than 12 volts, the voltage regulator may overheat and harm the Arduino board. The recommended span is 7 to 12
volts.
"VIN. The input voltage to the Arduino UNO board when it is using an external power source as against to 5
volts from the USB connections or other control power source. You can provide voltage through this pin, or
supplying voltage via the power jack, access it through this pin".
"5V. The regulated power supply is used to the power microcontroller and the other parts of the board. This
can come either from the VIN through an on-board regulator, or be provided by the USB or other regulated 5
volts supply".
"3V3. 3.3 volt supply cause by the on-board regulators. Maximum current draw is a 50 mA".
The 14 digital pins in the Arduino Uno it can be used as an input or output, using this pinMode(), digitalWrite(),
and digitalRead() functions. They operated at 5 volts. Each of the pins can provide or receive a maximum of 40 mA
and has internal pull-up resistors it is disconnected by default of 20-50 kOhms. In the addition some board pins have
specialized functions:
Serial: (0 RX) and (1 TX). It is used to received 0 (RX) and transmitted it to 1 (TX) TTL (Transistor-
Transistor Logic) serial data. The pins are attached to the corresponding pins of the ATmega8U2 USB to
PWM: The 3, 5, 6, 9, 10, and 11. Provided 8-bit PWM output with the analogWrite() functions.
The SIM900 GSM/GPRS shield is a GSM modem that can be used in a variety of IoT projects. You can use this
shield to do almost everything a regular cell phone can, including sending and receiving SMS text messages, making
and receiving phone calls, and connecting to the internet through GPRS, TCP/IP, and more! To top it off, the shield is
compatible with a quad-band GSM/GPRS network, which means we can be used almost anywhere in the world.
Make and receive voice calls using an external earphone & electret microphone
There are three LEDs on the SIM900 GSM/GPRS shield which indicates connectivity or power status.
PWR: This LED is connected to the shield’s power supply line. If this LED is on, the shield is receiving
power.
Status: This LED indicates SIM900’s working status. If this LED is on, the chip is in working mode.
Netlight: This LED indicates the status of your cellular network. It’ll blink at various rates to show what state
it’s in.
64ms on, 800ms off: The SIM900 chip is running but not registered to the cellular network yet.
64ms on, 3 seconds off: The SIM900 chip is registered to the cellular network & can send/receive voice and
SMS.
64ms on, 300ms off: The GPRS data connection you requested is active.
The SIM900 can be a relatively power-hungry device. The maximum current draw of the chip is around 2A
during transmission burst. It usually won’t pull that much, but may require around 216mA during phone calls
The operating voltage of SIM900 chip is from 3.4V to 4.4V. To keep supply voltage safe at 4.1V, the shield
comes with a high current, high accuracy, low-dropout voltage regulator MIC29302WU from Micrel –
The SIM900 GSM/GPRS shield uses UART protocol to communicate with an Arduino. The chip supports
The shield comes with two standard 3.5mm jacks. One for stereo earphone and other for mono microphone.
It allows you to use SIM900’s audio interface to make and receive voice calls and listen FM radio.
Earphone: You can connect earphones to this jack. Any ‘iPhone’ or ‘Android’ compatible earphones should
work.
Antenna is required to use the SIM900 for any kind of voice or data communications as well as some SIM
commands.
The shield has two interfaces for connecting antenna viz. a U.FL connector and a SMA connector. They are
The shield usually comes with a 3dBi GSM antenna and allows you to put the shield inside a metal case(as
The workings of the SIM card socket can take some getting used to. To unlock the latch, push the top part
of the assembly, and then lift it up. Place the SIM card into the bottom part of the socket. Then fold the arm
back into the body of the socket, and gently push it forward towards the LOCK position.
The SIM900 shield can be configured to keep time. So there is no need for any separate RTC. This will
An applied magnetic field operates a door/window contact magnetic reed switch. A white plastic molding
encases the reed switch and magnet. It's made to be recessed into the frame of a door or window.
3.4. “LCD”
Liquid crystal display is the abbreviation for liquid crystal display. It is a type of electronic display module that is used
in a wide range of circuits and devices such as cell phones, calculators, computers, television sets, and so on. Multi-
segment light-emitting diodes and seven segments are the most popular applications for these displays. The key
advantages of using this module are its low cost, ease of programming, animations, and the fact that there are no
restrictions on showing custom characters, unique and even animations, and so on.Pin1 (Ground/Source Pin): This is
a GND pin of display, used to connect the GND terminal of the microcontroller unit or power source.
Pin2 (VCC/Source Pin): This is the voltage supply pin of the display, used to connect the supply pin of the
power source.
Pin3 (V0/VEE/Control Pin): This pin regulates the difference of the display, used to connect a changeable
Pin4 (Register Select/Control Pin): This pin toggles among command or data register, used to connect a
microcontroller unit pin and obtains either 0 or 1(0 = data mode, and 1 = command mode).
Pin5 (Read/Write/Control Pin): This pin toggles the display among the read or writes operation, and it is
connected to a microcontroller unit pin to get either 0 or 1 (0 = Write Operation, and 1 = Read Operation).
Pin 6 (Enable/Control Pin): This pin should be held high to execute Read/Write process, and it is connected
Pins 7-14 (Data Pins): These pins are used to send data to the display. These pins are connected in two-
wire modes like 4-wire mode and 8-wire mode. In 4-wire mode, only four pins are connected to the
microcontroller unit like 0 to 3, whereas in 8-wire mode, 8-pins are connected to microcontroller unit like 0 to 7.
switch between registers. It is known as a command register when the register set is ‘0'. When the register set is ‘1', it
Command Register-The main function of the command register is to store the instructions of command
which are given to the display. So that predefined tasks can be performed such as clearing the display,
Data Register-The main function of the data register is to store the information which is to be exhibited on
the LCD screen. Here, the ASCII value of the character is the information which is to be exhibited on the
screen of LCD. Whenever we send the information to LCD, it transmits to the data register, and then the
process will be starting there. When register set =1, then the data register will be selected.
The MicroSD Card Module is a straightforward way to transfer data to and from a regular SD card. The pinout is
Arduino-compatible, but it can be used with other microcontrollers as well. It enables you to add data logging and
This module has an SPI interface that works with any SD card and uses a 5V or 3.3V power supply that works with
Data logger, audio, video, and graphics are just some of the applications for the SD module. This module can
Size:20x28mm
Interface: SPI
Compatible: MicroSD
3.6. “Finger Print Sensor”
Fingerprint Sensor (R305) -TTL UART is a TTL UART interface fingerprint sensor module. The user can save the
fingerprint data in the module and use it to identify the individual in 1:1 or 1: N mode. The fingerprint module can
Power DC : 3.6V-6.0V
FAR : <0.001%
FRR: <0.1%
Real-time clocks (RTC) are clock modules, as the name implies. The DS1307 real-time clock (RTC) IC has an I2C
interface and is an 8-pin unit. The DS1307 is a battery-backed clock/calendar with 56 bytes of SRAM. The
clock/calendar displays data in seconds, minutes, hours, days, dates, months, and years. Each month's end date is
Potable size
Ultrasonic sensor is an electronic device that measures the distance of a target object by emitting ultrasonic sound
waves, and converts the reflected sound into an electrical signal. Ultrasonic waves travel faster than the speed of
audible sound (i.e. the sound that humans can hear). Ultrasonic sensors have two main components: the transmitter
(which emits the sound using piezoelectric crystals) and the receiver (which encounters the sound after it has
travelled to and from the target). In order to calculate the distance between the sensor and the object, the sensor
measures the time it takes between the emission of the sound by the transmitter to its contact with the receiver.
Chapter III
Chapter V
Findings, Conclusions and Recommendations
5.1. Findings
5.2. Conclusions
5.3. Recommendations.
Malabika Sarma, Amlanjyoti Gogoi,Rahul Saikia, Dibya Jyoti Bora School of Computing Sciences -
Subhankar Chattoraj , Karan Vishwakarma ” A Biometric Solution for Door Locking System using Real time
Department of Electronics & Communication Engineering Techno India University,Salt Lake Main Campus,
EM /4 Salt Lake
2Department of Bio Technology Engineering Techno India University,Salt Lake Main Campus,EM /4 Salt Lake
Smita S. Mudholkar , Pradnya M. Shende , Milind V. Sarode “ BIOMETRICS AUTHENTICATION TECHNIQUE FOR
INTRUSION DETECTION SYSTEMS USING FINGERPRINT RECOGNITION” Department of Computer Science &
R.Sai Charan Reddy , P.Vamsi Krishna , M.Krishna Chaitanya ,M.Neeharika4 K Prabhakara Rao. “Security System
Based on Knock-Pattern Using Arduino and GSM Communication” . #1,2,3,4,5 Department of ECE, B V Raju
Password Protected Locking System Using Arduino. Sriharsha B S, Zabiullah, Vishnu S B and Sanju V
Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA)
“Smart Motion Detection System using Raspberry Pi” Priya B. Patel ,Viraj M. Choksi , Swapna Jadhav Gujar, M.B.
Potdar, PhD Bhaskaracharya Institute for Space Applications and Geo-informatics Gandhinagar-382007 Gujarat,
India.