phonelogo+234 8146561114 or +2347015391124

DESIGN AND CONSTRUCTION OF A PASSWORD-BASED DOOR LOCK

USER'S INSTRUCTIONS: The project work you are about to view is on ''design and construction of a password-based door lock'' . Please, sit back and study the below research material carefully. This project topic ''design and construction of a password-based door lock'' have complete 5(five) Chapters. The complete Project Material/writeup include: Abstract + Introduction + etc + Literature Review + methodology + etc + Conclusion + Recommendation + References/Bibliography.Our aim of providing this ''design and construction of a password-based door lock'' project research material is to reduce the stress of moving from one school library to another all in the name of searching for ''design and construction of a password-based door lock'' research materials. We are not encouraging any form of plagiarism. This service is legal because, all institutions permit their students to read previous projects, books, articles or papers while developing their own works.


TITLE PAGE

 

BY

---
--/H2013/01430
DEPARTMENT OF ----
SCHOOL OF ---
INSTITUTE OF ---



APPROVAL PAGE

This is to certify that the research work ''design and construction of a password-based door lock'' by ---, Reg. No. --/H2007/01430 submitted in partial fulfillment of the requirement award of a Higher National Diploma on --- has been approved.

By
---                                                     . ---
Supervisor                                                  Head of Department.
Signature……………….                           Signature……………….        

……………………………….
---
External Invigilator



DEDICATION
This project is dedicated to Almighty God for his protection, kindness, strength over my life throughout the period and also to my --- for his financial support and moral care towards me.Also to my mentor --- for her academic advice she often gives to me. May Almighty God shield them from the peril of this world and bless their entire endeavour Amen.



ACKNOWLEDGEMENT

The successful completion of this project work could not have been a reality without the encouragement of my --- and other people. My immensely appreciation goes to my humble and able supervisor mr. --- for his kindness in supervising this project.
My warmest gratitude goes to my parents for their moral, spiritual and financial support throughout my study in this institution.
My appreciation goes to some of my lecturers among whom are Mr. ---, and Dr. ---. I also recognize the support of some of the staff of --- among whom are: The General Manager, Deputy General manager, the internal Auditor Mr. --- and the ---. Finally, my appreciation goes to my elder sister ---, my lovely friends mercy ---, ---, --- and many others who were quite helpful.


PROJECT DESCRIPTION: This work ''design and construction of a password-based door lock'' research material is a complete and well researched project material strictly for academic purposes, which has been approved by different Lecturers from different higher institutions. We made Preliminary pages, Abstract and Chapter one of ''design and construction of a password-based door lock'' visible for everyone, then the complete material on ''design and construction of a password-based door lock'' is to be ordered for. Happy viewing!!!


ABSTRACT

Traditional lock systems using mechanical lock and key mechanism are being replaced by new advanced techniques of locking system. These techniques are an integration of mechanical and electronic devices and highly intelligent. One of the prominent features of these innovative lock systems is their simplicity and high efficiency.
Such an automatic lock system consists of electronic control assembly which controls the output load through a password. This output load can be a motor or a lamp or any other mechanical/electrical load.
Here we develop an electronic code lock system using microcontroller, which provides control to the actuating the load. It is a simple embedded system with input from the keyboard and the output being actuated accordingly.
This system demonstrates a password based door lock system wherein once the correct code or password is entered, the door is opened and the concerned person is allowed access to the secured area. Again if another person arrives it will ask to enter the password. If the password is wrong then door would remain closed, denying the access to the person.
TABLE OF CONTENT
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENT
CHAPTER ONE
1.0 INTRODUCTION

1.1 OBJECTIVE OF THE PROJECT
1.2 SIGNIFICANCE OF THE PROJECT
1.3 SCOPE OF THE PROJECT
1.4 STATEMENT OF PROBLEM
1.5 LIMITATION OF THE PROJECT
1.6 APPLICATION OF THE PROJECT
1.7 PROJECT ORGANISATION
CHAPTER TWO
2.0 LITERATURE REVIEW
2.1 REVIEW OF DOOR LOCKING
2.2 HISTORITICAL BACKGROUND OF THE PROJECT
CHAPTER THREE
3.0 CONSTRUCTION
3.1 BLOCK DIAGRAM
3.2 CIRCUIT DIAGRAM
3.3 SYSTEM OPERATION
3.4 CIRCUIT DESCRIPTION
3.5 DESCRIPTION OF COMPONENTS USED

CHAPTER FOUR
4.0 RESULT ANALYSIS
4.1 CONSTRUCTION PROCEDURE AND TESTING
4.2 CASING AND PACKAGING
4.3 ASSEMBLING OF SECTIONS
4.4 TESTING OF SYSTEM OPERATION
4.5 INSTALLATION OF THE COMPLETED DESIGN
4.6 COST ANALYSIS
CHAPTER FIVE
5.0 CONCLUSION
5.1 RECOMMENDATION
5.2 BIBLIOGRAPH

CHAPTER ONE
1.1                                                        INTRODUCTION
The security situation in many parts of the world today leaves much to be desired. In Nigeria particularly, the prevalence of armed robbers and other groups that constitute nuisance to the society has led to the loss of lives and properties worth millions of dollars. Many of the attacks that led to the loss have occurred in the homes or in guarded compounds and the attacks took place in spite of the existence of seemingly impregnable security gates that were designed to ward off intruders. The needs for electronically controlled gates that have superior security features to those operated manually thus exist and have been on the increase in recent times.
Many attempts have been made to design such gates with various types of security features. In the work by Shoewu and Baruwa a microprocessor was used to monitor two gates which sense the approach of a vehicle. The gates automatically open, wait for a specified time and then close. It is clear that the features of these gates do not provide adequate security since any vehicle can gain entry into the compound. A system that provides efficient gate access and an estate control to perform the job of the gate security guard is discussed in the work by Lau and Choo [4]. The main pitfall of this system is that it uses a telephone to identify visitors; the telephone can be used by anyone who approaches the gate. The development of a computer-controlled security gate system explained by Arulogun et al. allows privileged users to gain entry through a keyless door by using smart card authentication. It is true that smart cards can be stolen thus compromising the security of this system. An attacker only needs to acquire a valid smart card in order to gain entry through the door [6]. A low-cost private office access control system developed and discussed by Khan [7] permits a user with the correct password entered on a keypad to gain entry by controlling an electromagnetic door lock. The fact that passwords belonging to one individual can be learned by another without the owner’s permission is a major drawback of the system: the rogue can use the stolen password to gain entry into the system. Radio frequency identification (RFID) has been used in conjunction with microcontrollers to control gates to enable vehicles to pass through [8, 9]. Olatinwo and Shoewu [10] have described a system in which swing gates are controlled electronically using microcontrollers and infrared transmitters. This system is only required to close and open gates and has a very limited security feature. In the work done by Adewuyi et al. [11, 12] surveillance cameras are used to capture and recapture the face of the driver as well as vehicle plate numbers. These data are stored in a databank for future comparison with visitors who will only be able to gain entry into a compound through gates if the data match. The system has the disadvantage that users must have been properly documented to enable them pass through the gate.
The system that has been designed in this work uses microcontrollers and radio-frequency transmitter/receiver pair as major components. A microcontroller is programmed to decode a given sequence of keys that is entered on a keypad; the microcontroller commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. Some advantages of the system over those described in [5], [6] and [7] include:
(i) It does not need close contact to control the gate; the control can be done from inside the car at a distance.
(ii) It operates as a stand-alone system and does not require a network provider for reception of signals.
(iii) The use of a keypad to generate the code necessary for the opening and closing of the gate enhances the security of the system since it requires very many trials by an intruder to succeed in breaking into the system.
(iv)The features of the system that are controlled by the firmware resident in the memory of the microcontrollers can be easily improved for future upgrade.

1.2                                             OBJECTIVE OF THE PROJECT

The main objective of this project is to develop an embedded system, which is used to verify and authenticate the authorized and person enter the room. This code is entered from a handheld unit. The security of the system is enhanced since the code is not easy to break and is only known to the operator.

1.3                                               SIGNIFICANCE OF THE PROJECT

  • This project provides security
  • Power consumption is less
  • Used commonly available components
  •  Project is simple and easy

1.4                                              APPLICATIONS OF  THE PROJECT

This simple circuit can be used at residential places to ensure better safety.

  • It can be used at organizations to ensure authorized access to highly secured places.
  • With a slight modification this Project can be used to control the switching of loads through password.
1.5                                                                          SCOPE OF THE PROJECT

The main component in the circuit is the controller. In this project 4×3 keypad is used to enter the password. The password which is entered is compared with the predefined password.
If the entered password is correct then the system opens the door by rotating door motor and displays the status of door on LCD. If the password is wrong then door is remain closed and displays “pwd is wrong” on LCD.

1.6                                                                   LIMITATIONS OF THE PROJECT
It is a low range circuit, i.e. it is not possible to operate the circuit remotely.
  • If you forget the password it is not possible to open the door.

1.7                                               PURPOSE OF THE SYSTEM
The purpose of the system is to provide a user friendly security system for organizations and homes. This system is password based and allows only authorized person to access it with a password. It also has the provision of changing the password.

1.8                                        PROJECT WORK ORGANISATION

The various stages involved in the development of this project have been properly put into five chapters to enhance comprehensive and concise reading. In this project thesis, the project is organized sequentially as follows:
Chapter one of this work is on the introduction to password based automatic door access control system. In this chapter, the background, significance, objective limitation and problem of password based security system were discussed.
Chapter two is on literature review of password based security system. In this chapter, all the literature pertaining to this work was reviewed.
Chapter three is on design methodology. In this chapter all the method involved during the design and construction were discussed.
Chapter four is on testing analysis. All testing that result accurate functionality was analyzed.
Chapter five is on conclusion, recommendation and references.

CHAPTER FIVE
5.1                                                           CONCLUSION

An electronically controlled automated door opener using password has been successfully designed and built in this work.
In this paper, design of an access control system for use in University is presented. The system uses keypad to differentiate between valid and invalid users.
The system accomplishes the security and access control task by processing information from sub-controllers. These controllers include entrance monitoring controller, exit monitoring controller and mess monitoring controller installed at entrance gate, exit gate and mess gate respectively.

 

5.2                                                    RECOMMENDATION
This project is designed to be used in homes and industries and wherever there is need for high security. And should be used and maintain by a qualified personnel.

 


CHAPTER TWO: The chapter one of this work has been displayed above. The complete chapter two of ''design and construction of a password-based door lock'' is also available. Order full work to download. Chapter two of ''design and construction of a password-based door lock'' consists of the literature review. In this chapter all the related work on ''design and construction of a password-based door lock'' was reviewed.

CHAPTER THREE: The complete chapter three of ''design and construction of a password-based door lock'' is available. Order full work to download. Chapter three of ''design and construction of a password-based door lock'' detector consists of the methodology. In this chapter all the method used in carrying out this work was discussed.

CHAPTER FOUR: The complete chapter four of ''design and construction of a password-based door lock'' is available. Order full work to download. Chapter four of ''design and construction of a password-based door lock'' detector consists of all the test conducted during the work and the result gotten after the whole work

CHAPTER FIVE: The complete chapter five of ''design and construction of a password-based door lock'' is available. Order full work to download. Chapter five of ''design and construction of a password-based door lock'' detector consist of conclusion, recommendation and references.

CLICK HERE FOR MORE RELATED TOPICS/MATERIAL


To "DOWNLOAD" the complete material on this particular topic above click "HERE"

Do you want our Bank Accounts? please click HERE

To view other related topics click HERE

To "SUMMIT" new topic(s), develop a new topic OR you did not see your topic on our site but want to confirm the availiability of your topic click HERE

Do you want us to research your new topic? if yes, click "HERE"

Do you have any question concerning our post/services? click HERE for answers to your questions


For more information contact us through any of the following means:

Mobile No phonelogo:+2348146561114 or +2347015391124 [Mr. Innocent]

Email address emailus:engr4project@gmail.com

Watsapp No whatsapp.html :+2348146561114


COUNTRIES THAT FOUND OUR SERVICES USEFUL

Australia, Botswana, Canada, Europe, Ghana, Ireland, India, Kenya, Liberia, Malaysia, Namibia, New Zealand, Nigeria, Pakistan, Philippines, Singapore, Sierra Leone, South Africa, Uganda, United States, United Kindom, Zambia, Zimbabwe, etc
Support: +234 8146561114 or +2347015391124

Watsapp Nowhatsapp.html
:+2348146561114


E
mail Address emailus:engr4project@gmail.com


FOLLOW / VISIT US VIA:

tweeter instagram.htmlfacebook logomyyoutubelogo.html