USER'S INSTRUCTIONS: The project work you are about to view is on "design and construction of an rfid and password based automatic door access control system". Please, sit back and study the below research material carefully. This project topic (design and construction of an rfid and password based automatic door access control system) have complete 5(five) Chapters. The complete Project Material/writeup include: Abstract + Introduction + etc + Literature Review + methodology + etc + Conclusion + Recommendation + References/Bibliography.Our aim of providing this "design and construction of an rfid and password based automatic door access control system" project research material is to reduce the stress of moving from one school library to another all in the name of searching for "design and construction of an rfid and password based automatic door access control system" research materials. We are not encouraging any form of plagiarism. This service is legal because, all institutions permit their s[tudents to read previous projects, books, articles or papers while developing their own works.
TITLE PAGE
DESIGN AND CONSTRUCTION OF AN RFID AND PASSWORD BASED AUTOMATIC DOOR ACCESS CONTROL SYSTEM
BY
---
--/H2013/01430
DEPARTMENT OF ----
SCHOOL OF ---
INSTITUTE OF ---
DECEMBER,2018
APPROVAL PAGE
This is to certify that the research work, "design and construction of an rfid and password based automatic door access control system" by ---, Reg. No. --/H2007/01430 submitted in partial fulfillment of the requirement award of a Higher National Diploma on --- has been approved.
By
--- . ---
Supervisor Head of Department.
Signature………………. Signature……………….
……………………………….
---
External Invigilator
DEDICATION
This project is dedicated to Almighty God for his protection, kindness, strength over my life throughout the period and also to my --- for his financial support and moral care towards me.Also to my mentor --- for her academic advice she often gives to me. May Almighty God shield them from the peril of this world and bless their entire endeavour Amen.
ACKNOWLEDGEMENT
The successful completion of this project work could not have been a reality without the encouragement of my --- and other people. My immensely appreciation goes to my humble and able supervisor mr. --- for his kindness in supervising this project.
My warmest gratitude goes to my parents for their moral, spiritual and financial support throughout my study in this institution.
My appreciation goes to some of my lecturers among whom are Mr. ---, and Dr. ---. I also recognize the support of some of the staff of --- among whom are: The General Manager, Deputy General manager, the internal Auditor Mr. --- and the ---. Finally, my appreciation goes to my elder sister ---, my lovely friends mercy ---, ---, --- and many others who were quite helpful.
PROJECT DESCRIPTION: This work "design and construction of an rfid and password based automatic door access control system" research material is a complete and well researched project material strictly for academic purposes, which has been approved by different Lecturers from different higher institutions. We made Preliminary pages, Abstract and Chapter one of "design and construction of an rfid and password based automatic door access control system" visible for everyone, then the complete material on "design and construction of an rfid and password based automatic door access control system" is to be ordered for. Happy viewing!!!
Security system solutions for strategic facilities are critical to prevent the intrusion of unauthorized persons, however there are many types of automatic access control systems which are expensive and complicated to use. This paper focuses on the development of a simple security system that combines Radio Frequency Identification and password to provide a low cost and formidable access control for entrances. The system is built on ATMEGA8 Microcontroller that directs the RFID reader to scan and authenticate users’ identification tag and further request for password through a keypad before activating a motor to grant access. The Microcontroller which also controls a liquid crystal display was programmed using Microbasic language; the data of identification tags and password were stored in its database. The RFID reader was able to scan tags within 25cm range in two seconds, and open a prototype door within 3 seconds of entering the correct password. The motor closes the door after a preset 5 seconds delay. The system was implemented for 12 users, the components used are cheap and available; the system is formidable and reliable.
TABLE OF CONTENTS
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWELDGEMENT
ABSTRACT
TABLE OF CONTENT
CHAPTER ONE
- INTRODUCTION
- PROBLEM STATEMENT
- AIM OF THE PROJECT
- OBJECTIVE OF THE PROJECT
- SIGNIFICANCE OF THE PROJECT
- PURPOSE OF THE PROJECT
- LIMITATION OF THE PROJECT
- APPLICATION OF THE PROJECT
- PROJECT ORGANISATION
CHAPTER TWO
LITERATURE REVIEW
2.0 LITERATURE REVIEW
2.1 REVIEW OF THE STUDY
2.2 OVERVIEW OF RFID
2.3 REVIEW OF RELATED
CHAPTER THREE
3.0 METHODOLOGY
3.1 INTRODUCTION
3.2 BLOCK DIAGRAM OF THE SYSTEM
3.3 SYSTEM HARDWARE DESCRIPTION
3.4 CIRCUIT DESCRIPTION
CHAPTER FOUR
4.0 RESULT AND DISCUSSION
CHAPTER FIVE
- CONCLUSIONS
- RECOMMENDATION
- REFERENCES
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE PROJECT
Security systems are very important in the protection of lives, premises and valuable resources. There are many advanced methods of providing security that have been developed and are in use in the last few decades, one important area is the security system required for strategic applications such as military bases, research centers, laboratories and other critical facilities. Such advanced security systems are complex and expensive making them implementable in high end applications only. However, with recent progress in technology and the growing need for increased security in civilian and other applications, many low cost solutions for security system have emerged with a range of degrees of sophistication, complexity and cost (Gill, Yang, Yao, and Lu, 2009).
Different access control automation techniques are available to reduce the system complexity and lower costs, these systems do not incorporate complex and expensive components. A home gateway is implemented to facilitate the interoperability between heterogeneous networks and provide a consistent interface, regardless of the accessing device (Udaya, Murty and Kurmar, 2013).
There is a wide range of Automatic Identification (Auto-ID) systems for access control in use, these includes magnetic stripes, Optical Character Recognition (OCR), barcodes, biometrics, smart cards and Radio Frequency Identification (RFID). However, each of these technologies has their advantages and drawbacks. The OCR systems allow the use of manual and auto-identification simultaneously but the very high cost of the readers prevented its widespread use (Finkenzeller, 2003)
The use of barcodes is a cost-effective way for managing inventory, they have some disadvantages such as limited information-storing capacity; a strict line of sight requirement between the scanner and the barcode, which effectively prevents multiple barcodes to be processed simultaneously; limited data redundancy and error correction; and a lack of inbuilt data-security standards. The use of biometrics, such as fingerprinting, retina scans, iris scans, and voice recognition are strong identification solutions in automatic access control but these technologies are expensive and privacy invasive (Sweeney and Patrick, 2005).
Smart card and its derivatives such as memory card or microprocessor card solutions use standard credit-card sized plastic cards with an integral data storage system designed to make financial transactions secure and fast, but a with high cost of maintaining the reader (Goodrum, McLaren and Durfee, 2006). RFID tries to overcome the disadvantages of previous systems by improving the speed and accuracy of data collection and dissemination as well as reducing the overall cost. RFID systems rely on Radio Frequency to transmit a tag-specific unique serial number to a reader or interrogator (Amit and Berghel, 2011).
A RFID system is composed of three basic units, a transponder unit or tag with a unique identifier that facilitates auto-identification of any object to which the tag is attached, a reader unit or interrogator that manages the radio frequency communication with the tag and a middleware or reader interface layer, which is essentially a software that acts as an interface between the basic RFID hardware components, and the software application (Shoewu and Badejo, 2006).
There currently is not a definite industry standard for frequency, but the most common applications around the world use frequencies of 125 KHz and 13.56 MHz. There are three classes of the RFID tags; Active tags, Passive tags and Semi-Passive (Battery –Assisted Passive) tags. The Active tag has its own battery that is used to broadcast signals over great distances; it is usually bigger in size and capable of carrying more information. The Passive tag has no inbuilt power source, the signal from the RFID reader creates an electromagnetic field that powers the tag, and it is cheaper than the active tag. The Semi-Passive tag or Battery Assisted Passive tag (BAP) is equipped with an onboard battery that drives the chip’s circuitry but power for communication of the signal is derived from the reader’s electromagnetic field as in the case of passive tags (Gyanendra and Pawan, 2010).
The password identification system requires the user to enter a password (a set of numeric or alphanumeric characters) on a keypad which then grants access to the user if it matches the required characters residing on a database (Kyuhee and Mokdong, 2006).
The RFID system has its vulnerabilities such as card skimming and tag killing, other security issues are card spoofing, tag cloning and malwares (Amit and Berghel, 2011). This gave rise to the need for a simple and affordable system that will utilize the advantages of the RFID and also overcome its drawbacks; leading to the use of password identification in addition to the RFID for access control, this is the aim of this study.
1.2 PROBLEM STATEMENT
The need for having a constant home protection has always been there. But in the recent times, considering a dramatic rise in petty crimes like robbery and theft, the need has been more strongly felt to have a fool proof protection of the belongings and the family members. Home security has come a long way in the last few decades. It was in the hands of a guard who manually provided surveillance during nights in the earlier days, but it was not fool proof as it was only normal for him to have momentary lapse of concentration. This device brought solution to this need. It ensures adequate protection against intruders.
1.3 AIM OF THE PROJECT
The main aim of this project is to create a comfort in the minds of house owners when they out from their premises without much fear of intruder.
1.4 OBJECTIVE OF THE PROJECT
The main objective of the proposed system is to construct a secure access control system to control the entry of various items through a door or a passage using RFID and biometric technology.
1.5 SIGNIFICANCE OF THE PROJECT
This device functions as an electronics watch dog. This device functions as a major security device used in residential, commercial, industrial, and military properties for protection against burglary (theft) or property damage, as well as personal protection against intruders.
1.6 PURPOSE OF THE PROJECT
This project proposes the development of security system for form houses and residential houses.
1.7 APPLICATION OF THE PROJECT
This device can be used are as follows:
- Home Security Systems.
- Prisons Security.
- Vehicle Security.
- Broadband alarm monitoring.
- Glass Break.
- Property Theft Alarm
1.7 LIMITATION OF THE PROJECT
- The given alarm system determines the presence of the intruder only, and does not determine how many persons are in there actually.
- The alarm activates only when the person cuts through the line of the PIR sensor
1.8 SIGNIFICANCE OF THE PROJECT
- The given system is handy and portable, and thus can be easily carried from one place to another.
- The circuitry is not that complicated and thus can be easily troubleshooted.
- The given system sets off a powerful buzzer, and it is effective as any other alarm system available in the market.
1.9 PROJECT MOTIVATION
Since innovation is so cutting-edge, one of a kind access control frameworks have turned out essential to win security dangers to different associations. Access control framework confines access to a property, a structure, or a space to approved people. In the field of data and protection security, door access control frameworks are assuming major indispensable jobs to shield associations. This is where everything is related with the framework, where anyone can get hold of information from wherever around the world. In this manner, hacking of one’s data is a noteworthy issue. On account of these perils, it is basic to have a type of individual recognizable proof (ID) to get to one’s own specific data. Security get to framework is exceptionally helpful to use at home, office and business structures. Every one of these years, different frameworks are acquainted with track the individual’s development. Among standard individual ID systems, secret key and ID card strategies are the most watched techniques. Be that as it may, it isn’t hard to hack password now and recognizable ID cards may get lost, henceforth making these strategies very sketchy. With the upgrade in the innovation, Framework Security is getting to be thought of significant worry in different associations and consequently advanced locks have turned into a significant piece of these security frameworks. There are numerous sorts of security frameworks that are accessible for security of our place. The main objective of this project was to ensure a proper security to building against theft or intruder.
1.10 PROJECT WORK ORGANISATION
The various stages involved in the development of this project have been properly put into five chapters to enhance comprehensive and concise reading. In this project thesis, the project is organized sequentially as follows:
Chapter one of this work is on the introduction to this study. In this chapter, the background, significance, objective limitation and problem of this study were discussed.
Chapter two is on literature review of the study. In this chapter, all the literature pertaining to this work was reviewed.
Chapter three is on design methodology. In this chapter all the method involved during the design and construction were discussed.
Chapter four is on testing analysis. All testing that result accurate functionality was analyzed.
CHAPTER TWO: The chapter one of this work has been displayed above. The complete chapter two of "design and construction of an rfid and password based automatic door access control system" is also available. Order full work to download. Chapter two of "design and construction of an rfid and password based automatic door access control system" consists of the literature review. In this chapter all the related work on "design and construction of an rfid and password based automatic door access control system" was reviewed.
CHAPTER THREE: The complete chapter three of "design and construction of an rfid and password based automatic door access control system" is available. Order full work to download. Chapter three of "design and construction of an rfid and password based automatic door access control system" consists of the methodology. In this chapter all the method used in carrying out this work was discussed.
CHAPTER FOUR: The complete chapter four of "design and construction of an rfid and password based automatic door access control system" is available. Order full work to download. Chapter four of "design and construction of an rfid and password based automatic door access control system" consists of all the test conducted during the work and the result gotten after the whole work
CHAPTER FIVE: The complete chapter five of design and construction of a "design and construction of an rfid and password based automatic door access control system" is available. Order full work to download. Chapter five of "design and construction of an rfid and password based automatic door access control system" consist of conclusion, recommendation and references.
To "DOWNLOAD" the complete material on this particular topic above click "HERE"
Do you want our Bank Accounts? please click HERE
To view other related topics click HERE
To "SUMMIT" new topic(s), develop a new topic OR you did not see your topic on our site but want to confirm the availiability of your topic click HERE
Do you want us to research your new topic? if yes, click "HERE"
Do you have any question concerning our post/services? click HERE for answers to your questions
For more information contact us through any of the following means:
Mobile No :+2348146561114 or +2347015391124 [Mr. Innocent]
Email address :engr4project@gmail.com
COUNTRIES THAT FOUND OUR SERVICES USEFUL
Australia, Botswana, Canada, Europe, Ghana, Ireland, India, Kenya, Liberia, Malaysia, Namibia, New Zealand, Nigeria, Pakistan, Philippines, Singapore, Sierra Leone, South Africa, Uganda, United States, United Kindom, Zambia, Zimbabwe, etc
Support: +234 8146561114 or +2347015391124
Watsapp No :+2348146561114
Email Address :engr4project@gmail.com
FOLLOW / VISIT US VIA: