phonelogo+234 8146561114 or +2347015391124
DESIGN AND IMPLEMENTATION OF MICROCONTROLLER BASED PASSWORD ACTIVATED SECURITY SYSTEM

USER'S INSTRUCTIONS: The project work you are about to view is on "design and implementation of microcontroller based password activated security system". Please, sit back and study the below research material carefully. This project topic ( design and implementation of microcontroller based password activated security system) have complete 5(five) Chapters. The complete Project Material/writeup include: Abstract + Introduction + etc + Literature Review + methodology + etc + Conclusion + Recommendation + References/Bibliography.Our aim of providing this "design and implementation of microcontroller based password activated security system" project research material is to reduce the stress of moving from one school library to another all in the name of searching for "design and implementation of microcontroller based password activated security system" research materials. We are not encouraging any form of plagiarism. This service is legal because, all institutions permit their students to read previous projects, books, articles or papers while developing their own works.


TITLE PAGE

DESIGN AND IMPLEMENTATION OF MICROCONTROLLER BASED PASSWORD ACTIVATED SECURITY SYSTEM

BY

---
--/H2013/01430
DEPARTMENT OF ----
SCHOOL OF ---
INSTITUTE OF ---

DECEMBER,2018



APPROVAL PAGE

This is to certify that the research work, " design and implementation of microcontroller based password activated security system" by ---, Reg. No. --/H2007/01430 submitted in partial fulfillment of the requirement award of a Higher National Diploma on --- has been approved.

By
---                                                     . ---
Supervisor                                                  Head of Department.
Signature……………….                           Signature……………….        

……………………………….
---
External Invigilator



DEDICATION
This project is dedicated to Almighty God for his protection, kindness, strength over my life throughout the period and also to my --- for his financial support and moral care towards me.Also to my mentor --- for her academic advice she often gives to me. May Almighty God shield them from the peril of this world and bless their entire endeavour Amen.



ACKNOWLEDGEMENT

The successful completion of this project work could not have been a reality without the encouragement of my --- and other people. My immensely appreciation goes to my humble and able supervisor mr. --- for his kindness in supervising this project.
My warmest gratitude goes to my parents for their moral, spiritual and financial support throughout my study in this institution.
My appreciation goes to some of my lecturers among whom are Mr. ---, and Dr. ---. I also recognize the support of some of the staff of --- among whom are: The General Manager, Deputy General manager, the internal Auditor Mr. --- and the ---. Finally, my appreciation goes to my elder sister ---, my lovely friends mercy ---, ---, --- and many others who were quite helpful.


PROJECT DESCRIPTION: This work " design and implementation of microcontroller based password activated security system" research material is a complete and well researched project material strictly for academic purposes, which has been approved by different Lecturers from different higher institutions. We made Preliminary pages, Abstract and Chapter one of " design and implementation of microcontroller based password activated security system" visible for everyone, then the complete material on " design and implementation of microcontroller based password activated security system" is to be ordered for. Happy viewing!!!


ABSTRACT

Traditional lock systems using mechanical lock and key mechanism are being replaced by new advanced techniques of locking system. These techniques are an integration of mechanical and electronic devices and highly intelligent. One of the prominent features of these innovative lock systems is their simplicity and high efficiency. Such an automatic lock system consists of electronic control assembly which controls the output load through a password. This output load can be a motor or a lamp or any other mechanical/electrical load.
Here we develop a password based security system using microcontroller, which provides control to the actuating the load. It is a simple embedded system with input from the keyboard and the output being actuated accordingly. This system demonstrates a password based door lock system wherein once the correct code or password is entered, the door is opened and the concerned person is allowed access to the secured area. Again if another person arrives it will ask to enter the password. If the password is wrong then door would remain closed, denying the access to the person.


TABLE OF CONTENTS
COVER PAGE
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWELDGEMENT
ABSTRACT
SYMBOL/ABBREVIATION AND THEIR MEANING
CHAPTER ONE
INTRODUCTION
1.1      BACKGROUND OF THE PROJECT

    1. PROBLEM STATEMENT
    2. OBJECTIVE OF THE PROJECT
    3. SIGNIFICANCE OF THE PROJECT
    4. APPLICATION OF THE PROJECT
    5. SCOPE OF THE PROJECT
    6. LIMITATION OF THE PROJECT
    7. PURPOSE OF THE PROJECT
    8. PROJECT ORGANISATION

CHAPTER TWO
LITERATURE REVIEW

    1. REVIEW OF THE STUDY
    2. MECHANISM OF SECURITY ACCESS SYSTEM
    3. TYPES OF SECURITY ACCESS CONTROL
    4. REVIEW OF RELATED WORK
    5. MICROCONTROLLER UNIT
    6. DESCRITION OF AN AT9C52 MICROPROCESSOR
    7. ADVANTAGES OF USING 89s52 MICROCONTROLLER
    8. DISADVANTAGE OF USING 89C52

CHAPTER THREE
CONSTRUCTION METHODOLOGY

    1. BLOCK DIAGRAM OF THE SYSTEM
    2. BASICS OF THE SYSTEM
    3. CIRCUIT DIAGRAM OF SYSTEM
    4. PASSWORD BASED DOOR LOCKING SYSTEM PROJECT REQUIRED COMPONENTS
    5. PASSWORD BASED DOOR LOCKING SYSTEM PROJECT REQUIRED COMPONENTS
    6. PROGRAM CODE
    7. POWER SUPPLY UNIT

CHAPTER FOUR
TESTING AND RESULTS

    1. CONSTRUCTION PROCEDURE
    2. CASING AND PACKAGING
    3. ASSEMBLING OF SECTIONS
    4. PACKAGING
    5. MOUNTING PROCEDURE
    6. TESTING

CHAPTER FIVE

    1. CONCLUSION
    2. RECOMMENDATION
    3. REFERENCES

 

GLOSSARY OF SYMBOLS / ABBREVIATIONS

I           Current
V         Voltage
R          Resistance
F          Frequency
C          Capacitance
W        Power
IC        Integrated circuit
LED Light Emitting Diode
AC       Alternating current DC Direct current
CPU Central Processing Unit Ohms
NPN Negative – Positive – Negative
PNP    Positive – Negative – Positive
1/0Input/output Vcc     +5v = 1
GND Ground (0v)
EA       Enable
ALE Address Latch enable
PSEN Program Latch enable
LCD             -           light cathode display

 

 

 

CHAPTER ONE

  1. INTRODUCTION

1.1                                           BACKGROUND OF THE STUDY
The security situation in many parts of the world today leaves much to be desired. In Nigeria particularly, the prevalence of armed robbers and other groups that constitute nuisance to the society has led to the loss of lives and properties worth millions of dollars according to R v Clouden (2018). Many of the attacks that led to the loss have occurred in the homes or in guarded compounds and the attacks took place in spite of the existence of seemingly impregnable security gates that were designed to ward off intruders. The needs for electronically controlled gates that have superior security features to those operated manually thus exist and have been on the increase in recent times.
Many attempts have been made to design such gates with various types of security features. In the work by Pete Harrison a microprocessor was used to monitor two gates which sense the approach of a vehicle. The gates automatically open, wait for a specified time and then close. It is clear that the features of these gates do not provide adequate security since any vehicle can gain entry into the compound. A system that provides efficient gate access and an estate control to perform the job of the gate security guard is discussed in the work (Pete Harrison, 2019). The fact that passwords belonging to one individual can be learned by another without the owner’s permission is a major drawback of the system: the rogue can use the stolen password to gain entry into the system. These data are stored in a databank for future comparison with visitors who will only be able to gain entry into a compound through gates if the data match. The system has the disadvantage that users must have been properly documented to enable them pass through the gate (Paolo Magrassi, 2017).
The main aim of this work is to build an access control system that allows only authorized persons to access a restricted area. The system that has been designed in this work uses microcontrollers and keypad as major components. A microcontroller is programmed to decode a given sequence of keys that is entered on a keypad; the microcontroller sends a command that activates a driver circuitry to operate the gate automatically. Some advantages of the system include:
(i) It does not need close contact to control the gate; the control can be done from inside the car at a distance.
(ii) It operates as a stand-alone system and does not require a network provider for reception of signals.
(iii) The use of a keypad to generate the code necessary for the opening and closing of the gate enhances the security of the system since it requires very many trials by an intruder to succeed in breaking into the system.
(iv)The features of the system that are controlled by the firmware resident in the memory of the microcontrollers can be easily improved for future upgrade.

1.2                                                  PROBLEM STATEMENT
The need for having a constant home protection has always been there. But in the recent times, considering a dramatic rise in petty crimes like robbery and theft, the need has been more strongly felt to have a fool proof protection of the belongings and the family members. Home security has come a long way in the last few decades. It was in the hands of a guard who manually provided surveillance during nights in the earlier days, but it was not fool proof as it was only normal for him to have momentary lapse of concentration. This device brought solution to this need. It ensures adequate protection against intruders.

1.2                                   AIM AND OBJECTIVE OF THE PROJECT
The main aim of this project is to develop an embedded system, which is used to verify and authenticate the authorized and person enter the room. This code is entered from a handheld unit. The security of the system is enhanced since the code is not easy to break and is only known to the operator. The specific objectives of this project are to:

  1. Build this device that provides adequate security in our homes, offices, safes etc. (ie to reduce the risk of thieves, intruders or unauthorised personnel’s having access to our properties or privacy).
  2. Reduce the works of security personnel’s who stands to guard our homes or offices to only allow authorized persons access to our offices.
  3. Replace the traditional lock system which is using mechanical lock and key mechanism with embedded system.
  4. Produce a security activated system that will be simple in its operation, cost effective, durable and easily maintainable.
  5. To ensures maximum and adequate security in our home and offices.
  6. To creates an awareness alarm whenever someone wants to illegally try the wrong code on the security device

1.3                                          SIGNIFICANCE OF THE PROJECT

This device functions as an electronics watch dog. This device functions as a major security device  used in residential, commercial, industrial, and military properties for protection against burglary (theft) or property damage, as well as personal protection against intruders.
This research work will throw more light on the best techniques for protecting our home or properties. This study will also be designed to be of immense benefit to all the users of security devices.
It will also serve as a guide to whoever that wants to purchase security devices.
Finally, it will also serve as a useful piece of information for both producers and users of security devices.

                            APPLICATIONS OF THE PROJECT

This simple circuit can be used at residential places to ensure better safety.

It can be used at organizations to ensure authorized access to highly secured places.

With a slight modification this Project can be used to control the switching of loads through password.

1.5                                                 SCOPE OF THE PROJECT

The main component in the circuit is the controller. In this project 4×3 keypad is used to enter the password. The password which is entered is compared with the predefined password.
If the entered password is correct then the system opens the door by rotating door motor and displays the status of door on LCD. If the password is wrong then door is remain closed and displays “pwd is wrong” on LCD.

1.6                                          LIMITATIONS OF THE PROJECT

As we all know that no human effort to achieve a set of goals goes without difficulties, certain constraints were encountered in the course of carrying out this project and they are as follows:-

  1. Difficulty in information collection: I found it too difficult in laying hands of useful information regarding this work and this course me to visit different libraries and internet for solution.
  2. Difficulty in parts gathering: I found it too difficult when gathering electronics parts used for the prototype.

Financial Constraint:        Insufficient fund tends to impede the efficiency of the researcher in sourcing for the relevant materials, literature or information and in the process of data collection (internet).

1.7                                                PURPOSE OF THE STUDY
The purpose of the system is to provide a user friendly security system for organizations and homes. This system is password based and allows only authorized person to access it with a password. It also has the provision of changing the password.

1.8                                            PROJECT ORGANISATION

The work is organized as follows: chapter one discuses the introductory part of the work, chapter two presents the literature review of the study,  chapter three describes the methods applied, chapter four discusses the results of the work, chapter five summarizes the research outcomes and the recommendations.

CHAPTER TWO: The chapter one of this work has been displayed above. The complete chapter two of " design and implementation of microcontroller based password activated security system" is also available. Order full work to download. Chapter two of " design and implementation of microcontroller based password activated security system" consists of the literature review. In this chapter all the related work on " design and implementation of microcontroller based password activated security system" was reviewed.

CHAPTER THREE: The complete chapter three of " design and implementation of microcontroller based password activated security system" is available. Order full work to download. Chapter three of " design and implementation of microcontroller based password activated security system" consists of the methodology. In this chapter all the method used in carrying out this work was discussed.

CHAPTER FOUR: The complete chapter four of " design and implementation of microcontroller based password activated security system" is available. Order full work to download. Chapter four of " design and implementation of microcontroller based password activated security system" consists of all the test conducted during the work and the result gotten after the whole work

CHAPTER FIVE: The complete chapter five of "design and implementation of microcontroller based password activated security system" is available. Order full work to download. Chapter five of " design and implementation of microcontroller based password activated security system" consist of conclusion, recommendation and references.

 

CLICK HERE FOR MORE RELATED TOPICS/MATERIAL


To "DOWNLOAD" the complete material on this particular topic above click "HERE"

Do you want our Bank Accounts? please click HERE

To view other related topics click HERE

To "SUMMIT" new topic(s), develop a new topic OR you did not see your topic on our site but want to confirm the availiability of your topic click HERE

Do you want us to research your new topic? if yes, click "HERE"

Do you have any question concerning our post/services? click HERE for answers to your questions


For more information contact us through any of the following means:

Mobile No phonelogo:+2348146561114 or +2347015391124 [Mr. Innocent]

Email address emailus:engr4project@gmail.com

Watsapp No whatsapp.html :+2348146561114


COUNTRIES THAT FOUND OUR SERVICES USEFUL

Australia, Botswana, Canada, Europe, Ghana, Ireland, India, Kenya, Liberia, Malaysia, Namibia, New Zealand, Nigeria, Pakistan, Philippines, Singapore, Sierra Leone, South Africa, Uganda, United States, United Kindom, Zambia, Zimbabwe, etc
Support: +234 8146561114 or +2347015391124

Watsapp Nowhatsapp.html
:+2348146561114


E
mail Address emailus:engr4project@gmail.com


FOLLOW / VISIT US VIA:

tweeter instagram.htmlfacebook logo