Академический Документы
Профессиональный Документы
Культура Документы
A Project Study
Presented to the Faculty of the
College of Engineering
Manuel S. Enverga University Foundation
University Site, Lucena City
by
Emerson B. Arcita
March 2015
Approval Sheet
This project hereto entitled:
Development of a RFID Based Door Access System
prepared and submitted by Emerson B. Arcita in partial fulfillment of the requirements for the
degree of Bachelor of Science in Computer Engineering has been examined and is hereby
recommended for acceptance and approval for Final Examination.
Engr. James Louie Meneses
Adviser
Approved by the Committee on Oral Examination with a grade of_______________%
Member
Member
Dr. Benilda N. Villenas
Member
Accepted in partial fulfillment of the requirements for the degree Bachelor of Science in
Computer Engineering.
Acknowledgement
This study cannot be done without the help, concern, guidance and assistance of these
people around us.
To Dr. Guillermo M. Rago Jr., the beloved dean at the College of Engineering, whose
sincerity and encouragement I will never forget.
To our adviser Engr. James Louie Meneses, Engr Ronaldo C. Maano and Engr. Dhon
Nio Canela, for their expert comment, suggestion and pieces of advice.
Dr.Benilda N. Villenas, Vice President for Academic Affair of MSEUF for their persistent
and all out attention to the ETEEAP program.
To my ETEEAP classmates, for all their effort and helps.
To Manuel S. Enverga University Foundation for helping the researcher fulfills his
dreams.
Above all, I would like to thank our Almighty Father for giving me the strength,
knowledge and opportunity to conduct this study and for guiding me in making this project. I
thank him for the struggles I encountered that pushes us to pursue and finish this study. Without
his guidance my study would not be possible.
Dedication
I humbly dedicate this work to my beloved wife. Thank you for your unfailing love and support.
To my parents and siblings, thank you for the support and inspiration youve given me. To my
beloved classmates, friend and colleagues, thank you for the encouragement to continue my
studies.
Table of Contents
Title Page...................................................................................................................................1
Approval Sheet...........................................................................................................................2
Acknowledgement.....................................................................................................................3
Dedication..................................................................................................................................4
Table of Contents.......................................................................................................................5
List of Tables.8
List of Figures and Illustrations.9
Abstract.10
Unit I Introduction
Backgrounds of the Study............................................................................................11
Significance of the Study.12
Objectives of the Study................................................................................................12
Conceptual Framework................................................................................................13
Scope and Delimitation................................................................................................14
Definition of Terms......................................................................................................15
Acronyms.....................................................................................................................16
Unit II Review of Related Literature and Studies
Relative Foreign Literature..........................................................................................17
Related Local Studies..................................................................................................20
Related Foreign Studies...............................................................................................20
D. Pins of Arduino.......................................................................................................47
E. GizDuino Datasheet.................................................................................................60
Curriculum Vitae......................................................................................................................70
List of Tables
Table No.
Title
Page
Prices of Materials....34
List of Figures
Figure No.
Title
Page
Database Search...................................................................................11
Database Entry......................................................................................11
10
11
12
13
14
15
16
17
18
19
20
10
Abstract
11
Unit I
Introduction
12
to tighten the security system in Muntinlupa City Technical Institute (M.C.T.I). This RFID
system monitors the incoming and outgoing people. All staff and students of Muntinlupa City
Technical Institute (M.C.T.I) will be given RFID tag which is their identification cards know as
smart cards. The RFID reader transmits a signal that is received by an antenna intergraded and
the chip is activated only when an RFID reader scans it. It will send the unique identifier number
to the application of the host computer. The host computer will compare the details is valid or not
in the database. The host computer application will display the user information if the tags are
valid. In this regard, we are motivated to use Development of Radio Frequency Identification
(RFID) Door Access System for fast, fully automated, reliable, accurate, and increase security.
Thus, an application of this study does not only focus on security reason, but offers qualitative
learning system.
With the recent necessity on the use of technology, the proponent had to conduct a
research and state the problem. Along the way, the researcher came-up with an effective and
efficient solution to the problem. In the end, the proponent aimed and fulfilled the following
objectives.
1. To design a RFID Door Access System for the security purposes of the people who
are incoming and outgoing in Muntinlupa City Technical Institute.
2. To restrict unauthorized individual from entering the premises of Muntinlupa City
Technical Institute.
3. To monitor individual who is entering and leaving the premises in real time manner
which gives reliability but low cost.
13
INPUT
PROCESS
OUTPUT
Knowledge Requirements
Computer Literate
Data Gathering and Analysis
VB.NET Programming Language
Software Requirements
Windows 7 (OS)
MS Access 2010/2013
VB.NET
Hardware Requirements
RFID Technology
Computer
Microcontroller
14
To the Proponent. The proponents obtained additional knowledge and information that
enhanced his skills and talents about computer programming, software and system development
and analyzing the given problem for the future benefits in terms on applying acquired skills and
talents to IT Industry in this generation.
To the Future Researchers. It served as reference for research activities and helped them
gain knowledge to express their ideas in their chosen study.
The prototype hardware of RFID Door Based Access System is a circuit composing of
Power Supply Circuit, Reset Push Button Circuit, Reader Connection Circuit and Relay Circuits.
Visual Studio 2012 is the programming language that is going to be used for coding. Microsoft
Access 2007 is the database that is going to be used in saving the informations of the students as
well as their time in and time out. The study has a strong security that cant be accessed by
unauthorized person.
This system is a Local Area Network (LAN) based only and it only uses Radio Frequency
Identification (RFID) Reader device. The study would be limited and intended to be used in
school premises. Radio Frequency Identification (RFID) card cannot integrate with other school
activity such as Radio Frequency Identification (RFID) based book library card, automatic
payment system in enrollment.
Definition of Terms
15
The following are terms that the researcher used for better understanding about the
concepts in the study. The terms are defined operationally, as how they are used in the study.
Computer is the machine used by the researcher in making the documentation of the
study and also in developing the computerized system.
Controller is a comparative device that receives an input signal from a measured process
variable, compares this value with that of a predetermined control point value (set point), and
determines the appropriate amount of output signal required by the final control element to
provide corrective action within a control loop.
Data is a raw facts or processed information. It is an asset of values of qualitative or
quantitative variables; restated, pieces of data are individual pieces of information. Data in
computing (or data processing) is represented in a structure that is often tabular (represented by
rows and columns), a tree (a set of nodes with parent-children relationship), or a graph (a set of
connected nodes). Data is typically the result of measurements and can be visualized using
graphs or images.
Database is consists of an organized collection of data for one or more uses.
Door is a passage for entrance or a movable barrier that can open or close such a
passage.
Microcontroller is a small computer on a single integrated circuit containing a processor
core, memory, and programmable input/output peripherals?
16
Acronyms
The following are acronyms that the researcher used for better understanding about the
concepts in the study. The terms are defined operationally, as how they are used in the study.
IC
Integrated Circuit
IPO
LAN
LCD
LED
PLC
RFID
VB.NET
17
Unit II
Review of Related Literature and Studies
This chapter presents related literature and related studies which have relevant bearing
upon the present study about the Development of Radio Frequency Identification (RFID) Door
Access System.
This section presents other related studies by the people who conducted studies similar to
the proponents that will also greatly help in the progress of the study. And it will also help the
understanding of the proposition.
Radio-Frequency Identification (RFID) is the wireless non-contact use of radiofrequency electromagnetic fields to transfer data, for the purposes of automatically identifying
and tracking tags attached to objects. Some tags require no battery and are powered and read at
short ranges via magnetic fields (electromagnetic induction). Others use a local power source and
emit radio waves (electromagnetic radiation at radio frequencies). The tag contains electronically
stored information which may be read from up to several meters away. Unlike a bar code, the tag
does not need to be within line of sight of the reader and may be embedded in the tracked object.
RFID tags are used in many industries. An RFID tag attached to an automobile during production
can be used to track its progress through the assembly line. Pharmaceuticals can be tracked
through warehouses. Livestock and pets may have tags injected, allowing positive identification
of the animal. Since RFID tags can be attached to clothing, possessions, or even implanted
within people, the possibility of reading personally-linked information without consent has raised
privacy concerns.
18
According to Umar F. et al, various schemes have been proposed and implemented to
successfully accomplish security tasks. S. Kadry & K. Smaili, developed a wireless attendance
management system that performs iris recognition for employee identification and transfers the
data to base station with the help of a PTR2000+ wireless module. P. Simao et al, developed a
wireless time attendance system which is based on fingerprint identification and ZigBee wireless
module. I1-Kyu-Hwang, et al, developed a novel system for access monitoring and control based
on digital door lock that uses ZigBee sensor network. Aysha Qaiser, Whai-De Chen, developed
an automatic attendance management system based on RFID devices with GSM interface.
S.Ramesh et al, developed a microcontroller based bank security system that continuously
monitors the sensors of the biometric system (Iris Scanner and Vein Detector), the keypad for the
authenticated codes (Unique Password and Registered Identification Number) and the output of
wireless motion detector. Basil Hamed, presented an access control system that uses Bluetooth
technology for Authorized Access Security System. The work leverage the use of ATMEL 89C55
microcontroller and visual basic program to build data logger which provides multiple accesses
to a protected area such as an office, home, or bank. The data logger was added to the system to
make records of users who accessed the system at any time. Bluetooth-enabled mobile phones
design is also proposed providing wireless and automatic unlocking. By using the proposed
system, a person with mobile phone can use it to get access to environments, such as buildings,
labs, rooms, etc. These systems discussed above, though efficient, do not present a cost effective
solution to the office automation problem. Some of these systems were implemented using
fingerprint module, GSM module, and wireless module which are costly.
Again, the use of automatic slide doors (such as slide doors, swing doors, folding doors,
revolving doors) has also been commercially produced. For its access control, the application of
19
Card reader (smart) card, Key pad (password), Shadow Access, and Biometric Access is still
evolving. This research focused on automatic slide door using wireless keypad because of its
simplicity and cost effectiveness. In our proposed EWiSECS, an embedded microcontroller is
programmed to accept password wirelessly and opens the door only when a valid password code
is supplied and activate an alarm when a wrong password ID is supplied more than three times.
For organizations, this design gives the users the opportunity to access the area only when a
demand code ID is valid.
Automatic Access Control Using Student ID Card Based on RFID Technology, the
automatic access control system evolves to prevent illegal entry of people into a building and
preventing unauthorized people from gaining access to certain organization resources. The door
locking system functions in real time, the door open as soon as the user scans the tag. The system
also stores the login and logout information of the user.
It notified an SMS and RFID Based Notification System enables parents to monitor the
presence of their children at a specific time. The time in and out of every student is generated
through scanning of their ID card at the gate followed by sending the SMS notification of the
attendance to their parents. Limitation of the system is that there is no acknowledgement
between the sender and the receiver.
RFID Based Exam Hall Maintenance System resolves the problem of students searching
for their examination halls and seating arrangements. The card reader is provided at the entrance
of the building. A student needs to swipe his tag in front of the reader at any hall and his hall and
seat number would be displayed on the LCD.
20
21
Factors that motivated towards adopting of RFID based automatic attendance system in
schools in Nigeria are challenges that usually occur during manually taking attendance i.e.
writing and signing for students that are not physically present at the classroom by his friends,
taking attendance in a large class could be cumbersome where there could be many students
wanting to write and sign the attendance list at the same time, which could lead to tearing of the
attendance list or some students not being able to write down their names on the attendance list
before the end of the class. Also the lecturer can also misplace the attendance list. RFID
technology is implemented because it is cheaper, secured and easier compared to other
technologies.
22
Unit III
Methods and Procedures
This chapter presents the methods and procedures used in the development and
implementation of the project. The proponents also included the different materials used,
program algorithms, PCB designs and the design flow process in making the whole system.
Research Design
The development of an RFID based door access system is divided into two main parts;
the hardware and software. The hardware part consists of the RFID reader, tags, Arduino,
servomotors and the host computer. The software part is the host system application designed
using VB.net incorporated with Arduino IDE Environment and Microsoft access database.
Administrator can login into the system and check necessary information in the application,
which keeps a log of the ID, time and date of every student, staff and likes that enters the
premises of MCTI. It also can register new person using the tag ID of each tag. In connecting the
RFID reader to the PC, Arduino is incorporated by through the RS-232 (Serial Port) cable.
One of the important components of this project is software code. Software code of this
system taught Arduino Microcontroller to run this security system according to requirements.
Program coding also enables microcontroller to learn about the different devices that are attached
with it, their nature and purposes such as Servo Motor, LCD panel and Speaker. Program code is
also being used in this project for effective communications and fast processing between
hardware components that are connected to microcontroller such as RFID module with reader
antenna, and components on the breadboard such as Servo Motor, LCD panel and Speaker.
23
A RFID tag is given to each person in MCTI (which is embedded into their ID cards) and
this is scanned at the entrance by the reader. The RFID contains a unique code that is scanned by
the reader. On every scan the information about the person is taken and the date is displayed on
the user interface if the tag number matches that which is stored in the database.
The other important role that software is playing here is the security concerns. The
software has very strong security that is not easy to break and read the RFID tag numbers. These
numbers are being processed in the module but they are severely encoded. It is definitely not
easy to decode this encryption and read the tag numbers. This software is cleaver enough to
determine who is the authorized user and who is the unauthorized user and then it acts
accordingly. This software has another cool feature of displaying messages on the screen that is
connected with hardware. The formatting of the screen has been done neatly. There are no
difficulties one can have in order to read and understand the message of the screen. It is very user
friendly.
Research Environment
The study was conducted at the International Electronics and Technical Institute. The
school was the best location for the proposed study because school has a security protocol that
being followed by students and staff. One of the regulations when entering school building is you
has to wear complete uniform including IDs but there are times that it was never followed. Our
proposed study Development of Radio Frequency Identification (RFID) Door Access System
would be beneficial to the school because it will reduce threat from intruders and robbery entry.
Data gathering, documentation, project design testing, analysis and evaluation of the system all
took place in the school. Some sources of data were taken from equipment manual, internet
research, actual observation on the machine and production process.
24
Procedures
Data Gathering. The design of RFID Based Door Access System is
made from the modular component which is the RFID module, Door Access
Module, and microcontroller. The researcher is studying each component,
and able to design which will be simple, convenient and easy to use. The
researcher also gathering related data from local and foreign researcher and
use the data as a guide for making the prototype. The evaluation and results
of the data gathered will be recorded and studied. The design of the project
will be made based on the results.
Program Development. The design of program is based on the data
gathered from local and foreign studies. The researcher will be studying the
microcontroller programming. The programming software used is Adruino
IDE, using a Type-B USB cable connected from USB port of computer.
Prototype Design. The design of the prototype will be portable and
easy to install. The researcher studied the necessary materials to be used
like wiring and cables needed to be used in the interconnection of all
component, the hardware to be used and the programming language to
control the entire system.
Circuit Design. The design of the circuit is based on the result of the
data gathered. Creation of the circuit for the prototype will be done thru the
use of breadboard to reduce project cost and to correct the faults in the
design before placement in the enclosure.
25
Scale
4.21 5.00
Rate
5
Agree
Fairly Agree
Disagree
Strongly Disagree
Design Concepts
3.41 4.20
2.61 3.40
1.81 2.60
1.00 1.80
26
4
3
2
1
The researcher compiled all the collected datas and information for the purpose of
documentation which it serves as a guide in making and developing a new system. The project
study aims to provide the Muntinlupa City Technical Institute with an accurate Radio Frequency
Identification Based Door Access System for recording the time in and time out of employees,
students and others. The researcher used his basic programming knowledge in coding the
program for the automatic execution of the process. Microsoft Visual Studio 2012 was the
software used by the researcher in programming using Visual Basic.NET. The researcher use
Visual Basic.NET as the front end and Microsoft Access 2007 as the back end of the project
study. This research and design involves technical knowledge and application of fundamental
principles in electronics. The development of this project Development of RFID Door Access
System will help the school to increasing the security efficiency and safety. The device includes
an electromagnetic lock module for selectively locking and unlocking a door in a door frame is
provided. The development of RFID door access system will control and synchronized the LCD
display, timer, and buzzer to alarm the person that he/she use his/her 3 attempts. The RFID Based
Door Access System uses different materials:
Radio Frequency Identification Reader for security purposes in entering in and out of the
school.
Radio Frequency Identification Card given to each students for they able to enter in and
out of the school.
27
28
Unit IV
Presentation and Discussion
This unit aims to clearly present the stages needed for the implementation of the
proposed system. The methods and procedures, the software requirements, hardware
requirements and additional resources needed in the project discussed in the section of the
research study. The step by step procedures provide better understanding of the proposed RFID
Door Access System, so that it implemented in Muntinlupa City Technical Institute (MIT).
Data Gathering
The design of RFID Door Access System made from the modular component
which is the RFID module, Arduino microcontroller as control center. The
researcher is studying each component, and able to design which will be
simple, convenient and easy to use. The researcher also gathering related
data from local and foreign researcher and use the data as a guide for
making the prototype. The evaluation and results of the data gathered is
recorded and studied. The design of the project is made based on the results.
29
Servo Motor
40%
30%
30%
Option/Brand
Cost
Quality
Availability
Decision
1. BSM C-Series
85%
90%
90%
2. BSM N-Series
90%
85%
85%
80%
90%
85%
3. BSM
Stainless
Steel
Table 2. Data Analysis for Servo Motor
Table 2 shows the comparison of different brand their costing, quality and availability
and their percentage. BSM C Series will be used in developing the project because the cost is
cheaper, high quality and it is available in the market.
RFID
Reader
40%
30%
30%
Option/Brand
Cost
Quality
Availability
Decision
1. ACX
85%
80%
85%
2. Deek-Robot
90%
85%
85%
3. Promag
80%
Table 3. Data Analysis for RFID Reader
30
90%
85%
Table 3 shows the comparison of different brand their costing, quality and availability
and their percentage. RFID Deek Robot will be used in developing the project.
40%
30%
30%
Option/Brand
Cost
Quality
Availability
Decision
1. Mega ADK
80%
90%
85%
2. GizDuino
85%
90%
90%
3. Uno
90%
Table 4. Data Analysis for Microcontroller
85%
85%
Microcontroller
Table 4 shows the comparison of different brand their costing, quality and availability
and their percentage. E- Gizmo Microcontroller will be used in developing the project.
RFID ID
40%
30%
30%
Option/Brand
Cost
Quality
Availability
Decision
1. ACX
85%
80%
85%
2. Deek-Robot
90%
85%
85%
80%
90%
85%
3. Promag
Table 5. Data Analysis for RFID ID
Table 5 shows the comparison of different brand their costing, quality and availability
and their percentage. RFID ID Deek - Robot will be used in developing the project.
COMPONENTS
Microcontroller
RFID Reader
RFID Tag
LCD
Serve Motor
UNIT PRICE
850.00
750.00
25.00
450.00
550.00
QUANTITY
1
1
2
1
1
Buzzer
350.00
LEDs
3.00
Micellaneous
1500.00
TOTAL COST
Table 6. Prices of Materials
1
10
31
350.00
30.00
1500.00
4530.00
Table 6 shows the costing of the materials used in developing the RFID Door Access
System. It shows that you can create a device in an affordable cost.
Design of the Project
The researcher provided a schematic diagram of different materials used in developing
the RFID Based Door Access System.
32
Reader Connection Circuit provides different pins for the connection of RFID Reader to
RFID tag and other hardware requirements.
33
Reset Push Button Circuit use in this study to reset or to erase the implemented codes to
RFID Reader so that you can make a new set of codes for the functionality of RFID Reader.
Start
Tag ID Match?
Access Denied
Door Lock Of
YES
NO
If User 3 Attempts?
Record the data in the database system
YES
Buzzer Alarm
34
Development
Interface. The Graphical User Interface (GUI) of the program for Radio Freqeuncy
Identification Based Door Access System was developed in C Language using Arduino
Software Applications for RFID Reader, servomotor, LCD Display and others.
35
Figure 18. Coding for RFID Reader, LCD Display and LEDs using Arduino
Interface. The 2nd Graphical User Interface (GUI) of the program for Radio Frequency
Identification Based Door Access System for communication the hardware requirements and
software requirements was developed in Microsoft Visual Studio 2010 / NET.
36
Prototype. Based on the hardware description above, RFID automatic access control
system will turn to door access system mode as a default mode where this system in initial state
wait for the student to put their ID on the RFID reader. The LCD will display a message Place
your ID tag on the reader while waiting for an input from the RFID Reader. When the student
ID tag is place near to RFID reader, the reader can read student tag ID and further send the
student tag ID to the PIC microcontroller. After PIC microcontroller process the data, either this
student ID match on the ID where its being program inside the Microcontroller. If the
Microcontroller did not found the match ID tag, the LED will display User not found on the
LCD screen. After a few second, the LCD will display welcome note Place your ID tag on the
reader again.
37
Besides that, if the Microcontroller found the match ID tag, the tag ID will display on
LCD in decimal number and it show User Identified. At the same time, it will send the data to
the GUI program which it create using visual basic 2010 to record the student ID, name, date and
the time at database system through USB serial communication. After a few second, the LCD
will display the welcome note Place your ID tag on the reader again. It will repeat
continuously. Lastly, the admin can check the record of user time in and time out when they
access the door at GUI program.
Evaluation
To be able to know the effectively, accuracy and efficiency of the RFID Based Door
Access System, the researcher created a survey that was filled out by the students, teachers and
38
personnel of Muntinlupa City Technical Institute. The proponent showed to them the prototype
of the study.
Table 7. Tabulation of User Evaluation
5
Description
1
WM
Security
F W
W f
20
16
15
20
25
W F W
Agree
28
4.3
Agree
24
4.4
Agree
16
4.4
Agree
4.325
Agree
Summary of findings
Based on the results that the researcher gathered, the software Development of Radio
Frequency Identification (RFID) Door Access System was successfully developed. This system
39
should be able to minimize the technical human error during secured gate access. Besides, the
system also helps user to use paperless environment and save the time.
Listed below is the summary of findings:
The RFID Door Access System provides security to the people who are coming in and out of
Muntinlupa City Technical Institute.
The system ensures restriction of unauthorized individual from entering the premises of
Muntinlupa City Technical Institute.
The system monitors the accurate time of individuals who are entering and leaving the premises
of Muntinlupa City technical Institute.
Unit V
Conclusions and Recommendations
40
Conclusions
The study was set out to explore the concept of the development of Radio Frequency
Identification Based Boor Access System and specifically:
1. The proposed system can be applied for real time recording of the people who enter the
building. It can automatically record all the basic information including name, time of
their both in and out, and ID number etc.
2. The proposed system is an access control system. Only the person who has the authorized
key tag or Radio Frequency Identification (RFID) card can gain access into the place.
Thus, by taking advantage of this system, security of the building will no longer be a
problem.
3. The system has the ability for data back-up, recovery and tags replacement. A userconfigurable timeable can be generated automatically by the software. In that timeable,
entry times and exist times can be view and edit in the user interface, which gives high
reliability with low maintenance cost.
4. The system is reliable, usable and accurate. It can saves time in monitoring activities
inside the premises of Muntinlupa City Technical Institute.
Recommendations
With the positive effect of Trim Relay Checker integration to CAT4104 probe card, the
researcher recommends the following:
41
1. The researcher recommends to improve the system by adding other functionalities such
as it can be used as library card that make the system more useable to the user.
2. To the Muntinlupa City Technical Institute identify the hardware requirements and
software requirements of the project study as well as they need to be familiar to the
execution and implementation of the project study.
3. To the end users of this project continue to give feedback about its performance and
recommend ways that can further enhance this project. Be the critic to make it more
reliable to use and to fit your needs.
4. Lastly, the researcher recommends implementing the proposed Development of Radio
Frequency Identification (RFID) Door Access System that would be beneficial for
Muntinlupa City Technical Institute at a very competitive cost.
References
Goodrum, P., McLaren, M., Durfee, A. (2006) The application of active radio
frequency identification technology for tool tracking on construction job sites. Automation in
Construction.
42
Weinstein, R., (2005) "RFID: a technical overview and its application to the enterprise,"
IT Professional.
Xiao, Y., Yu, S., Wu, K., Ni, Q., Janecek., C., Nordstad, J, (2007) entitled Radio
frequency identification: technologies, applications,and research issues, Retrieve May 2007
from Wiley Journal of Wireless Communications and Mobile Computing.
Yu-Chih Huang; (2009) Secure Access Control Scheme of RFID System Application,
Fifth International Conference on Information Assurance and Security.
Zeydin Pala and Nihat Inan of RFID Eurasia, (2007) entitled Smart parking application
using RFID technology
Appendix A
Letter of Transmittal
March 2015
Dr. Guillermo M. Rago, Jr.
Dean, College of Engineering
Manuel S. Enverga University Foundation
43
44
Lucena City
Dear Sir,
This project study is entitled Development of a RFID Based Door Access System
which serves as partialfulfillment of the requirements for the degree Bachelor of Science in
Computer Engineering or CPEP5521- CPE Project, for the S.Y. 2014-2015.
Given the requirements needed, I was able to create the desired circuit and upon
implementing the conceptualized circuitry, I was able to justify whether the project was properly
working through validation and testing.
With your kind consideration, I hope that this design will satisfy your requirements. Any
observed correction and recommendation would be noted with appreciation.
Respectfully yours,
Emerson B. Arcita
Appendix B
RFID BASED DOOR ACCESS SYSTEM ASSESMENT
Students
Personnel
Teachers
Others (specify)____________________________
45
5. Strongly Agree 4. Agree 3. Neither Agree nor Disagree 2.Disagree 1. Strongly Disagree
Security
_____a. Authorized users can only access the system.
_____b. Is the users are secured.
Functionality
_____c. Functional accuracy provided.
Usability (User friendliness)
_____d. The RFID Based Door Access System Graphical User Interface is easy to understand.
Comments
Suggestions
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
Appendix C
Project Timeline
Appendix D
Pins of Arduino
/*
46
Changelog
47
48
#ifndef Pins_Arduino_h
#define Pins_Arduino_h
#include <avr/pgmspace.h>
#define IOT644 1
#define NOT_A_PIN 0
#define NOT_A_PORT 0
#define NOT_ON_TIMER 0
#define TIMER0A 1
#define TIMER0B 2
#define TIMER1A 3
#define TIMER1B 4
#define TIMER2 5
#define TIMER2A 6
#define TIMER2B 7
#define TIMER3A 8
#define TIMER3B 9
#define TIMER3C 10
#define TIMER4A 11
#define TIMER4B 12
#define TIMER4C 13
#define TIMER5A 14
#define TIMER5B 15
#define TIMER5C 16
49
50
#define digitalPinToPCICR(p)
#define digitalPinToPCICRbit(p) (((p) <= 7) ? 3 : (((p) <= 13) ? 1 : (((p) <= 21) ? 0 : (((p) <= 23)
? 1 : 2))))
#define digitalPinToPCMSK(p)
<= 21) ? (&PCMSK0) : (((p) <= 23) ? (&PCMSK1) : (((p) <= 31) ? (&PCMSK2) : ((uint8_t
*)0))))))
#define digitalPinToPCMSKbit(p) (((p) <= 7) ? (p) : (((p) <= 13) ? ((p) - 6) : (((p) <= 21) ? ((p) 14) : (((p) <= 23) ? ((p) - 22) : ((p) - 24)))))
+---\/---+
// INT0 (D 0) PB0 1|
// INT1 (D 1) PB1 2|
// INT2 (D 2) PB2 3|
// PWM (D 3) PB3 4|
// PWM (D 4) PB4 5|
// MOSI (D 5) PB5 6|
// MISO (D 6) PB6 7|
// SCK (D 7) PB7 8|
//
RST 9|
|32 AREF
//
VCC 10|
|31 GND
//
GND 11|
|30 AVCC
//
XTAL2 12|
//
XTAL1 13|
51
//
52
+--------+
//
#define NUM_DIGITAL_PINS
#define NUM_ANALOG_INPUTS
32 //24
8
#define digitalPinHasPWM(p)
10 )
#define PA 1
#define PB 2
#define PC 3
#define PD 4
#define PE 5
#define PF 6
#define PG 7
#define PH 8
#define PJ 10
#define PK 11
#define PL 12
#ifdef ARDUINO_MAIN
// these arrays map port names (e.g. port B) to the
// appropriate addresses for various functions (e.g. reading
// and writing)
const uint16_t PROGMEM port_to_mode_PGM[] =
{
NOT_A_PORT,
(uint16_t) &DDRA,
(uint16_t) &DDRB,
(uint16_t) &DDRC,
(uint16_t) &DDRD,
};
53
(uint16_t) &PORTC,
(uint16_t) &PORTD,
};
const uint16_t PROGMEM port_to_input_PGM[] =
{
NOT_A_PORT,
(uint16_t) &PINA,
(uint16_t) &PINB,
(uint16_t) &PINC,
(uint16_t) &PIND,
};
const uint8_t PROGMEM digital_pin_to_port_PGM[] =
{
PD, /* 0 */
PD,
PD,
PD,
PD,
PD,
PD,
PD,
PB, /* 8 */
54
PB,
PB,
PB,
PB,
PB,
PA, /* 14 */
PA,
PA,
PA,
PA,
PA,
PA,
PA,
PB, /* 22 */
PB,
PC, /* 24 */
PC,
PC,
PC,
PC,
PC,
PC,
PC /* 31 */
55
};
const uint8_t PROGMEM digital_pin_to_bit_mask_PGM[] =
{
_BV(0), /* 0, port D */
_BV(1),
_BV(2),
_BV(3),
_BV(4),
_BV(5),
_BV(6),
_BV(7),
_BV(2), /* 8, port B */
_BV(3),
_BV(4),
_BV(5),
_BV(6),
_BV(7),
_BV(0), /* 14, PORT A */
_BV(1),
_BV(2),
_BV(3),
_BV(4),
56
_BV(5),
_BV(6),
_BV(7),
_BV(0), /* 22, PORT B */
_BV(1),
_BV(0), /* 24, port C */
_BV(1),
_BV(2),
_BV(3),
_BV(4),
_BV(5),
_BV(6),
_BV(7)
};
const uint8_t PROGMEM digital_pin_to_timer_PGM[] =
{
NOT_ON_TIMER,
/* 0 - PD0 */
NOT_ON_TIMER,
/* 1 - PD1 */
NOT_ON_TIMER,
/* 2 - PD2 */
NOT_ON_TIMER,
/* 3 - PD3 */
TIMER1B,
/* 4 - PD4 */
TIMER1A,
/* 5 - PD5 */
TIMER2B,
/* 6 - PD6 */
57
TIMER2A,
/* 7 - PD7 */
NOT_ON_TIMER,
/* 8 - PB2 */
TIMER0A,
/* 9 - PB3 */
TIMER0B,
/* 10 - PB4 */
NOT_ON_TIMER,
/* 11 - PB5 */
NOT_ON_TIMER, /* 12 - PB6 */
NOT_ON_TIMER, /* 13 - PB7 */
NOT_ON_TIMER, /* 14 - PA0 */
NOT_ON_TIMER, /* 15 - PA1 */
NOT_ON_TIMER,
/* 16 - PA2 */
NOT_ON_TIMER, /* 17 - PA3 */
NOT_ON_TIMER, /* 18 - PA4 */
NOT_ON_TIMER, /* 19 - PA5 */
NOT_ON_TIMER, /* 20 - PA6 */
NOT_ON_TIMER, /* 21 - PA7 */
NOT_ON_TIMER, /* 22 - PB0 */
NOT_ON_TIMER, /* 23 - PB1 */
NOT_ON_TIMER, /* 24 - PC0 */
NOT_ON_TIMER, /* 25 - PC1 */
NOT_ON_TIMER, /* 26 - PC2 */
NOT_ON_TIMER, /* 27 - PC3 */
NOT_ON_TIMER, /* 28 - PC4 */
NOT_ON_TIMER, /* 29 - PC5 */
58
NOT_ON_TIMER, /* 30 - PC6 */
NOT_ON_TIMER
/* 31 - PC7 */
};
#endif
#endif
Appendix E
Datasheet of GizDuino IOT - 644
59
60
61
62
63
64
65
66
67
68
69
70
Tertiary
Secondary
Primary
Trainings:
Computer System servicing NC2
Advance Computer
Basic Computer
Tesda Manpower
October to Dec 2003
Consumer Electronics
TESDA Manpower
July to Sept 2003
Other Qualification:
Assessors Qualification
Trainers Qualification
National Certificate II
71
Assessors Methodology
Trainers Training Methodology
College
Personal Data:
Birth Date:
Birth Place:
Age:
Gender:
Civil Status:
Name of Spouse:
Nationality:
Height:
Working Experience:
September 2011-Present
TESDA,Taguig
MCTI-TESDA
Trainor
Go Fluent IBM
Ayala Alabang
E. A. Electronics Service
Center
Skills:
-
Character References:
72
Chairman
Barangay Cupang, Muntinlupa City
Natividad Garces
Admin Officer
MCTI-TESDA, Putatan Muntinlupa City
I hereby pledge that the above information given above are true and correct to the best of
my knowledge and beliefs.
___________________________
Applicants Signature