Вы находитесь на странице: 1из 72

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

Development of an RFID Based Door Access System

A Project Study
Presented to the Faculty of the
College of Engineering
Manuel S. Enverga University Foundation
University Site, Lucena City

In Partial Fulfillment of the Requirements


for the Degree of
Bachelor of Science in Computer Engineering
under
Expanded Tertiary Education and Accreditation Program
(ETEEAP)

by
Emerson B. Arcita

March 2015

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

Approval Sheet
This project hereto entitled:
Development of a RFID Based Door Access System
prepared and submitted by Emerson B. Arcita in partial fulfillment of the requirements for the
degree of Bachelor of Science in Computer Engineering has been examined and is hereby
recommended for acceptance and approval for Final Examination.
Engr. James Louie Meneses
Adviser
Approved by the Committee on Oral Examination with a grade of_______________%

Guillermo M. Rago Jr. Ed.D.,CE.


Chairman
Engr. Ronaldo C. Maao

Engr. Dhon Nio Canela

Member

Member
Dr. Benilda N. Villenas
Member

Accepted in partial fulfillment of the requirements for the degree Bachelor of Science in
Computer Engineering.

Dr. Guillermo M. Rago Jr.


Dean, College of Engineering and Technical Dept.
Date: __________________

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

Acknowledgement
This study cannot be done without the help, concern, guidance and assistance of these
people around us.
To Dr. Guillermo M. Rago Jr., the beloved dean at the College of Engineering, whose
sincerity and encouragement I will never forget.
To our adviser Engr. James Louie Meneses, Engr Ronaldo C. Maano and Engr. Dhon
Nio Canela, for their expert comment, suggestion and pieces of advice.
Dr.Benilda N. Villenas, Vice President for Academic Affair of MSEUF for their persistent
and all out attention to the ETEEAP program.
To my ETEEAP classmates, for all their effort and helps.

To Manuel S. Enverga University Foundation for helping the researcher fulfills his
dreams.
Above all, I would like to thank our Almighty Father for giving me the strength,
knowledge and opportunity to conduct this study and for guiding me in making this project. I
thank him for the struggles I encountered that pushes us to pursue and finish this study. Without
his guidance my study would not be possible.

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

Dedication

I humbly dedicate this work to my beloved wife. Thank you for your unfailing love and support.
To my parents and siblings, thank you for the support and inspiration youve given me. To my
beloved classmates, friend and colleagues, thank you for the encouragement to continue my
studies.

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

Table of Contents

Title Page...................................................................................................................................1
Approval Sheet...........................................................................................................................2
Acknowledgement.....................................................................................................................3
Dedication..................................................................................................................................4
Table of Contents.......................................................................................................................5
List of Tables.8
List of Figures and Illustrations.9
Abstract.10
Unit I Introduction
Backgrounds of the Study............................................................................................11
Significance of the Study.12
Objectives of the Study................................................................................................12
Conceptual Framework................................................................................................13
Scope and Delimitation................................................................................................14
Definition of Terms......................................................................................................15
Acronyms.....................................................................................................................16
Unit II Review of Related Literature and Studies
Relative Foreign Literature..........................................................................................17
Related Local Studies..................................................................................................20
Related Foreign Studies...............................................................................................20

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

Unit III Methods and Procedures


Research Design...........................................................................................................22
Research Environment.................................................................................................23
Procedure.....................................................................................................................24
Evaluation....................................................................................................................25
Design Concept............................................................................................................26

Unit IV Presentation and Discussion


Data Gathering.............................................................................................................28
Data Analysis...............................................................................................................29
Designs of the Project..................................................................................................31
Development................................................................................................................35
Evaluation....................................................................................................................38
Summary of Findings...................................................................................................39

Unit V Summary of findings, conclusions, and recommendations


Conclusions..................................................................................................................40
Recommendations........................................................................................................41
References................................................................................................................................42
Appendices
A. Letter of Transmittal................................................................................................44
B. Evaluation Sheet......................................................................................................45
C. Project Timeline......................................................................................................46

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

D. Pins of Arduino.......................................................................................................47
E. GizDuino Datasheet.................................................................................................60
Curriculum Vitae......................................................................................................................70

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

List of Tables
Table No.

Title

Page

Five Points Liker Scale...28

Data Analysis for Servo Motor32

Data Analysis for RFID Reader...32

Data Analysis for Microcontroller. ..33

Data Analysis for RFID ID..33

Prices of Materials....34

Tabulation of User Evaluation..41

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

List of Figures
Figure No.

Title

Page

A Typical RFID System.........................................................................9

Proposed Design of the System...........................................................10

User Check-In Process.........................................................................10

Card Detection ....................................................................................10

Database Search...................................................................................11

Database Entry......................................................................................11

Conceptual framework Paradigm of the Study.....................................15

Hardware Setup and Integration...........................................................26

Validation of RFID Tags.......................................................................27

10

Hardware Parts of this Project..............................................................29

11

Existing Design of Door Access System...............................................31

12

Schematic Diagram of Power Supply...................................................34

13

Schematic Diagram of RFID Connection Circuit.................................35

14

Schematic Diagram of Reset Push Button Circuit................................35

15

Schematic Diagram of Light Crystal Display.......................................36

16

Schematic Diagram of Relay Circuit....................................................36

17

RFID Door Based Access System Program Flow Chart.......................37

18

Coding for RFID Reader, LCD, and LEDS using Arduino..................38

19

Microsoft Visual Studio 2010 Professional..........................................39

20

Installation and Testing of RFID Reader .............................................40

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

10

Abstract

Emerson B. Arcita, Development of an RFID Based Door Access System for


Muntinlupa Institute of Technology (MIT), Project Study for the Degree Bachelor of
Science in Computer Engineering, under the Expanded Tertiary Education Equivalency and
Accreditation Program (ETEEAP), Manuel S. Enverga University Foundation, March 2015.
MIT is having trouble with intruders that often leads to robbery. This study prevents
robbery entry and intruders from gaining access to the building, this study provide solution to
security problems of the institution. MIT can now ensure the safety of the establishment and the
people.
The project is a system that can control the opening and closing of a door. This system is
using RFID Technology that is automatic identification method. This method is relying on
storing and remotely retrieving data using devices called RFID tags. The system is built to
increase the safety level in a building that includes our school.

Keyword: door access control, radio frequency identification, microcontroller

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

11

Unit I
Introduction

RFID, Radio Frequency Identification is a fundamental and inexpensive technology that


enables wireless data transmission. This technology has not been very often used in industry due
to lack of standardization among the manufacturing companies earlier. RFID technologies are
efficient and secure compare to other network. With RFID, wireless automatic identification
takes a very specific form: the object, location, or individual is marked with a unique identifier
code contained with an RFID tag, which is in some way attached to or embedded in the target.
RFID is not a single product but a comprehensive system, a typical RFID system include three
basic elements: RFID tag (transponder), reader (transceiver) and back-end application system (or
database), which demands the support of the computer network. The software is used for
management, controlling, transaction, operation and maintaining record of the various users.

Background of the Study


According to Maslow Hierarchy of needs, safety or simply security is among the five
human needs in order to survive. In our real life, security system also plays an important role to
prevent unknown person or robbery entry. As we observed, and prior to secure schools facilities,
personnel and students welfare a security guard is officially hired. Still intruders and students
non compliance in schools uniform and ID as well get inside the school premises
unnoticeably. These are sourcing factors for risky consequences on the above mentioned. Since,
the RFID technology used widely based on the business requirements of the organization for end
users. This project will implement the RFID technology to replace the conventional lock system

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

12

to tighten the security system in Muntinlupa City Technical Institute (M.C.T.I). This RFID
system monitors the incoming and outgoing people. All staff and students of Muntinlupa City
Technical Institute (M.C.T.I) will be given RFID tag which is their identification cards know as
smart cards. The RFID reader transmits a signal that is received by an antenna intergraded and
the chip is activated only when an RFID reader scans it. It will send the unique identifier number
to the application of the host computer. The host computer will compare the details is valid or not
in the database. The host computer application will display the user information if the tags are
valid. In this regard, we are motivated to use Development of Radio Frequency Identification
(RFID) Door Access System for fast, fully automated, reliable, accurate, and increase security.
Thus, an application of this study does not only focus on security reason, but offers qualitative
learning system.

Objectives of the Study

With the recent necessity on the use of technology, the proponent had to conduct a
research and state the problem. Along the way, the researcher came-up with an effective and
efficient solution to the problem. In the end, the proponent aimed and fulfilled the following
objectives.
1. To design a RFID Door Access System for the security purposes of the people who
are incoming and outgoing in Muntinlupa City Technical Institute.
2. To restrict unauthorized individual from entering the premises of Muntinlupa City
Technical Institute.
3. To monitor individual who is entering and leaving the premises in real time manner
which gives reliability but low cost.

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

13

4. To evaluate RFID Door Access System in terms of reliability, usability, and


accuracy.
Conceptual Framework of the Study
The Conceptual Model shows the possible courses of action of the proposed system.
This shows the fundamental bases of the entire proposed system.

INPUT

PROCESS

OUTPUT

Knowledge Requirements
Computer Literate
Data Gathering and Analysis
VB.NET Programming Language

Developed Radio Frequency Identification (RFID) Door

Software Requirements
Windows 7 (OS)
MS Access 2010/2013
VB.NET

Creation of program for the system


Development of the system
Evaluation

Hardware Requirements
RFID Technology
Computer
Microcontroller

Figure 7. Conceptual Framework Paradigm of the Study

Significance of the Study


The study of Development of Radio Frequency Identification (RFID) Door Access
System benefited the following:
To the Users. This study ensured the well-being of the institution. It prevented robbery
entry and intruders from gaining access to the building.

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

14

To the Proponent. The proponents obtained additional knowledge and information that
enhanced his skills and talents about computer programming, software and system development
and analyzing the given problem for the future benefits in terms on applying acquired skills and
talents to IT Industry in this generation.
To the Future Researchers. It served as reference for research activities and helped them
gain knowledge to express their ideas in their chosen study.

Scope and Limitation

The prototype hardware of RFID Door Based Access System is a circuit composing of
Power Supply Circuit, Reset Push Button Circuit, Reader Connection Circuit and Relay Circuits.
Visual Studio 2012 is the programming language that is going to be used for coding. Microsoft
Access 2007 is the database that is going to be used in saving the informations of the students as
well as their time in and time out. The study has a strong security that cant be accessed by
unauthorized person.
This system is a Local Area Network (LAN) based only and it only uses Radio Frequency
Identification (RFID) Reader device. The study would be limited and intended to be used in
school premises. Radio Frequency Identification (RFID) card cannot integrate with other school
activity such as Radio Frequency Identification (RFID) based book library card, automatic
payment system in enrollment.

Definition of Terms

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

15

The following are terms that the researcher used for better understanding about the
concepts in the study. The terms are defined operationally, as how they are used in the study.

Computer is the machine used by the researcher in making the documentation of the
study and also in developing the computerized system.
Controller is a comparative device that receives an input signal from a measured process
variable, compares this value with that of a predetermined control point value (set point), and
determines the appropriate amount of output signal required by the final control element to
provide corrective action within a control loop.
Data is a raw facts or processed information. It is an asset of values of qualitative or
quantitative variables; restated, pieces of data are individual pieces of information. Data in
computing (or data processing) is represented in a structure that is often tabular (represented by
rows and columns), a tree (a set of nodes with parent-children relationship), or a graph (a set of
connected nodes). Data is typically the result of measurements and can be visualized using
graphs or images.
Database is consists of an organized collection of data for one or more uses.
Door is a passage for entrance or a movable barrier that can open or close such a
passage.
Microcontroller is a small computer on a single integrated circuit containing a processor
core, memory, and programmable input/output peripherals?

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

16

Programming Language is a formal constructed designed to communicate instructions to


a machine, particularly a computer. Programming languages can be used to create programs to
control the behavior of a machine or to express algorithms.
Records are the structure of a database, the part consisting of several uniquely named
components called data fields.
System is often equated with software, or perhaps with the combination of computer
hardware and software.

Acronyms
The following are acronyms that the researcher used for better understanding about the
concepts in the study. The terms are defined operationally, as how they are used in the study.

IC

Integrated Circuit

IPO

Input Process Output

LAN

Local Area Network

LCD

Liquid Crystal Display

LED

Light Emitting Diode

PLC

Programmable Logic Controller

RFID

Radio Frequency Identification

VB.NET

Microsoft Visual Basic Net

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

17

Unit II
Review of Related Literature and Studies

This chapter presents related literature and related studies which have relevant bearing
upon the present study about the Development of Radio Frequency Identification (RFID) Door
Access System.
This section presents other related studies by the people who conducted studies similar to
the proponents that will also greatly help in the progress of the study. And it will also help the
understanding of the proposition.
Radio-Frequency Identification (RFID) is the wireless non-contact use of radiofrequency electromagnetic fields to transfer data, for the purposes of automatically identifying
and tracking tags attached to objects. Some tags require no battery and are powered and read at
short ranges via magnetic fields (electromagnetic induction). Others use a local power source and
emit radio waves (electromagnetic radiation at radio frequencies). The tag contains electronically
stored information which may be read from up to several meters away. Unlike a bar code, the tag
does not need to be within line of sight of the reader and may be embedded in the tracked object.
RFID tags are used in many industries. An RFID tag attached to an automobile during production
can be used to track its progress through the assembly line. Pharmaceuticals can be tracked
through warehouses. Livestock and pets may have tags injected, allowing positive identification
of the animal. Since RFID tags can be attached to clothing, possessions, or even implanted
within people, the possibility of reading personally-linked information without consent has raised
privacy concerns.

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

18

According to Umar F. et al, various schemes have been proposed and implemented to
successfully accomplish security tasks. S. Kadry & K. Smaili, developed a wireless attendance
management system that performs iris recognition for employee identification and transfers the
data to base station with the help of a PTR2000+ wireless module. P. Simao et al, developed a
wireless time attendance system which is based on fingerprint identification and ZigBee wireless
module. I1-Kyu-Hwang, et al, developed a novel system for access monitoring and control based
on digital door lock that uses ZigBee sensor network. Aysha Qaiser, Whai-De Chen, developed
an automatic attendance management system based on RFID devices with GSM interface.
S.Ramesh et al, developed a microcontroller based bank security system that continuously
monitors the sensors of the biometric system (Iris Scanner and Vein Detector), the keypad for the
authenticated codes (Unique Password and Registered Identification Number) and the output of
wireless motion detector. Basil Hamed, presented an access control system that uses Bluetooth
technology for Authorized Access Security System. The work leverage the use of ATMEL 89C55
microcontroller and visual basic program to build data logger which provides multiple accesses
to a protected area such as an office, home, or bank. The data logger was added to the system to
make records of users who accessed the system at any time. Bluetooth-enabled mobile phones
design is also proposed providing wireless and automatic unlocking. By using the proposed
system, a person with mobile phone can use it to get access to environments, such as buildings,
labs, rooms, etc. These systems discussed above, though efficient, do not present a cost effective
solution to the office automation problem. Some of these systems were implemented using
fingerprint module, GSM module, and wireless module which are costly.
Again, the use of automatic slide doors (such as slide doors, swing doors, folding doors,
revolving doors) has also been commercially produced. For its access control, the application of

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

19

Card reader (smart) card, Key pad (password), Shadow Access, and Biometric Access is still
evolving. This research focused on automatic slide door using wireless keypad because of its
simplicity and cost effectiveness. In our proposed EWiSECS, an embedded microcontroller is
programmed to accept password wirelessly and opens the door only when a valid password code
is supplied and activate an alarm when a wrong password ID is supplied more than three times.
For organizations, this design gives the users the opportunity to access the area only when a
demand code ID is valid.
Automatic Access Control Using Student ID Card Based on RFID Technology, the
automatic access control system evolves to prevent illegal entry of people into a building and
preventing unauthorized people from gaining access to certain organization resources. The door
locking system functions in real time, the door open as soon as the user scans the tag. The system
also stores the login and logout information of the user.
It notified an SMS and RFID Based Notification System enables parents to monitor the
presence of their children at a specific time. The time in and out of every student is generated
through scanning of their ID card at the gate followed by sending the SMS notification of the
attendance to their parents. Limitation of the system is that there is no acknowledgement
between the sender and the receiver.
RFID Based Exam Hall Maintenance System resolves the problem of students searching
for their examination halls and seating arrangements. The card reader is provided at the entrance
of the building. A student needs to swipe his tag in front of the reader at any hall and his hall and
seat number would be displayed on the LCD.

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

20

Related Local Studies


Far Eastern University (FEU) is one of the best educational institutions in the country
located along the University Belt area, is a nonsectarian, private university in the Philippines. It
was founded as a domestic educational institution in 1928 and incorporated in 193, being the 6th
oldest university in the Philippines and the 4th oldest private, non-sectarian university in the
country based on its extant university charter. FEU also is the first o implements a University
Wide Biometric Smart Card ID system aimed to enhance its security protocols. The FEU
community is required to be fingerprinted and photographed for the generation of the FEU
Biometric database that is integrated to gate computer terminals in which the Biometric ID is
scanned prior to entry to the university. The study focuses on the different aspects in the
Universitys Gate Entry System which involve the Biometric Smart Card ID, Security
International Conference on Computing, E-Learning and Emerging Technology & International
Conference on Advances in Computer, Electrical and Electronic Engineering - Sydney, Australia
policies for students, employees, faculty members and visitors, dress code, fair treatment of the
security guards. This research study is also in response to the Total Quality Management being
implemented in the school.
Related Foreign Studies
Application of RFID Technology in Libraries, RFID based library management saves the
library staffs time and energy by automating their task. Borrowing and returning of books are
automated using the check-in, check-out system which is RFID based. The limitation of the
system is that it is costly to implement.

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

21

Factors that motivated towards adopting of RFID based automatic attendance system in
schools in Nigeria are challenges that usually occur during manually taking attendance i.e.
writing and signing for students that are not physically present at the classroom by his friends,
taking attendance in a large class could be cumbersome where there could be many students
wanting to write and sign the attendance list at the same time, which could lead to tearing of the
attendance list or some students not being able to write down their names on the attendance list
before the end of the class. Also the lecturer can also misplace the attendance list. RFID
technology is implemented because it is cheaper, secured and easier compared to other
technologies.

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

22

Unit III
Methods and Procedures
This chapter presents the methods and procedures used in the development and
implementation of the project. The proponents also included the different materials used,
program algorithms, PCB designs and the design flow process in making the whole system.

Research Design
The development of an RFID based door access system is divided into two main parts;
the hardware and software. The hardware part consists of the RFID reader, tags, Arduino,
servomotors and the host computer. The software part is the host system application designed
using VB.net incorporated with Arduino IDE Environment and Microsoft access database.
Administrator can login into the system and check necessary information in the application,
which keeps a log of the ID, time and date of every student, staff and likes that enters the
premises of MCTI. It also can register new person using the tag ID of each tag. In connecting the
RFID reader to the PC, Arduino is incorporated by through the RS-232 (Serial Port) cable.

One of the important components of this project is software code. Software code of this
system taught Arduino Microcontroller to run this security system according to requirements.
Program coding also enables microcontroller to learn about the different devices that are attached
with it, their nature and purposes such as Servo Motor, LCD panel and Speaker. Program code is
also being used in this project for effective communications and fast processing between
hardware components that are connected to microcontroller such as RFID module with reader
antenna, and components on the breadboard such as Servo Motor, LCD panel and Speaker.

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

23

A RFID tag is given to each person in MCTI (which is embedded into their ID cards) and
this is scanned at the entrance by the reader. The RFID contains a unique code that is scanned by
the reader. On every scan the information about the person is taken and the date is displayed on
the user interface if the tag number matches that which is stored in the database.
The other important role that software is playing here is the security concerns. The
software has very strong security that is not easy to break and read the RFID tag numbers. These
numbers are being processed in the module but they are severely encoded. It is definitely not
easy to decode this encryption and read the tag numbers. This software is cleaver enough to
determine who is the authorized user and who is the unauthorized user and then it acts
accordingly. This software has another cool feature of displaying messages on the screen that is
connected with hardware. The formatting of the screen has been done neatly. There are no
difficulties one can have in order to read and understand the message of the screen. It is very user
friendly.
Research Environment
The study was conducted at the International Electronics and Technical Institute. The
school was the best location for the proposed study because school has a security protocol that
being followed by students and staff. One of the regulations when entering school building is you
has to wear complete uniform including IDs but there are times that it was never followed. Our
proposed study Development of Radio Frequency Identification (RFID) Door Access System
would be beneficial to the school because it will reduce threat from intruders and robbery entry.
Data gathering, documentation, project design testing, analysis and evaluation of the system all
took place in the school. Some sources of data were taken from equipment manual, internet
research, actual observation on the machine and production process.

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

24

Procedures
Data Gathering. The design of RFID Based Door Access System is
made from the modular component which is the RFID module, Door Access
Module, and microcontroller. The researcher is studying each component,
and able to design which will be simple, convenient and easy to use. The
researcher also gathering related data from local and foreign researcher and
use the data as a guide for making the prototype. The evaluation and results
of the data gathered will be recorded and studied. The design of the project
will be made based on the results.
Program Development. The design of program is based on the data
gathered from local and foreign studies. The researcher will be studying the
microcontroller programming. The programming software used is Adruino
IDE, using a Type-B USB cable connected from USB port of computer.
Prototype Design. The design of the prototype will be portable and
easy to install. The researcher studied the necessary materials to be used
like wiring and cables needed to be used in the interconnection of all
component, the hardware to be used and the programming language to
control the entire system.
Circuit Design. The design of the circuit is based on the result of the
data gathered. Creation of the circuit for the prototype will be done thru the
use of breadboard to reduce project cost and to correct the faults in the
design before placement in the enclosure.

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

25

Prototype Fabrication. The building of the actual prototype will be


made after the data gathering, program and development, prototype design,
and circuit design are completed. The actual component that is tested is now
layout to the enclosure.
.
Evaluation
Evaluation and reviewing a project is very critical for assessing the performance of the
project. The researcher used a method to provide information on the process to do what the
product is design and capable for. The result where used to compute for the weighted mean with
the corresponding formula:
WM = 5(f) + 4(f) + 3(f) + 2(f) + (f) TNR
Where:
WM = Weighted Mean
TNR = Total Number of respondents
f = Number of responses
Liker scale is a method of ascribing quantitative value to qualitative data. A numerical
value is assigned to each potential choice and a mean figure for all the responses is computed at
the end of the evaluation or survey. Used mainly in training course evaluations and market
surveys, Liker scales usually have five potential choices (strongly agree, above average, average,
below average, extremely poor) but sometimes go up to ten or more. The final average score
represents overall level of accomplishment or attitude toward the subject matter.
To view the result of the evaluation, Liker scale was used as shown in Table 1.
Table 1. Five Points Liker scale
Description
Strongly Agree

Scale
4.21 5.00

Rate
5

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

Agree
Fairly Agree
Disagree
Strongly Disagree
Design Concepts

3.41 4.20
2.61 3.40
1.81 2.60
1.00 1.80

26

4
3
2
1

The researcher compiled all the collected datas and information for the purpose of
documentation which it serves as a guide in making and developing a new system. The project
study aims to provide the Muntinlupa City Technical Institute with an accurate Radio Frequency
Identification Based Door Access System for recording the time in and time out of employees,
students and others. The researcher used his basic programming knowledge in coding the
program for the automatic execution of the process. Microsoft Visual Studio 2012 was the
software used by the researcher in programming using Visual Basic.NET. The researcher use
Visual Basic.NET as the front end and Microsoft Access 2007 as the back end of the project
study. This research and design involves technical knowledge and application of fundamental
principles in electronics. The development of this project Development of RFID Door Access
System will help the school to increasing the security efficiency and safety. The device includes
an electromagnetic lock module for selectively locking and unlocking a door in a door frame is
provided. The development of RFID door access system will control and synchronized the LCD
display, timer, and buzzer to alarm the person that he/she use his/her 3 attempts. The RFID Based
Door Access System uses different materials:
Radio Frequency Identification Reader for security purposes in entering in and out of the
school.
Radio Frequency Identification Card given to each students for they able to enter in and
out of the school.

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

27

Arduino Microcontroller: A microcontroller that can be attached with breadboard and


functioned accordingly. Its programmable and comes with its own programming language called
"Arduino IDE Environment" which is based on Java/Verilog/VHDL and mixture of other script
languages.
RFID Reader/Module: A microchip which can be attached to Arduino to enable radio
frequency identifications by generating magnetic fields. It can be used to read/write RFID
cards/tags/keys.
RFID Cards and Tags: These are the cards/tags that can be read by RFID Antenna and use as
security keys. They store globally unique digital key in them.
Breadboard: A board that helps creating electrical projects with electrical components. It is
being used to connect speaker and LCD panel with microcontroller.
Servo Motor: A motor that represents a function of door knob. This is an essential hardware
being used as an actual physical lock.
LCD Screen: A liquid crystal display screen which is being used to display message to users
about authorized and unauthorized attempts.
Resistors & LEDs etc: These are other electrical components which are being used in this
project.

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

28

Unit IV
Presentation and Discussion

This unit aims to clearly present the stages needed for the implementation of the
proposed system. The methods and procedures, the software requirements, hardware
requirements and additional resources needed in the project discussed in the section of the
research study. The step by step procedures provide better understanding of the proposed RFID
Door Access System, so that it implemented in Muntinlupa City Technical Institute (MIT).
Data Gathering
The design of RFID Door Access System made from the modular component
which is the RFID module, Arduino microcontroller as control center. The
researcher is studying each component, and able to design which will be
simple, convenient and easy to use. The researcher also gathering related
data from local and foreign researcher and use the data as a guide for
making the prototype. The evaluation and results of the data gathered is
recorded and studied. The design of the project is made based on the results.

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

29

Figure 11. Existing Design of Door Access System


Data Analysis. The researcher tabulated the specification of each target material and
compare each of them in terms of specifications required, availability and cost of each materials.

Servo Motor

40%

30%

30%

Option/Brand

Cost

Quality

Availability

Decision

1. BSM C-Series

85%

90%

90%

2. BSM N-Series

90%

85%

85%

80%

90%

85%

3. BSM

Stainless

Steel
Table 2. Data Analysis for Servo Motor

Table 2 shows the comparison of different brand their costing, quality and availability
and their percentage. BSM C Series will be used in developing the project because the cost is
cheaper, high quality and it is available in the market.

RFID
Reader

40%

30%

30%

Option/Brand

Cost

Quality

Availability

Decision

1. ACX

85%

80%

85%

2. Deek-Robot

90%

85%

85%

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

3. Promag
80%
Table 3. Data Analysis for RFID Reader

30

90%

85%

Table 3 shows the comparison of different brand their costing, quality and availability
and their percentage. RFID Deek Robot will be used in developing the project.
40%

30%

30%

Option/Brand

Cost

Quality

Availability

Decision

1. Mega ADK

80%

90%

85%

2. GizDuino

85%

90%

90%

3. Uno
90%
Table 4. Data Analysis for Microcontroller

85%

85%

Microcontroller

Table 4 shows the comparison of different brand their costing, quality and availability
and their percentage. E- Gizmo Microcontroller will be used in developing the project.

RFID ID

40%

30%

30%

Option/Brand

Cost

Quality

Availability

Decision

1. ACX

85%

80%

85%

2. Deek-Robot

90%

85%

85%

80%

90%

85%

3. Promag
Table 5. Data Analysis for RFID ID

Table 5 shows the comparison of different brand their costing, quality and availability
and their percentage. RFID ID Deek - Robot will be used in developing the project.

COMPONENTS
Microcontroller
RFID Reader
RFID Tag
LCD
Serve Motor

UNIT PRICE
850.00
750.00
25.00
450.00
550.00

QUANTITY
1
1
2
1
1

TOTAL PRICE (PHP)


850.00
750.00
50.00
450.00
550.00

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

Buzzer
350.00
LEDs
3.00
Micellaneous
1500.00
TOTAL COST
Table 6. Prices of Materials

1
10

31

350.00
30.00
1500.00
4530.00

Table 6 shows the costing of the materials used in developing the RFID Door Access
System. It shows that you can create a device in an affordable cost.
Design of the Project
The researcher provided a schematic diagram of different materials used in developing
the RFID Based Door Access System.

Figure 12. Schematic Diagram of Power Supply


The researcher provides a schematic diagram for Power Supply for us able to know how
much the Input and Output voltage needed for the project study.

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

32

Figure 13. Schematic Diagram of Reader Connection Circuit

Reader Connection Circuit provides different pins for the connection of RFID Reader to
RFID tag and other hardware requirements.

Figure 14. Schematic Diagram of Reset Push Button Circuit

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

33

Reset Push Button Circuit use in this study to reset or to erase the implemented codes to
RFID Reader so that you can make a new set of codes for the functionality of RFID Reader.

Figure 15. Schematic Diagram of Light Cystal Display (LCD)

Start

Read tag from the RFID reader

Figure 16. Schematic Diagram of Relay Circuit

Compare received tag ID with database system

Program Flow Chart


NO

Tag ID Match?

Access Denied
Door Lock Of

YES

Display User Information


Access Granted

NO
If User 3 Attempts?
Record the data in the database system

YES
Buzzer Alarm

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

34

Figure 17. RFID Door Based Access System Program Flowchart


Figure 17 show the process or the flow of the project, the interaction of both software
and hardware to each other. The objectives of this figure are to track the process and procedures
of the study and how it works as long as it is implemented.

Development
Interface. The Graphical User Interface (GUI) of the program for Radio Freqeuncy
Identification Based Door Access System was developed in C Language using Arduino
Software Applications for RFID Reader, servomotor, LCD Display and others.

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

35

Figure 18. Coding for RFID Reader, LCD Display and LEDs using Arduino

Interface. The 2nd Graphical User Interface (GUI) of the program for Radio Frequency
Identification Based Door Access System for communication the hardware requirements and
software requirements was developed in Microsoft Visual Studio 2010 / NET.

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

36

Figure 19. Microsoft Visual Studio 2010 Professional

Prototype. Based on the hardware description above, RFID automatic access control
system will turn to door access system mode as a default mode where this system in initial state
wait for the student to put their ID on the RFID reader. The LCD will display a message Place
your ID tag on the reader while waiting for an input from the RFID Reader. When the student
ID tag is place near to RFID reader, the reader can read student tag ID and further send the
student tag ID to the PIC microcontroller. After PIC microcontroller process the data, either this
student ID match on the ID where its being program inside the Microcontroller. If the
Microcontroller did not found the match ID tag, the LED will display User not found on the
LCD screen. After a few second, the LCD will display welcome note Place your ID tag on the
reader again.

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

37

Besides that, if the Microcontroller found the match ID tag, the tag ID will display on
LCD in decimal number and it show User Identified. At the same time, it will send the data to
the GUI program which it create using visual basic 2010 to record the student ID, name, date and
the time at database system through USB serial communication. After a few second, the LCD
will display the welcome note Place your ID tag on the reader again. It will repeat
continuously. Lastly, the admin can check the record of user time in and time out when they
access the door at GUI program.

Figure 20. Installation and Testing of the RFID Reader

Evaluation
To be able to know the effectively, accuracy and efficiency of the RFID Based Door
Access System, the researcher created a survey that was filled out by the students, teachers and

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

38

personnel of Muntinlupa City Technical Institute. The proponent showed to them the prototype
of the study.
Table 7. Tabulation of User Evaluation
5

Description

1
WM

Security

F W

W f

only authorized users can only 4

20

16

15

20

and easy to use. Easy to 5

25

W F W

a. Guaranteed security and


4.2

Agree

28

4.3

Agree

24

4.4

Agree

16

4.4

Agree

4.325

Agree

access the system.


b. Provide security to the
users.
Functionality
c. Provide accurate
information. Maintain
consistency and reliability.
Usability
d. The system is user-friendly

understand the process.


Overall Mean

Summary of findings
Based on the results that the researcher gathered, the software Development of Radio
Frequency Identification (RFID) Door Access System was successfully developed. This system

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

39

should be able to minimize the technical human error during secured gate access. Besides, the
system also helps user to use paperless environment and save the time.
Listed below is the summary of findings:

The RFID Door Access System provides security to the people who are coming in and out of
Muntinlupa City Technical Institute.

The system ensures restriction of unauthorized individual from entering the premises of
Muntinlupa City Technical Institute.

The system monitors the accurate time of individuals who are entering and leaving the premises
of Muntinlupa City technical Institute.

The RFID Door Access System is reliable, usable, and accurate.

Unit V
Conclusions and Recommendations

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

40

Conclusions

The study was set out to explore the concept of the development of Radio Frequency
Identification Based Boor Access System and specifically:

1. The proposed system can be applied for real time recording of the people who enter the
building. It can automatically record all the basic information including name, time of
their both in and out, and ID number etc.
2. The proposed system is an access control system. Only the person who has the authorized
key tag or Radio Frequency Identification (RFID) card can gain access into the place.
Thus, by taking advantage of this system, security of the building will no longer be a
problem.
3. The system has the ability for data back-up, recovery and tags replacement. A userconfigurable timeable can be generated automatically by the software. In that timeable,
entry times and exist times can be view and edit in the user interface, which gives high
reliability with low maintenance cost.
4. The system is reliable, usable and accurate. It can saves time in monitoring activities
inside the premises of Muntinlupa City Technical Institute.

Recommendations
With the positive effect of Trim Relay Checker integration to CAT4104 probe card, the
researcher recommends the following:

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

41

1. The researcher recommends to improve the system by adding other functionalities such
as it can be used as library card that make the system more useable to the user.

2. To the Muntinlupa City Technical Institute identify the hardware requirements and
software requirements of the project study as well as they need to be familiar to the
execution and implementation of the project study.
3. To the end users of this project continue to give feedback about its performance and
recommend ways that can further enhance this project. Be the critic to make it more
reliable to use and to fit your needs.
4. Lastly, the researcher recommends implementing the proposed Development of Radio
Frequency Identification (RFID) Door Access System that would be beneficial for
Muntinlupa City Technical Institute at a very competitive cost.

References

Goodrum, P., McLaren, M., Durfee, A. (2006) The application of active radio
frequency identification technology for tool tracking on construction job sites. Automation in
Construction.

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

42

Shepard, S. (2005)RFID Radio Frequency Identification, USA,ISBN: 0-07-144299-5,


Retrieve from
http://www.e-gizmo.com/KIT/gizDuino%20IOT644.html

Weinstein, R., (2005) "RFID: a technical overview and its application to the enterprise,"
IT Professional.

Xiao, Y., Yu, S., Wu, K., Ni, Q., Janecek., C., Nordstad, J, (2007) entitled Radio
frequency identification: technologies, applications,and research issues, Retrieve May 2007
from Wiley Journal of Wireless Communications and Mobile Computing.

Yu-Chih Huang; (2009) Secure Access Control Scheme of RFID System Application,
Fifth International Conference on Information Assurance and Security.

Zeydin Pala and Nihat Inan of RFID Eurasia, (2007) entitled Smart parking application
using RFID technology

Zhang, L., (2005). An Improved Approach to Security and Privacy of RFID


application System, Wireless Communications, Networking and Mobile Computing.
International
Conference.

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

Appendix A
Letter of Transmittal
March 2015
Dr. Guillermo M. Rago, Jr.
Dean, College of Engineering
Manuel S. Enverga University Foundation

43

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

44

Lucena City

Dear Sir,
This project study is entitled Development of a RFID Based Door Access System
which serves as partialfulfillment of the requirements for the degree Bachelor of Science in
Computer Engineering or CPEP5521- CPE Project, for the S.Y. 2014-2015.
Given the requirements needed, I was able to create the desired circuit and upon
implementing the conceptualized circuitry, I was able to justify whether the project was properly
working through validation and testing.
With your kind consideration, I hope that this design will satisfy your requirements. Any
observed correction and recommendation would be noted with appreciation.
Respectfully yours,

Emerson B. Arcita

Appendix B
RFID BASED DOOR ACCESS SYSTEM ASSESMENT
Students

Personnel

Teachers

Others (specify)____________________________

Instruction: Please answer each question/statement with numbers from 1 to 5

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

45

5. Strongly Agree 4. Agree 3. Neither Agree nor Disagree 2.Disagree 1. Strongly Disagree
Security
_____a. Authorized users can only access the system.
_____b. Is the users are secured.
Functionality
_____c. Functional accuracy provided.
Usability (User friendliness)
_____d. The RFID Based Door Access System Graphical User Interface is easy to understand.
Comments

Suggestions

______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________

Appendix C
Project Timeline

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

Appendix D
Pins of Arduino
/*

46

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

pins_arduino.h - Pin definition functions for Arduino


Part of Arduino - http://www.arduino.cc/

Copyright (c) 2007 David A. Mellis

This library is free software; you can redistribute it and/or


modify it under the terms of the GNU Lesser General Public
License as published by the Free Software Foundation; either
version 2.1 of the License, or (at your option) any later version.

This library is distributed in the hope that it will be useful,


but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.

You should have received a copy of the GNU Lesser General


Public License along with this library; if not, write to the
Free Software Foundation, Inc., 59 Temple Place, Suite 330,
Boston, MA 02111-1307 USA

$Id: wiring.h 249 2007-02-03 16:52:51Z mellis $

Changelog

47

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

48

----------11/25/11 - ryan@ryanmsutton.com - Add pins for Sanguino 644P and 1284P


07/15/12 - ryan@ryanmsutton.com - Updated for arduino0101
08/08/14 - e-GizmoMechatronixCentral - Updated for Gizduino + v3.0 SoftwareSerial (line 75
- 79)
08/22/14 - IOT644 marker added
*/

#ifndef Pins_Arduino_h
#define Pins_Arduino_h

#include <avr/pgmspace.h>

#define IOT644 1

#define NOT_A_PIN 0
#define NOT_A_PORT 0

#define NOT_ON_TIMER 0
#define TIMER0A 1
#define TIMER0B 2
#define TIMER1A 3
#define TIMER1B 4

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

#define TIMER2 5
#define TIMER2A 6
#define TIMER2B 7

#define TIMER3A 8
#define TIMER3B 9
#define TIMER3C 10
#define TIMER4A 11
#define TIMER4B 12
#define TIMER4C 13
#define TIMER5A 14
#define TIMER5B 15
#define TIMER5C 16

static const uint8_t SS = 10;


static const uint8_t MOSI = 11;
static const uint8_t MISO = 12;
static const uint8_t SCK = 13;

static const uint8_t SDA = 25;


static const uint8_t SCL = 24;
static const uint8_t LED = 22;

49

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

50

static const uint8_t A0 = 14;


static const uint8_t A1 = 15;
static const uint8_t A2 = 16;
static const uint8_t A3 = 17;
static const uint8_t A4 = 18;
static const uint8_t A5 = 19;
static const uint8_t A6 = 20;
static const uint8_t A7 = 21;

#define digitalPinToPCICR(p)

(((p) >= 0 && (p) <= 31) ? (&PCICR) : ((uint8_t *)0))

#define digitalPinToPCICRbit(p) (((p) <= 7) ? 3 : (((p) <= 13) ? 1 : (((p) <= 21) ? 0 : (((p) <= 23)
? 1 : 2))))
#define digitalPinToPCMSK(p)

(((p) <= 7) ? (&PCMSK3) : (((p) <= 13) ? (&PCMSK1) : (((p)

<= 21) ? (&PCMSK0) : (((p) <= 23) ? (&PCMSK1) : (((p) <= 31) ? (&PCMSK2) : ((uint8_t
*)0))))))
#define digitalPinToPCMSKbit(p) (((p) <= 7) ? (p) : (((p) <= 13) ? ((p) - 6) : (((p) <= 21) ? ((p) 14) : (((p) <= 23) ? ((p) - 22) : ((p) - 24)))))

// On the ATmega1280, the addresses of some of the port registers are


// greater than 255, so we can't store them in uint8_t's.
// extern const uint16_t PROGMEM port_to_mode_PGM[];
// extern const uint16_t PROGMEM port_to_input_PGM[];
// extern const uint16_t PROGMEM port_to_output_PGM[];

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

// extern const uint8_t PROGMEM digital_pin_to_port_PGM[];


// extern const uint8_t PROGMEM digital_pin_to_bit_PGM[];
// extern const uint8_t PROGMEM digital_pin_to_bit_mask_PGM[];
// extern const uint8_t PROGMEM digital_pin_to_timer_PGM[];

// ATMEL ATMEGA644P / SANGUINO


//
//

+---\/---+

// INT0 (D 0) PB0 1|

|40 PA0 (AI 0 / D31)

// INT1 (D 1) PB1 2|

|39 PA1 (AI 1 / D30)

// INT2 (D 2) PB2 3|

|38 PA2 (AI 2 / D29)

// PWM (D 3) PB3 4|

|37 PA3 (AI 3 / D28)

// PWM (D 4) PB4 5|

|36 PA4 (AI 4 / D27)

// MOSI (D 5) PB5 6|

|35 PA5 (AI 5 / D26)

// MISO (D 6) PB6 7|

|34 PA6 (AI 6 / D25)

// SCK (D 7) PB7 8|

|33 PA7 (AI 7 / D24)

//

RST 9|

|32 AREF

//

VCC 10|

|31 GND

//

GND 11|

|30 AVCC

//

XTAL2 12|

|29 PC7 (D 23)

//

XTAL1 13|

|28 PC6 (D 22)

// RX0 (D 8) PD0 14|

|27 PC5 (D 21) TDI

51

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

// TX0 (D 9) PD1 15|

|26 PC4 (D 20) TDO

// RX1 (D 10) PD2 16|

|25 PC3 (D 19) TMS

// TX1 (D 11) PD3 17|

|24 PC2 (D 18) TCK

// PWM (D 12) PD4 18|

|23 PC1 (D 17) SDA

// PWM (D 13) PD5 19|

|22 PC0 (D 16) SCL

// PWM (D 14) PD6 20|

|21 PD7 (D 15) PWM

//

52

+--------+

//
#define NUM_DIGITAL_PINS
#define NUM_ANALOG_INPUTS

32 //24
8

#define analogInputToDigitalPin(p) ((p < NUM_ANALOG_INPUTS) ? (p) + 14 : -1)//((p < 7) ?


(p) + 24 : -1)

#define digitalPinHasPWM(p)
10 )

#define PA 1
#define PB 2
#define PC 3
#define PD 4
#define PE 5
#define PF 6
#define PG 7

((p) == 4 || (p) == 5 || (p) == 6 || (p) == 7 || (p) == 9 || (p) ==

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

#define PH 8
#define PJ 10
#define PK 11
#define PL 12

#ifdef ARDUINO_MAIN
// these arrays map port names (e.g. port B) to the
// appropriate addresses for various functions (e.g. reading
// and writing)
const uint16_t PROGMEM port_to_mode_PGM[] =
{
NOT_A_PORT,
(uint16_t) &DDRA,
(uint16_t) &DDRB,
(uint16_t) &DDRC,
(uint16_t) &DDRD,
};

const uint16_t PROGMEM port_to_output_PGM[] =


{
NOT_A_PORT,
(uint16_t) &PORTA,
(uint16_t) &PORTB,

53

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

(uint16_t) &PORTC,
(uint16_t) &PORTD,
};
const uint16_t PROGMEM port_to_input_PGM[] =
{
NOT_A_PORT,
(uint16_t) &PINA,
(uint16_t) &PINB,
(uint16_t) &PINC,
(uint16_t) &PIND,
};
const uint8_t PROGMEM digital_pin_to_port_PGM[] =
{

PD, /* 0 */
PD,
PD,
PD,
PD,
PD,
PD,
PD,
PB, /* 8 */

54

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

PB,
PB,
PB,
PB,
PB,
PA, /* 14 */
PA,
PA,
PA,
PA,
PA,
PA,
PA,
PB, /* 22 */
PB,
PC, /* 24 */
PC,
PC,
PC,
PC,
PC,
PC,
PC /* 31 */

55

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

};
const uint8_t PROGMEM digital_pin_to_bit_mask_PGM[] =
{
_BV(0), /* 0, port D */
_BV(1),
_BV(2),
_BV(3),
_BV(4),
_BV(5),
_BV(6),
_BV(7),
_BV(2), /* 8, port B */
_BV(3),
_BV(4),
_BV(5),
_BV(6),
_BV(7),
_BV(0), /* 14, PORT A */
_BV(1),
_BV(2),
_BV(3),
_BV(4),

56

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

_BV(5),
_BV(6),
_BV(7),
_BV(0), /* 22, PORT B */
_BV(1),
_BV(0), /* 24, port C */
_BV(1),
_BV(2),
_BV(3),
_BV(4),
_BV(5),
_BV(6),
_BV(7)
};
const uint8_t PROGMEM digital_pin_to_timer_PGM[] =
{
NOT_ON_TIMER,

/* 0 - PD0 */

NOT_ON_TIMER,

/* 1 - PD1 */

NOT_ON_TIMER,

/* 2 - PD2 */

NOT_ON_TIMER,

/* 3 - PD3 */

TIMER1B,

/* 4 - PD4 */

TIMER1A,

/* 5 - PD5 */

TIMER2B,

/* 6 - PD6 */

57

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

TIMER2A,

/* 7 - PD7 */

NOT_ON_TIMER,

/* 8 - PB2 */

TIMER0A,

/* 9 - PB3 */

TIMER0B,

/* 10 - PB4 */

NOT_ON_TIMER,

/* 11 - PB5 */

NOT_ON_TIMER, /* 12 - PB6 */
NOT_ON_TIMER, /* 13 - PB7 */
NOT_ON_TIMER, /* 14 - PA0 */
NOT_ON_TIMER, /* 15 - PA1 */
NOT_ON_TIMER,

/* 16 - PA2 */

NOT_ON_TIMER, /* 17 - PA3 */
NOT_ON_TIMER, /* 18 - PA4 */
NOT_ON_TIMER, /* 19 - PA5 */
NOT_ON_TIMER, /* 20 - PA6 */
NOT_ON_TIMER, /* 21 - PA7 */
NOT_ON_TIMER, /* 22 - PB0 */
NOT_ON_TIMER, /* 23 - PB1 */
NOT_ON_TIMER, /* 24 - PC0 */
NOT_ON_TIMER, /* 25 - PC1 */
NOT_ON_TIMER, /* 26 - PC2 */
NOT_ON_TIMER, /* 27 - PC3 */
NOT_ON_TIMER, /* 28 - PC4 */
NOT_ON_TIMER, /* 29 - PC5 */

58

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

NOT_ON_TIMER, /* 30 - PC6 */
NOT_ON_TIMER

/* 31 - PC7 */

};
#endif
#endif

Appendix E
Datasheet of GizDuino IOT - 644

59

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

60

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

61

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

62

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

63

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

64

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

65

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

66

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

67

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

68

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

69

EMERSON BAYANI ARCITA


753 Cupang, Muntinlupa City
Email address: luke8lance23@yahoo.com
Objectives:

To obtain a career where I can contribute to the companys growth

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

70

While enhancing my skills and develop my potential as a person.


Educational Attainment:
College

Manuel S. Enverga University


Lucena city Quezon province

Tertiary

IETI College, Alabang Muntinlupa City


Electronic System Technician 2 Years (1998-2001)

Secondary

Ramon Pascual Institute


1990-1994

Primary

Buli Elementary School


Buli, Muntinlupa City (1994-1998)

Trainings:
Computer System servicing NC2

Lakewood School of Alabang

Advance Laptop Repair and Servicing


(Board/chips level repair)

Bongalink.net (computer repair servicing)


December 2010

CISCO (ICND1 & ICND2)


Interconnecting Device
Cellphone Repair

Tekguru Carrer Development, Las Pias


December 2011-March 2012
Muntinlupa City Technical Institute (MCTI)
April to June 2011
Muntinlupa City Technical Institute (MCTI)
October to December 2010

Advance Computer
Basic Computer

Muntinlupa City Technical Institute (MCTI)


January to March 2009

Audio Video Servicing

Tesda Manpower
October to Dec 2003

Consumer Electronics

TESDA Manpower
July to Sept 2003

Other Qualification:
Assessors Qualification
Trainers Qualification

TESDA Main, Taguig City


February 28, 2011

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

National Certificate II

71

Christ the King


January 09, 2010

Assessors Methodology
Trainers Training Methodology

College

TESDA Main, Taguig City


December 05,2010

Personal Data:
Birth Date:
Birth Place:
Age:
Gender:
Civil Status:
Name of Spouse:
Nationality:
Height:

February 02, 1977


Cupang, Muntinlupa City
39years old
Male
Married
Jona Laureaga Arcita
Filipino
5 9

Working Experience:
September 2011-Present

TESDA,Taguig

May 18, 2009-Present

MCTI-TESDA
Trainor

Sep 10,08-Apr 18,09


Technical Support

Go Fluent IBM

Aug 13,05-Aug 30,07


Technician

Ayala Alabang

Feb 8,02-Aug 13,05


Technician

E. A. Electronics Service

Computer Hardware Servicing


Accredited Assessor
Computer Hardware Tech.,
Computer Hardware
Audio-Video Service
Audio-Video Head

Center
Skills:
-

Can speak, write and understand English Language well


Computer Literate
Can repair computer trouble shootings
Can work with minimum supervision of superior without time and distance limitations

Character References:

DEVELOPMENT OF A RFID BASED DOOR ACCESS SYSTEM

72

Hon. Celso Dioko

Chairman
Barangay Cupang, Muntinlupa City

Natividad Garces

Admin Officer
MCTI-TESDA, Putatan Muntinlupa City

I hereby pledge that the above information given above are true and correct to the best of
my knowledge and beliefs.

___________________________
Applicants Signature

Вам также может понравиться