Академический Документы
Профессиональный Документы
Культура Документы
Presented by:
ALVAREZ JR., Angel N.
RAGUINDIN, Jardine Davis D.
RIGOR, Paul Kenneth V.
SANTOS, Mark Angelo
ZULUETA, Jeffery Johns
Section B3
i
TABLE OF CONTENTS
Title Page………………………………………………………………………………...i
Table of Contents………………………………………………………………….…….ii
List of Tables…………………………………………………………………………....iii
Chapter
I. INTRODUCTION
Background of the Study………………………………………………. 1
Statement of the Problem………………………………………………. 2
Significance of the Study………………………………………………. 2
Objective of the Study…………………………………………..……... 3
Scope and Delimitations of the Study……………………..……………3
III. METHODOLOGY
Research Design………………………………………………………...12
The Subjects…………………………………………………………..... 12
Data Gathering Instruments……………………………………………. 12
Data Gathering Procedure…………………………………………….... 13
Procedure………………………………………………………………. 15
System Design…………………………………………………………..16
System Flow…………………………………………………………… 17
Statistical Treatment…………………………………………………… 18
REFERENCES…………………………………………………………………….…...20
ii
LIST OF TABLES
iii
CHAPTER 1
INTRODUCTION
Technologies nowadays are advanced and many countries have switched from
manual system to electronic machines. Different devices are invented for the betterment
of humanity and one of its benefits is security. Security has always been a major issue in
our society. Cases of vandalism, robbery and trespassing are now just common
being entirely secured. Even the most high-tech security systems proved to be vulnerable
to malicious intents. That is why most business establishments invest highly on security.
And when it comes to security, most progressive countries use biometric locks, an
alternative to manual and card locks to secure homes and offices, as well as business
establishments. One of the most the most frustrating things to realize is when someone
has forgotten his keys, locked himself out of his house, had them lost or stolen, or that an
For instance, when a room is restricted and only authorized personnel are allowed
to get in, monitoring such rooms is difficult considering that the room should be opened
for easy access to those persons. In some establishments like schools, they have routine
access to rooms that should be locked and opened at a certain hour or at the next hour.
This is done mostly by janitors, security guards or employees in which oftentimes they
1
forget to do because they have other tasks to do. This scenario is evident at Mapúa
From this, the group has come up with an idea of developing an automated
security room lock with fingerprint identification that will eliminate the aforementioned
problems. This system will be designed for the purpose of securing school classrooms
and facilities, wherein theft, vandalism, and trespassing are prevalent. Through the
technology of biometrics, embedded system circuit design and computers, this system
The main problem of this study is to develop an automated room security lock
that will integrate fingerprint identification to improve the security in classrooms and
Specific Problem:
facilities, especially those containing high-tech equipments which are very much subject
to theft and vandalism like audio visual rooms and laboratories. Security personnel’s
tasks will be reduced significantly since the proposed system requires very minimal
human intervention and is actually almost a substitute to guards and padlocks; thus they
2
could have more time in doing other essential tasks. Unauthorized use of facilities will
be prevented because only permitted person/s will be able to lock or unlock the right
room at the right time. Lastly, the study will be a helpful reference for researchers for
The main objective of this study is to develop an automated room security lock
that will integrate fingerprint identification to improve the security in classrooms and
Specific Objective:
identification of the user requesting access to a certain room. The history of room users
and their room usage times are kept track through a computer interfaced to the device.
The number of actual occupants in a room is not counted; only the information of the
Authorization of room entry is possible only through the fingerprint of the user to
automate the locking or unlocking of the room. In case of power interruption, system
3
malfunction will occur. In this case, tampering of the device will be necessary if
room. Theft and vandalism are most probable when unauthorized room entry is allowed;
therefore prevention of unauthorized room access should be observed at all costs. These
cases are also possible for authorized entries, but these are easily resolved since room
users are kept track and are easily held liable when something undesirable happens to the
room.
4
CHAPTER 2
The article entitled, “The State of the Biometric Industry: The Search for Security
America (2001), discussed the prevalent industry of biometrics. The author said
“biometrics apply to a broad range of electronic techniques that use unique physical
considered the domain of James Bond films or ultra sensitive military installations.
However, the current range of its application is now rapidly increasing that is why more
organizations whether from the government, school, or business districts need it for
positive identification.”
The use of biometric devices falls into 2 main categories: law enforcement
One of the primary drivers for biometrics is its ability to provide a viable
extremely weak form of authentication. In fact, up to 50% of costly help desk calls are
5
Authentication by biometric verification is becoming increasing common in
corporate and public security systems, consumer electronics and point of sale (POS)
applications. In addition to security, the driving force behind biometric verification has
been convenient.
Circumventio
Collectability
Acceptability
Performance
Permanence
Universality
Uniqueness
Biometrics
n
Face H L M H L H L
Fingerprint M H H M H M H
Hand veins M M M M M M H
Iris H H H L H L H
Retinal scan H H M L H L H
Signature L L L H L H L
Voice M L L M L H L
Table 1 shows a comparison of existing biometric devices. A.K. Jain ranks each
biometric device based on the categories as being low, medium or high. A low ranking
category indicates poor performance in the evaluation criterion, whereas high ranking
6
2. Uniqueness: how well the biometric separates individually from another
Furthermore, a biometric device that uses fingerprints show more pleasing results
among the rest. Other than the parameters stated in the table the researchers shoes a
fingerprint over other biometrics because of its cost and portability. A finger print
scanner can be easily installed and integrated to a program based from its application. It
is cost efficient and acceptable by the industry. While all types of biometrics are likely to
grow as cost reduced, technology improves and demand increases, fingerprint scanning
will continue to hold the largest market share and offers the best trade-off between cost
and reliability/user-friendly.
The promise of biometrics combines both security and convenience because the
user does not have to carry any additional device or remember a static pin. Examples
from specific vertical markets have shown significant demand for biometrics to date that
provide perfect illustrations. On financial services, it is faster and simpler for traders on a
hectic trading floor to log into the network with a fingerprint scanner than having to
remember or enter a 6-digit password. For healthcare, the primary object is to enable
7
quicker they are in and out of the network, the sooner they can care for patients. Both of
these examples also show how organization can justify an investment in biometric
solutions if users can execute more transactions per day or visit with more patients per
day.
Peter Burgess stated in 2001 that biometrics promise both security and
convenience. The use of such device proposes a viable solution to an efficient means on
device that the researchers can start to work with. It offers a better trade-off between cost
and reliability. Based form the studies and articles that the researchers have gathered, a
system basically a finger print scanner interfaced with a computer software to control a
door (locking or unlocking) can be a good design which can be an innovation on old
fashioned doors.
Related Studies
The PIC-based door lock system designed by A. Bitoon, et.al., (September 2003),
stated that, “PIC-based door lock system provides a means of replacing old fashioned
locks using keys by means of sensors and readers. With this door lock system homes and
establishments can avail of better safety and security. It uses components such as a
8
keypad for password input and Programmable Integrated Circuit microcontroller as to
Another study was done by S. Viscusi (2006) which is the Sequiam Biometric
Door Lock. The Biometric Deadbolt lock aside from being a standalone lock replaces the
use of keys to enter a room. This provides an authorized entry to prevent intruders to
uniquely solves the problems of homeowners in securing their homes while having
Based on this study, the writers learned that microcontroller can also be used as a
device for locking and unlocking doors. This concept gave the researchers the idea to
create a device that will enable automatic locking and unlocking of door that can be used
in homes and establishments that can avail of better safety and security.
Conceptual Framework
fingerprint
identification power interruption room security
system
9
Hypothesis
Definition of Terms
Automated Security Room Lock is a security device that has an ability to manage the
registered users directly on the lock and will allow you to see who came in and what
time.
Automated Lock System is a technique that uses biometric lock on doors to systematize
Biometric Deadbolt Lock is a security device that uses a bolt that is operated directly by a
Embedded System Circuit Design is a computer system designed to perform one or a few
Key Lock System is the technique that uses keys as instrument to unlock and lock doors.
electronic device (as a home appliance) or system. (Merriam Webster Dictionary, 1971)
Password is a secret word or phrase that somebody must use to gain entry to a place.
10
Programmable Integrated Circuit (PIC) contains circuits whose logical function and
connectivity can be programmed by the user, rather than being fixed by the integrated
circuit manufacturer.
11
CHAPTER 3
METHODOLOGY
Research Design
The research design that the researchers will use will be experimental design,
specifically two-group design. This design will be the most appropriate because two
In this study, the traditional key-locked doors will serve as the control group since
it has been used or existed for quite a long time. On the other hand, the automated room
security lock with fingerprint identification will serve as the experimental group since it
The Subjects
The major subject of our research will be the whole population of Mapua Institute
of Technology, specifically the professors and students. Since the research focuses on
improving the security of equipments and other facilities of the institution, students and
professors who mainly use the different facilities will be of much benefit. In addition, the
security personnel of the institution will perform more efficiently as they will be helped
The researchers will use observation scheduled in a certain span of time for
gathering the data. This method will prove whether the installation of the automated room
12
security lock with fingerprint identification will really improve the security of different
Having the equipment installed, the researcher will secure a written permit from
the administration to allow them to conduct the study in Mapua Institute of Technology.
After the approval of the permit, in cooperation with the security staff of the institution,
all unauthorized room accesses as well as theft and vandalism (if there’s any) will be
recorded from rooms with the traditional key-lock system and with the automated room
security lock with fingerprint identification system. The frequency for all violations
occurred in each classroom in a span of three months or one whole term will be recorded
and totaled.
After the retrieval of enough data, the researchers will tabulate and process the
Table 2: Sample Table for the Occurrence of Theft, Robbery and Similar
1 x1 x1 - x1 (x1 - x1 )2 x2 x2 - x2 (x2- x2 )2
13
5
10
11
Total
The previous table will be used for the tabulation of all the data that would be
14
Procedure
START
Yes
END
15
System Design
16
System Flow
START
Is the fingerprint
Yes
authorized to access
the room at that time?
No Is there a power
interruption?
Yes
END
17
Statistical Treatment
The statistical technique used in analyzing and interpreting the data and testing
For this technique, the weighted arithmetic mean of the experimental and control
group will be determined in order to discern the frequency of theft, robbery, vandalism
and the like,. The formula to be used is as follows: (Calmorin and Calmorin, 2010)
+ +⋯…… ∑
= =
+ +⋯…… ∑
where, x stands for the weighted arithmetic mean, ∑ fx , sum of the products f times x
where f, frequency of each option and x, weight of each option; and ∑ f, sum of the
Also, the researchers will solve for the variance of the each variable through the
formula:
∑( − )
=
−
where, SD2 stands for the variance, N as the total number of operations for the variable.
T-test was used to determine the significant difference between on the occurrence
of robbery, theft, vandalism of different equipments inside a classroom with a key lock
security system and the automated lock security system . The t-value will be computed by
−
=
+
18
where, x1 stands for the mean of the first variable (key-lock system), x2 , mean of the
second variable (automated lock system); SD12, variance of x1 , SD22, variance of x2 ; N1,
total; number of operations of the first variable and N2, total number of operations of the
second variable.
In this connection, the researchers will use 5 percent level of probability with 95
19
REFERENCES
Burgess, Peter. The State of Biometric Industry: The Search for Security and
20