Security Access Control System For College of Engineering Laboratories"
Security Access Control System For College of Engineering Laboratories"
Security Access Control System For College of Engineering Laboratories"
In Partial Fulfillment
of the requirements for the Degree
of Bachelor of Science in
Electronics Engineering
Submitted by:
BSECE 5D
Page | 1
REPUBLIC OF THE PHILIPPINES
BULACAN STATE UNIVERSITY
CITY OF MALOLOS, BULACAN
COLLEGE OF ENGINEERING
APPROVAL SHEET
Engr. Jenette Centeno Engr. Dennis Dela Cruz Engr. Mervin Albalate
Mentor Mentor Mentor
Accepted in partial fulfillment of the requirements for the degree of Bachelor of Science in
Electronics Engineering.
It is our genuine pleasure to express our deepest gratitude to our parents for
Page | 2
and financially, and for their unconditional love and understanding throughout our research
period.
We would also want to express our deep appreciation to our adviser, Engineer Dion
Michael Mendoza for constant support and timely suggestions, for without his guidance and
It is our privilege to thank our subject professor, Engineer Albert Ian Javier for the
Moreover, we would also want to acknowledge our English adviser, Mr. Issachar
Dela Cerna for his generous and valuable help in editing this paper.
Also, we owe a debt of gratitude to all of our colleagues and loved ones who serve
inspiration and to all those who gave their beneficial contributions for the success of this
undertaking.
Last but not the least, we would like to give all the praises to Almighty God for
giving us love, life, blessings, strength, wisdom, guidance and good health to withstand all
the trials that we encountered to complete this research. From Him we owe all that we have
ABSTRACT
inside its premises. As of today, according to the head of security personnel and tools and
In the laboratory rooms of BSU’s College of Engineering, the said rooms are
still locked with the simple metallic lock and key. The trend of technology in security has
been continuously evolving with increase in surveillance, motion and sound detection and
Page | 3
recording, wireless access, and data feeding. But the technological increase in security can
be very costly and/or inefficient, and the result may vary from cost-effective to a waste of
College of Engineering with regards to security. The existing solution, however, can be
improved with the increase of security access wireless data feed. This study focuses not only
in security access, but also to instantaneous transfer of data by utilizing the RF (Radio
Frequency) technology. Initially, the authorized person who wishes to access the laboratory
room must present his/her RFID tag to the RFID reader in front of the door. After tapping
his/her respective tag, the PC of the faculty in College of Engineering receives notification
that an authorized person has accessed the laboratory room. Thus, this study aids to increase
TABLE OF CONTENTS
Page | 4
Chapter II: Theoretical Framework
2.1.1. RFID 7
i. RFID Components 9
v. Applications 14
2.1.2. Microcontroller 15
i. Programming 24
Page | 5
3.3. Project Specification 29
3.3.3. Relay 32
3.3.8. RF Transceiver 37
3.3.9 PC 39
Page | 6
4.4.1. Tools 49
4.4.2. Equipment 56
5.2.4. Summary 67
5.2.4. Capabilities 70
5.2.4. Limitations 71
5.6. Maintenance 72
6.1. Summary 74
6.2. Conclusion 75
6.3. Recommendations 76
Page | 7
CHAPTER 1
INTRODUCTION
This chapter discusses the background of the project, general and specific objectives,
Automated monitoring systems are becoming the trend. It is an undeniable fact that
Bulacan State University’s College of Engineering has been left behind in this
at today’s academic institutions face a common set of business challenge in security system.
Without the presence of security personnel, monitoring who is liable for the
misplacement and loss of things inside a laboratory room would be a difficult task; having a
door locked is the only means of securing the room. There are scenarios of postponement of
laboratory experiments due to the absence of some equipment, unaware where the keys are
and who was the last one who used the laboratory rooms. “At the end of the day, the goals
technology that lets objects to be identified using electromagnetic energy. This type of
technology will eliminate the use of keys and make it handier for the authorize person,
particularly, for the professors. Arduino, on the other hand, is an open-source prototyping
platform based on an easy-to-use hardware and software. It has been the main platform of
proposed dissertation.
Page | 8
Biometrics, smart cards, Bluetooth access controls are just a few of the latest
innovation of improving the technology of security. This research intends to apply the
University. The research will immensely tighten the security and reduce the chance of
Security is one, if not the most, profound concerns in our daily venture. Being a main
part of a security system, access control system which controls the entryway of a building, or
a closed area like houses or rooms where valuable possessions are found should be given a
great consideration.
art of robbing. Yet, the research to improve security locks is still vast, broad and only differs
to the technology used (Biometric Door Entry Control System, Cappellano and Freed 2002;
Door Access Using Smart Card, Foo Tze Yaw 2004; Bluetooth Access Control,
Mehlomakulu 2010). However, with regards to application, it is a known fact that even up to
this 20th century, people widely choose to use security locks using the simplest of locks: the
metallic lock and key. A simple lock and key, though, would not suffice the security needed
to protect properties.
Going after the old-fashioned locks for their convenience and this being an old habit
has proven to have an enormous number of drawbacks which make a supposedly secured
room vulnerable, considering that these locks can now be opened conventionally with
skillset from lock-pickers or by means of lock-picking tools. Another fact is that the key,
which only opens to a specific lock, can be duplicated even through unauthorized means.
Not to mention that keys are likely to be lost and misplaced. These signify the problem
which leads to having the contents secured in a room widely open to robbers.
Page | 9
A number of burglary cases in the laboratory rooms have already been reported in the
College of Engineering. Based on statistics, 22 burglary cases are reported since 2015 (as
stated by the college laboratory technician who is responsible for the maintenance and
Intel Core i5 to Intel Core i3, and nowhere to be found computer mouses are just some
examples of the troubles that some professors have encountered. The amount of work and
loss emphasizes that the access control system should not be taken lightly.
This study aims to improve the technology of a conventional door lock system,
The general objective of the study is to design a RFID-based door lock system in
which data feed is possible that includes securing a room with authentication using
identification card.
The objective of the thesis is to design a RFID-based door lock system in which data
feed is possible. The specific objectives that must be attained are as follows:
Establish an easier and more reliable access in a laboratory room by using RFID
technology.
Have a more secured room for the safekeeping of the laboratory equipment.
Page | 10
Authorize faculty personnel the admittance to a room as per schedule affirms.
Allow staff in the dean’s office to see the personnel who accessed a certain room.
The study aims to provide a modernized access system that could help improve the
makes use of the ability of RFID technology to authenticate so as to safeguard the laboratory
equipment.
Scope
The scope of this study is to design a RFID door lock laboratory room system that
will provide advanced and more secured door lock accessibility; a system that identifies and
displays who can only access the room in a set of time (scheduled time of the professors).
This project is divided into two main parts: the hardware and the software part. The
hardware part is composed of a RFID reader connected to a monitoring system in the main
office meanwhile; the 2x16 LCD display is used to display the output of the reader. The
This coding acts as the command to a circuit which controls the door itself.
Limitations
Every design has its own drawback(s), and here are the limitations to be put into
Page | 11
RFID tags can be cloned with readily available equipment. Anyone with an RFID
reader can “skim” the data from a tag of interest and make a new ID badge with the
Tag collision may occur if a reader picks up signals from multiple tags at the same
time.
The main advantage of this research is the development of a higher degree of security
for an access control system. Problems encountered in using the typical door lock like being
able to be opened conventionally by means of lock-picking tools can be solved. With the use
Page | 12
CHAPTER 2
THEORETICAL FRAMEWORK
This chapter presents a brief analysis of previous researches and literature related to
the project, and concepts regarding keyless access control system that can be of great help to
the researchers as they hypothesize ideas to come up with a proficient project. This chapter
also includes the conceptual framework of the system that explains the basic system
2.1.1 RFID
and can contactless read-write data into an RFID memory through Radio Frequency (RF)
waves. 1 The technology centers on electronic "tags" which store data and respond to a radio
induction. When an RFID tag, having a metal or copper coil that acts as the antenna, passes
enough to give power or wake up the onboard chip which causes the tag to spew out all
RFID technology which was just sitting in the corner for quite some time has finally
made its way in the limelight. Meeting today’s demands, it is of no doubt that this
technology is aggressively making an enormous impact on sectors such as but not limited to:
Page | 13
transport operations, supply chain, asset tracking and access control systems. Evidently, this
shows that the simplicity of a concept can lead to greater, both in terms of attributes and
numeral, inventions. For instance, WLAN (Wireless Local Area Network) that uses Radio
Frequency (RF) signals to transmit data over air eliminating the need for wired connectors or
a line of sight connection, but is limited to a certain range has a wide array of possibilities.
Devices must be in close distance to one another, too, for it is limited by a short transmission
distance. Barcoding which is also popular among access control systems uses a card with an
identification number on it that is read or scanned by a device via swiping. RFID technology
displays characteristics from each one aforementioned. RFID also uses radio frequency
signals to transmit data and does not need a line of sight connection for communication to be
possible. Furthermore, RFID may be limited by a short span, depending on the frequency
spectrum incorporated, and it also has a unique onboard identification number stored in a tag
To wrap things up, an RFID system encompasses a tag, each with a unique
identification number, an antenna which is used for broadcasting of the number, and a
scanner or reader which receives the signals from the tags and converts these into a digital
information that can be passed to a computer system where it can be further developed as a
business information. These are the basic fundamental building blocks that will help in
RFID COMPONENTS
Transmission of radio waves to the reader from the tags is possible through the use of
a transponder, a part of an RFID tag, which is an integrated circuit containing the radio
Page | 14
frequency circuitry and information to be transmitted, and an antenna and transceiver, which
read the radio frequency and transfer the information to a processing device, called reader.
RFID TAGS
Page | 15
RFID tag is contactless card, referred to as Proximity Integrated Circuit Card (PICC).
There are two general categories of RFID tags: active and passive. While both use radio
frequency
(RF) to convey message between a tag and a reader, the way they accumulate power is
different. Active RFID has internal power source (battery) within the tag which powers the
tag and its circuitry continuously, whereas, passive RFID depends on energy from the reader
for the tag to be powered. Thus, does require a high level of energy from the reader. Because
of the fact that passive tags are not powered, their reading range is typically a few meters.
And a reader must “wake up” the tag so as to transfer the information stored in it. On the
other hand, an active tag can utilize a low-level reader since it uses an internal power source
and unlike a passive tag, can deploy a high-level signal back to the reader. Moreover, an
active tag has a farther read distance when compared to a passive tag therefore, alongside
with the previously stated facts, making it more expensive and exquisite.
[2] The active tag is battery-powered and always, well, active. It is consistently on the
lookout for a reader’s signal. The passive tag relies on energy transferred from a reader to
basics/active-rfid-vs-passive-rfid/).
Page | 16
Unique Identification
In most cases, an Electronic Product Code (EPC) is encoded on RFID tags which can
be used to identify classes of products as well as individual items. EPC is a one of a kind
number stored in a chip of an RFID tag that is used to track objects, and to provide unique
An RFID reader is still able to read RFID tags without direct line of sight even in
Storage Capacity
RFID tags can typically store data of up to 2 kilobytes which is enough to carry basic
able to carry.
Dynamic information
With the read-write capability of RFID tags, information can be updated or changed
whenever it is necessary.
RFID READER
RFID technology allows several items to be quickly scanned and enables fast
RFID system consists of a tag reader (also called the interrogator but in most cases is called
an RFID reader) and a tag. All communication between the tag and reader occurs completely
Page | 17
through a wireless link that is sometimes called an air interface. The RFID tag must be
within the range of an RFID reader, which ranges from 3 to 300 feet, depending on the
information from an RFID tag, which in its early applications, is most often used to track
individual people or objects. The reader uses an antenna to send and receive signals to and
from the tags. The antenna can be mounted either internally or externally. Readers can also
be fixed or hand-held. Fixed readers are mounted readers that are ideally used for warehouse
management, asset tracking, and theft prevention applications. This type of reader may be
located at the entry or exit point of any facility or anywhere an item must pass by, and can be
used without human intervention. Hand-held reader works similarly to a barcode scanner.
The key difference is that this reader does not require the tag to be clearly visible to the
reader. Main advantage of hand-held readers is that it can read pallets without being
interfered by nearby pallets. Lastly, mobile RFID reader is a type of RFID reader that is
movable. Its advantage includes the absence of wires used in fixed readers and it can cover a
Note that many RFID readers and measurement systems actually use a three-port RF
component called a circulator that gives both transmit and receive front ends the ability to
use the same antenna. Note that with many RFID, standards, timing information between
“handshaking” is required between the tag and reader to complete an interrogation round.
This actually creates a unique test challenge because the instrumentation must be capable of
generate commands within a tight timing interval. As discussed in a later section, this design
Page | 18
is quite similar to field-programmable gate array (FPGA)-enabled RFID measurement
systems, which use similar embedded processing to fully emulate either a tag or a reader.
RFID SYSTEMS
RFID systems can be set apart according to the system’s range (may be a few
centimeters to a hundred meters) and the frequency band within which they operate (low
An RFID system which operates at low frequency (30 Khz to 300 Khz) has short
read range, typically an inch or two, but is ideal for reading objects near or on metallic
surfaces or objects with high water content. This band has lower sensitivity to radio wave
interference, but, compared to higher frequencies, is slower in terms of data read speed.
High frequency tags operating on frequencies between 3 and 30 MHz have read
can work well with objects made of metal, and with medium to high water content. High
Ultra-high frequency band operates at frequencies between 300 MHz and 3 Ghz,
thus, offers the longest read range, up to 50+ ft. depending on the set up of an RFID system.
This band, having a short wavelength, makes it more likely to be weakened when
interference is encountered. But, amongst the three frequency bands, it has the fastest data
transfer rate. It is the most widely used band and include applications in the field of
Page | 19
APPLICATIONS
With the endless possibilities of what an RFID can do, here are the key areas in
Public Transport
RFID system has been a widespread tool for the public ticketing system. Implication
and achievement of the said system has reached big cities like London, Shanghai, Istanbul
and many others. RFID can be implemented on transport areas which include subways,
Retail
With mobile RFID devices being widely available on the market, the set-up is also
beginning to grow for payment methods. Those cards used on fast-food chains and coffee
shops are RFID-based. And if you are to look at a consumer’s discernment, RFID is a fairly
simple approach; however, this technology’s implications on the supply chain are massive
thereby profiting the retailer a lot. “The cost benefit analysis of implementing tags on all
products to have real time asset management, warehouse management and supply chain
visibility is immensely valuable. Each product can now be accurately tracked from its raw
materials, straight through to the manufacturing process and finally to the individual end
user.”
Access Control
The popularity of RFID on access control is all due to its ability to eliminate the
involvement of manual aspects of entry which include keys. The use of RFID upon entering
a building increases convenience and security. The use of RFID to uniquely identify who
Page | 20
and when an entry was accessed with the aid of microcontrollers and other security control-
based equipment will let authorities have a real time view on the safeguarding of their entity.
2.1.2 MICROCONTROLLER
specific tasks which contain memory, storage, and automatic control of devices. By its
reduced size and cost, microcontroller makes it economical to control devices than when
compared to a project design that uses separate microprocessor, memory, and input/output
peripherals.
The main difference between the two is that microcontrollers incorporate RAM, EPROM
(for data storage and program). This arrangement simplifies the design of microcontroller
systems. On the other hand, the peripherals are generally simpler than external device and
paired with an electrical current — that is made to lock a door or device. The coil is small
enough to fit into a lock, where it keeps the locking mechanism from moving unless
an electromagnetic force is used to gain access. When the door is locked, no power is used,
so the solenoid has a long duty cycle and tends to run off batteries. While most are very
small, there are some large ones made for heavy-duty equipment and safety devices. The
Page | 21
most common places a locking solenoid is used are in doors, vending machines, and
turnstiles.
When a door or device locks via a solenoid, it uses basic electromagnetic forces to
control the lock. The solenoid fits in the locking mechanism and, when locked, will expand
keycard, is needed to tell the solenoid to move, allowing the device to unlock and open.
minute digital information directly from data sources rather than copying it from a displayed
peripheral. “The data feed is usually a defined file format in which the client application
detects timely information that may be useful to the application itself or to the user.” Simply
put, data feed is a way of delivering structured data from a server to a user. The most popular
form of data feed would be the Web feed. It carries information useful for Web applications.
The most common feed under Web feed is the rich site summary (RSS) feed. It allows blogs
and other websites to automatically send notifications or updates to those who have
Data feed is often used to send out an information that contains aggregations of data
records or files, such as product inventories, customer profiles, employee profiles and
timetable of activities. The information delivered may be arranged in tabular form, with
columns and rows. The file types may vary, but some applications support plain text files in
order for a non-technical individuals to easily create their own data feeds.
Page | 22
2.2 RELATED LITERATURE
Abstract: This control system is designed for places which need a high security to control
the opening and closing of the door or gate. It can be used at building like office, hostel,
home etc to protect important room in that building. In a conventional building office
system, employees enter the building via the door and punch the employee card as a proof of
their attendance. The system used ordinary key for opening and closing of door or gate, and
it is not secure. The key can be either missing or duplicated by an illegal user. The employer
record the employees’ attendance based on the working hours of the employees reflected in
the punch card. The problems of this conventional system are; the building is not secure as
outsiders can easily enter the building, the employees might ask their colleagues to punch
the card and they also can easily hang out during working hours. This security entry system
will overcome these problems by introducing door entry system. However, this project was
designed to control the access entrance for one office department entrance only. The
attendances of the employees will be recorded to the database system automatically when
(http://portal.fke.utm.my/libraryfke/files/1615_WANNOORMAHERANWANHUSSIN2006.pdf
Page | 23
2.2.2 Name of thesis: RFID Wireless Door System
Abstract: The goal of this project is to develop a simple wireless door system using two
different technologies. One of them is the RFID technology and the other one is an XBee
Pro wireless device that conform the ZigBee standard. In most door applications, RFID is
utilized as the primary technology for data identification and this data is used as a main
source for controlling the operation of a door. In this project, RFID technology is also used
for data identification, but the data obtained will be interfaced with XBee Pro wireless
technology. Then the data will be sent wirelessly to the receiver XBee Pro which in turn
controls the opening and closing of a door. So, the need for wired communication between
the RFID system and the door is eliminated. Furthermore, the door can be controlled from
long distance as wireless technology is implemented into the project. Intermediate between
RFID and XBee Pro wireless technology is a microcontroller that works on the instructions
build from the C programming language. The same applied between XBee Pro wireless
(http://umpir.ump.edu.my/349/1/3251_Ashvaany.pdf)
2.2.3 Name of thesis: Design And Implementation Of Bank Locker Security System Based
Inventor: Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun
Page | 24
Abstract: The main goal of this system is to design a locker security system using RFID and
Fingerprint. In this system, only authenticated person can open the door. A security system
is implemented containing door locking system using passive type of RFID which can
activate, authenticate, and validate the user and unlock the door in real time for secure
access. The advantage of using passive RFID is that it functions without a battery and
passive tags are lighter and are less expensive than the active tags. This system consists of
fingerprint reader, microcontroller, RFID reader, and PC. The RFID reader reads the id
number from passive. The fingerprint sensor will check incoming image with enrolled data
and it will send confirming signal for C# program. If both RFID check and fingerprint image
confirmation are matched, the microcontroller will drive door motor according to sensors at
door edges. This system is more secure than other systems because two codes protection
(http://www.ijstr.org/final-print/july2015/Design-And-Implementation-Of-Bank-Locker-
Security-System-Based-On-Fingerprint-Sensing-Circuit-And-Rfid-Reader.pdf)
Page | 25
2.3 Conceptual Framework
[1] http://science.opposingviews.com/basic-principle-rfid-18215.html
[2] http://atlasrfid.com/jovix-education/auto-id-basics/active-rfid-vs-passive-rfid/
Page | 26
[3]http://www.electrical4u.com/servo-motor-servo-mechanism-theory-and-working-
principle/
[4] https://www.techopedia.com/definition/30320/data-feed
[5] https://www.techopedia.com/definition/720/voice-response-system-vrs
[6] http://www.webopedia.com/TERM/V/voice_response_system.html
[7] http://blog.atlasrfidstore.com/which-rfid-frequency-is-right-for-your-application
[8] http://searchsqlserver.techtarget.com/definition/database
[9] http://www.brighthub.com/computing/hardware/articles/63693.aspx
[10]http://drcharlesbell.blogspot.com/2013/04/introducing-mysql connectorarduino_6.html
[11] http://www.w3schools.com/sql/sql_intro.asp
[12] http://www.simonsothcott.com/2011/11/what-is-rfid-10-examples-of-rfid.html
Page | 27
CHAPTER 3
This chapter covers the various aspects governing the development of the project.
Included in this chapter are the project description, project design, and specifications of tools
One of the main purposes of this study is to secure expensive laboratory equipment
The users will be provided with tags, which have unique serial numbers on it,
registered to the system. Once a close contact of an RFID tag to the module is made, its
corresponding serial number will be detected and will be compared with the recorded serial
numbers in the schedule database. With the aid of a software, the RFID reader will be
To further ensure higher complexity to the intruders, at the installation, users will be
asked to set-up a password – a 4-digit pin code. Higher complexity in a sense that, similar to
Page | 28
Once an access is requested, this information will be sent wirelessly to the dean’s
office. Using a graphical user interface (GUI), the administration will be able to see the entry
Security can be attained by designing various door locks such as mechanical locks or
electrical locks. A simple lock and key, however, has proven to have an enormous number of
drawbacks which makes a supposedly secured room susceptible to burglary, considering that
these locks can now be opened conventionally with skillset from lock- pickers or by means
of lock-picking tools, hence, making electronic locks better than mechanical ones. Simply,
this project gives you the opportunity of minimizing the number of intruders, thereby, giving
Programming
To perform the specific function of the prototype the Arduino must have the set of
Arduino Software IDE will be the ones to make it possible. Programming is done not on the
Arduino, but on a host computer. Programming is the art of writing text that can be
understood by people, and translating it into binary form for the processor to understand.
Source code is the data written by humans. Source code is written in text format so most
people use Integrated Development Environment as simple text editor. Sketch is also known
language is difficult to understand for beginners so Arduino team develop the standard
programming Arduino library that will provide much easier and simpler way of coding.
Arduino Software IDE is an easy to use application for writing and uploading codes
into the board. The environment is written in Java and based on Processing and source
software. It runs on Windows, Mac 0S X, and Linux. This application has add-ons designed
Page | 29
for developers. These add-ons range from text auto-completion to debugging and often
include tools to handle different source files that contain source codes. After the codes are
written the compiler reads the source codes and creates the binary files. These binary files
are later uploaded into the Arduino and the microcontroller will process and execute these
codes.
in Bell Laboratories in early 1970 for UNIX operating system. C uses a procedural language
syntax that needs to be processed by a compiler to convert Human written code to machine
codes. Unique Arduino code like pinMode(), digitalWrite(), and delay() are specific codes
from Arduino library. Microcontroller Codes written in C language consumes less amount of
memory than those written in other language. Simplicity and flexibility are the benefits of
writing in C language. This will benefit developer to create and develop more powerful
prototypes.
RFID Tag
INTERNET Page | 30
ADMIN
Host PC
Database
Figure 1
Page | 31
3.2.2 Process Flowchart
Figure 2
SYSTEM ON
X
SCAN RFID
TAG
INPUT 4-DIGIT
PIN CODE
Page | 32
IS CARD
NOT A
MASTER
Z
CARD?
NO
NO IS PIN
VALID Y
?
YES
YES
ACCESS SYSTEM
TIME AND DATE PRINT
ACCESS
GRANTED
ACCESS
SCHEDULE
Z
DATABASE
OPEN SOLENOID
LOCK
IS USER
ASSIGNED AT
SEND DATA TO
CURRENT HOST COMPUTER
TIME AND
Y
DAY? NO
Y
END
YES
LCD START UP X
Figure 3
Page | 33
3.3 Project Specification
that could be accessed by tapping an authorized RFID card and entering the correct pin code,
as faculty members follow their respective schedules, and propels information via the
internet to give the administration a monitored data regarding the admittance to every
laboratory room that could further help in the investigation of the recent burglary cases.
A passive tag is an RFID tag that does not contain a battery; the power is supplied by
the reader. When radio waves from the reader are encountered by a passive RFID tag, the
coiled antenna within the tag forms a magnetic field. The tag draws power from it,
energizing the circuits in the tag. The tag then sends the information encoded in the tag's
memory.
Features:
Tag battery: No
Able to read and transfer sensor values only when tag is powered by reader; no
date/time stamp
Page | 34
3.3.2 RFID Tag Reader
It is a stand-alone RFID card reader, with 2 seconds delay after tapped. It can show the
actual serial number indicated on the card. Passive tag RFID card reader can also detect the
type. Ease of card reading through distant detection is possible. It can detect and discern
between registered and unregistered cards. Its internal memory can register up to 100 RFID
Features:
Page | 35
PCB Dimensions: 46 mm x 64 mm
3.3.3 Relay
mechanically operate a switch, but other operating principles are also used, such as solid.
Relays are used where it is necessary to control a circuit by a low-power signal (with
complete electrical isolation between control and controlled circuits), or where several
Features:
Page | 36
Fully Sealed
solid iron, solid steel, or powdered iron. Devices of this kind can be used as electromagnets,
solenoid, the core material is ferromagnetic. It concentrates magnetic lines of flux. This
increases the inductance of the coil far beyond the inductance obtainable with an air-core
coil of the same dimensions and the same number of turns. When current flows in the coil,
most of the resulting magnetic flux exists within the core material. Some flux appear outside
the coil near the ends of the core; a small amount of flux also appears outside the coil and off
to the side.
Features:
Page | 37
Ambient operating temperature: 212°F/ 100°C
Keypads are collection of push switches which are arranged in the form of a matrix.
So there are rows and columns of switches. The two connections of a switch are also
connected in the matrix, so that the row has common connection and the column has a
common connection. Thus when a button is pressed in a row and a column, where the button
Features:
7 pin connector
Page | 38
3.3.6 LCD Display
Liquid crystal display is the technology used for displays in notebook and other
technology.
Features:
Operate with 5V DC
Page | 39
3.3.7 Arduino Mega
digital input/output pins (of which 14 can be used as PWM outputs), 16 analog inputs,
jack, an ICSP header, and a reset button. It contains everything needed to support the
microcontroller; simply connect it to a computer with a USB cable or power it with a AC-to-
DC adapter or battery to get started. The Mega is compatible with most shields designed for
Features:
Microcontroller ATmega1280
Operating Voltage 5V
Input Voltage
7-12V
(recommended)
Input Voltage (limits) 6-20V
Digital I/O Pins 54 (of which 15 provide PWM output)
Analog Input Pins 16
DC Current per I/O Pin 40 mA
DC Current for 3.3V Pin 50 Ma
128 KB of which 4 KB used by
Flash Memory
bootloader
SRAM 8 KB
EEPROM 4 KB
Clock Speed 16 MHz
Page | 40
3.3.8 RF Transceiver
The serial RF module is a low cost, high performance transparent FSK transceiver
operating at 434 MHz. it features a small size, high output power, high sensitivity, long
transmission distance (1-40m) and high communication data rate with auto set up for
Specifications:
Page | 41
3.3.9 PC
With the aid of an internet connection, real time viewing is made possible.
Specifications:
HDD: 930GB
RAM: 4GB
14 inch HD LED
Windows 7 Ultimate
Page | 42
3.4 Notes In Chapter III
[1] https://www.arduino.cc/en/Guide/Introduction
[2] https://www.safaribooksonline.com/library/view/programming
interactivity/9780596800598/ch04.html
[3] http://www.reliance-jcs.com/pro-electromechanical-solenoid.php
[4] http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=47
[5] https://drive.google.com/file/d/0BxdLxDCD6HidR0V0UW5DdEgxZkE/view?pli=1
[6] http://emoonim.com/eng/sidearticles/relays/
[7] http://www.circuit-help.com.ph/product/arduino-uno-rev3/
[8] http://www.circuit-help.com.ph/product/lock-style-solenoid-12vdc/
[9] http://www.icreateproject.info/uncategorized/arduino-save-data-to-database/
Page | 43
[10] http://www.instructables.com/id/interface-keypad-with-arduino/
CHAPTER 4
PROJECT GROWTH
The researchers’ goal is an innovation of the security of door locks. RF and Arduino
are to be utilized in this research whereas RFIDs serve as the keys to unlock the door and an
RFID reader, the Arduino, and a password protected LCD display is used to mechanically
operate the locking and unlocking function. The RFIDs are stored in database at the central
office. If an RFID is presented in the reader, the program confirms its validity. Once proven
valid, the user then types the password and the system unlocks. After validation, it will send
signal to the database in the central office, recording and confirming the RFID. With the RF
technology, securing a vast area will be optimized and give accurate authorization.
Specifically, the researchers applied this innovation to the security of the Lab Rooms in
Natividad Hall (College of Engineering) that has reportedly experienced rare cases of theft.
Page | 44
4.2 Project Design
PCB Design
Page | 45
PCB parts and placement
Page | 46
RFID Card Reader Schematic Diagram
Page | 47
Arduino Mega Schematic Diagram
Page | 48
Liquid Crystal Display Schematic Diagram
Page | 49
1. Assemble the door frame.
6. Build a rectangular box and mount the LCD display on the upper left side and place
7. Place the RFID reader, power supply, and Arduino board inside the box.
8. Put the RF transceiver on the side of the box. (Be sure to place it away from the
9. Connect the RFID reader, transceiver, LCD Display, and Keypad to their respective
10. Make sure to connect the TX pin of the RFID Reader to the RX of the Arduino and
TX of the Arduino to the RX of the RFID reader (Same for the RF transceiver)
15. Make sure a beeping sound is heard from the RFID reader and the LCD displays a
message.
Page | 50
2. Create a code.
7. Create a code.
8. Declare the right Serial port for the USB to UART converter.
4.4.1 Tools
1. Wire stripper
It is a hand-held device used to strip the electrical insulation from electric wires. A
simple manual wire stripper is a pair of opposing blades much like scissors or wire
cutters. The addition of a center notch makes it easier to cut the insulation without
cutting the wire. This type of wire stripper is used by rotating it around the insulation
while applying pressure in order to make a cut around the insulation. Since the
insulation is not bonded to the wire, it then pulls easily off the end. This is the most
Page | 51
versatile type of wire stripper. Another type of manual wire stripper is shown below.
It is very similar to the simple design previously mentioned, except this type has
several notches of varying size. This allows the user to match the notch size to the
wire size, thereby eliminating the need for twisting and thus making it ideal for
working with smaller gauge conductors. Some wire stripper also consist of serrated
2. Diagonal Plier
Also known as “side cutter”, is specifically designed for cutting copper, brass,
aluminum and steel wire. The bladed jaws are excellent for cutting, but are not
suitable for gripping or twisting. Some diagonal pliers have a specially ground edge
which makes a flush cut. This leaves a flush or flat surface, as opposed to the pointed
tip made by diagonal cutters. It is very useful when cutting the wires sticking out
from the bottom of a printed circuit board (PCB) after soldering a part in place.
Page | 52
4. Soldering Iron
It is a hand-held device whose metal tip heats to temperatures well above the melting
point of solder. It supplies heat to melt the solder and allow it to flow into a joint
between two work pieces. A soldering iron is composed of a heated metal tip and an
through a resistive heating element. For electrical and electronics work, a low-power
iron, a power rating between 15 and 35 watts, is used. A soldering iron stand and
cellulose sponge and flux pot for cleaning the tip is also very useful to avoid burning
5. Soldering Wire
It is a fusible metal alloy used to join together metal work pieces and having a
melting point below that of the work piece(s). It is used to make electrical,
electronics work, 22 gauge solder should be used as it allows much greater control
over the quantity of solder delivered, and the chances of accidentally bridging a gap
due to over-application or the wire's width are greatly reduced. While a Rosin core
solder should always be used, as it has channels inside filled with rosin flux. Since
flux melts before the solder, the embedded flux automatically cleans the joint before
the solder flows into it, resulting in a better quality of the soldered joint. Without
Page | 53
6. Desoldering Pump
remove solder from a printed circuit board. It has a cylinder with a spring-loaded
piston which is pushed down and locks into place. When triggered by pressing a
button, the piston springs up, creating suction motion that sucks the solder off the
soldered connection. The pump’s bottom head contains a hole through which the
molten solder is sucked when the pump is triggered. The head is designed such that
the extracted solder does not solidify and block it. Consequently, the sucked metal
6. Breadboard
Also known as “protoboard”, it is a type of solder less electronic circuit building for
temporary prototype with electronics and test circuit designs. Another common use
of breadboards is testing out new parts, such as Integrated circuits (ICs). Most
leads or terminals into the holes and then making connections through wires where
appropriate. The breadboard has strips of metal underneath the board and connects
the holes on the top of the board. Note that the top and bottom rows of holes are
Page | 54
connected horizontally and split in the middle called ravine which acts as Dual In-
line Package (DIP) support for Integrated Circuits while the remaining holes are
conductive pathways, tracks or signal traces etched from copper sheets laminated
packaged PCBs are usually copper, since copper is cheap and common while the
which lack the durability of FR4 but are much less expensive and they have a very
distinctive bad smell. A PCB allows signals and power to be routed between physical
devices.
Electric drill and drill bits in the range of 1/8 inch to 1/2 inch is used to drill holes on
Page | 55
9. Alligator Clips
The primary use of alligator clips is in establishing quick and temporary electrical
connections. When manufactured for electronics testing and evaluation, one jaw of
the clip is typically permanently crimped or soldered to a wire, or is bent to form the
A pin header (or simply header) is a form of electrical connector. It consists of one or
more rows of male pins typically spaced 2.54 millimeters (0.1 in) apart, but sometimes 2
millimeters (0.079 in) or 1.27 millimeters (0.05 in) is used as well. The distance between
pins is commonly referred as pitch in the electronic community. Pin headers are often
associated with ribbon cable connectors, pin headers often also function as recipients for
jumpers. Pin header connectors are thus "male" connectors (female counterparts do exist,
Page | 56
but these are normally just called "header connectors", without "pin") and are mostly
used inside equipment, rather than being used as a connector on the outside of the
device. Pin headers are cost-effective due to their simplicity. Headers are often sold as
long strips (typically 40 pins for the dual row versions) which can easily be broken off to
4.4.2 Equipment
1. Multimeter
unit. A typical multimeter would include basic features such as the ability to measure
multimeters are now far more common but analog multimeters are still preferable in
some cases, for example when monitoring a rapidly varying value. They can be used
Page | 57
devices such as electronic equipment, motor controls, domestic appliances, power
supplies, and wiring systems. A multimeter has a knob, which selects the
measurement function, and a pair of test leads for connecting the device to a circuit.
2. Power Supply
The primary function of a power supply is to provide a precise and stable source of
standard outlet into a DC voltage you can set with a front panel control, as a result,
power supplies are discrete, stand-alone devices, whereas others are built into larger
devices along with their loads. Examples of the latter include power supplies found
in desktop computers and consumer electronics devices. A power supply may obtain
energy from various types of energy sources, including electrical energy transmission
systems, energy storage devices such as a batteries and fuel cells, electromechanical
systems such as generators and alternators, solar power converters, or another power
supply.
Page | 58
4.5 Project Development Cost
Page | 59
Hardware 2287.00
Miscellaneous 552.00
Total: 8824.00
Activities
01-04
08-13
17-22
03-09
09-16
19-21
26-30
03-06
05-08
13-16
20-23
25-27
25-29
02-12
14-21
20-25
26-29
10-13
17-20
26-30
06-10
14-17
21-24
28-30
14-18
19-21
06-08
28
Formulation
Materials research
and canvassing
Researching and
write up for
introduction
Purchasing the
needed materials
Assembling basic
connections in
breadboard
Arduino and
Visual studio
programming
Preliminary
testing and
troubleshooting
Page | 60
4.7 Survey Form
In relation to this, we would like to conduct a survey to help us in our study. Below are
few questions that we would like to be answered.
Demographic Data:
Name of Respondent (Optional): _________________________________________
Age: ____
Gender: ___________
Contact No. (Optional): ___________________
Instruction: Put a check mark () to indicate to what extent you agree with the following.
Disagree
I. User-friendliness
5 4 3 2 1
The RFID interface is easy and accessible
The user-interface program is easy to
operate.
The RFID door lock is operational.
II. Functionality
5 4 3 2 1
Easy to use and to operate.
Functions according to the purpose of unlocking the
door.
Page | 61
Can provide information in a given time.
Can provide information in a given time.
III. Reliability
5 4 3 2 1
Reliable in terms of assessing the secured area.
Can satisfy by giving the needed information for the
faculty
Provides a systematic way for securing the laboratory
room.
IV. Efficiency
5 4 3 2 1
More affordable than other surveillance systems.
More reliable than ordinary door locks.
Can inform the faculty in a minimum time.
It can contribute for the development of security
operation.
V. Accuracy
5 4 3 2 1
Capable of giving specific access time on the door lock.
Operates accurately in terms of showing the faculty the scheduled
professors in their respective rooms.
The RFID door lock interface presents the exact command to present the
laboratory schedule.
The above survey and questions are used for research and undergraduate study purposes
only.
Comments/Recommendations:
Page | 62
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
____________________
Page | 63
CHAPTER V
This chapter discusses the presentation, analysis, and interpretation of data gathered
from various respondents. It shows the proficiency of the project as evaluated by the
respondents. The respondents have seen the operation of the said system and corresponding
results are shown on the following pages of the chapter. The working procedures of the
Page | 64
The researchers formulated a set of questions to be answered by various
correspondents to have a clear insight of the project’s significance and to make further
The main concern of the survey for security access control system for COE
laboratories is to monitor the person who wants to access the room. The researchers
demonstrated how the system/device would work. After the demonstration, the respondents
were asked to evaluate the device by answering the survey questionnaire regarding its user-
system.
2. Reliability - It deals with the extent to which the system yields the satisfying results on
repeated trials.
3. Usability - It pertains to the ratio of the useful work performed by the system compared
4. Workability - It refers to the capability of the device to show the schedule of the
professors and give the specific access time on the door lock.
Page | 65
Each criteria was evaluated based on the scale shown in Table 5.1
Rating Criteria
The developed device was analyzed and evaluated according to its level of acceptance
The following table shows the summary and interpretation of collected data:
Page | 66
Criteria Mean Remarks
Table 5.2 above shows the General Weighted Mean of all the data gathered regarding
the operation of the system. Based on the conducted survey, the system was over-all rated
4.61 for user-friendliness, 4.60 for functionality, 4.52 for reliability, 4.45 for efficiency and
4.52 for accuracy. To sum up, the general weighted mean is 4.54 which shows that the
5.2.4 Summary
Page | 67
Page | 68
5.3 Operating Procedures
2. The authorized person will decide if the professor can enter the laboratory room.
a. If the professor is scheduled to enter the lab room, the interface displays a
message "Prof A wants to access the room.", the authorized person clicks
b. If the professor is not scheduled to enter the lab room, the interface displays a
message "Prof A wants to access the room.", the authorized person clicks
"Ok", then clicks "No". The LCD, then, displays "Unauthorized" and returns to
startup.
3. If the professor is scheduled to access the lab room, he/she may now enter the security
PIN code.
a. If the entered PIN code is correct, the door unlocks, then, the LCDwill display
Page | 69
4. After the scheduled time has been terminated or upon leaving the lab room, the
5. If the professor enters incorrect PIN code thrice, the LCD will display "Terminated".
*For emergency
7. If a power shortage occurs, the professor inside the laboratory room may connect the
proceed to exit.
5.4.1 Capabilities
The system is able to provide convenient and more secured door lock accessibility of
the laboratory room with the use of RFID technology and pin code.
The software is able to identify and display who can enter the room in a set time
With the use of Radio Frequency transceivers, the system is able to send data feed to
the main server to monitor and authorize the person before entering the laboratory
room.
The system is able to operate continuously in times of power shortage through the
5.4.2 Limitations
Page | 70
RFID Readers and RF transceivers are both prone to interference.
only.
The device does not monitor the equipment inside the laboratory.
As long as the device is properly used, there should be no real issues in terms of
malfunctioning of the system and damages to the device. User must follow the proper
Listed below are safety precautions and control measures that must be followed:
Make sure that the parts of the device are properly attached or connected.
Avoid giving others personal information (eg. pin code, or the card itself).
5.6 Maintenance
Page | 71
Regularly check the connections/wirings inside the system.
Use the lab room door with care because the connections inside the system may be
Page | 72
CHAPTER 6
This chapter presents the general summary of the study, conclusion, and
recommendations.
6.1 Summary
Lately, there were reported scenarios of loss of equipment inside the laboratory
rooms at Natividad Hall (College of Engineering). One of the major reasons for this event is
that the laboratory rooms, up to this day, use security locks using some of the basics which
are the padlock and the metal key. These simple security devices have been proven
The researchers coordinated with the maintenance and security personnel to confirm
the issue. This signifies the problem. Due to missing components inside the laboratory room,
there were cases of classes being delayed and personnel downgrading the version of their
technology to compensate for the missing parts or to lessen the cases. This signifies that it is
a hard task to monitor the laboratory rooms and the people liable inside the room. With this
Page | 73
in mind, the researchers utilized the use of wireless communication of RF technology to
6.2 Conclusion
In conclusion, the researchers have concluded that security is still lacking in the
laboratory rooms of College of Engineering and the study proposed will contribute to the
advancement of the technology of the security. The S.A.C.S. improves the accessibility,
security and monitoring of the area concerned. By a simple tap of the RFID tag and a unique
PIN code, the S.A.C.S. is able to innovate the way the professors as well as the students
enter the room. The unique PIN code, which every professor keep in using the room,
possesses additional layer of security in response to misplacement or theft. The wireless data
feed allows the faculty secretary to be notified if a professor is to access the laboratory room
From the respondents’ point of view, the security system helps aid security and
monitoring, which means that the maximum capablity of the system benefits the College of
Engineering. The respondents rated the user-friendliness highest during the survey
conducted by the researchers. This implies that the system has greater reliability than the
current security system. Overall, the security system was rated mostly excellent and the
Page | 74
6.3 Recommendations
Based on the respondents’ opinion, evaluation and suggestion, the researchers came
2. Employ a more efficient power source to improve the functionality of the system.
4. Be sure to transmit and receive information using GSM incase the command center runs
out of power.
Page | 75