Design And Construction Of Door Security System Using Remote Control And Sensors

Project Material  on Design And Construction Of Door Security System Using Remote Control And Sensors

Overview

ABSTRACT

The ultimate purpose of this paper is to develop a remote controlled security door using a microcontroller. It is a means of enforcing security features of the entire building structure, equipped with appropriate management control. In this paper we have designed system that allows unlocking a secure door remotely. The main aim of this paper is to help users improve the door security of sensitive locations, from car parks, shopping centres or corporate head offices to airports, banks or nuclear power plants. This paper takes a cursory look at other security methods of controlling access, their disadvantages and then goes on to the design of the hardware as well as software programming to lock or unlock the door. Both software and hardware for the system were developed in this paper by using arduino microcontrollers, relays, sensors, induction motors and some mechanical system to demonstrate the response of the output and input devices.

TABLE OF CONTENTS

COVER PAGE

TITLE PAGE

APPROVAL PAGE

DEDICATION

ACKNOWLEDGEMENT

ABSTRACT

CHAPTER ONE

INTRODUCTION

1.1   BACKGROUND OF THE PROJECT

  • PROBLEM STATEMENT
  • AIM AND OBJECTIVE OF THE PROJECT
  • SCOPE OF THE PROJECT
  • APPLICATION OF THE PROJECT
  • LIMITATION OF THE PROJECT
  • DEFINITION OF TERMS

CHAPTER TWO

LITERATURE REVIEW

  • REVIEW OF RELATED WORKS
  • REVIEW ON LOCKS
  • STRENGTHS AND WEAKNESSES

CHAPTER THREE

METHODOLOGY

  • INTRODUCTION
  • HARDWARE DESIGN
  • SYSTEM BLOCK DIAGRAM
  • SYSTEM FLOW CHART
  • SYSTEM CIRCUIT DIAGRAM
  • PROGRAM CODE

CHAPTER FOUR

TESTING AND RESULTS

  • CONSTRUCTION PROCEDURE AND TESTING
  • INSTALLATION OF THE COMPLET DESIGN
  • CASING AND PACKAGING
  • ASSEMBLING OF SECTIONS
  • TESTING OF SYSTEM OPERATION
  • RESULT
  • DISCUSSION

CHAPTER FIVE

  • SUMMARY
  • CONCLUSION
  • RECOMMENDATION
  • REFERENCES

 

CHAPTER ONE

1.0                                                            INTRODUCTION

1.1                                               BACKGROUND OF THE STUDY

Due to the need to increase the security of life and properties in our environment, security systems are used as selective systems to decide who have access to a given location based on a personal distinctive trait of the user. It also serves the function of sensing or detecting false intrusion (using input sensory devices and gives early warning using audio warning devices alarm – light indicators and remotely controlled computer systems etc). The term false intrusion here is used to mean any form of attempt to gain entry without following the proper pre- designed protocol(s). From time past until present, security locks usually includes mechanical devices made of forged metal i.e. simple lock and bolt, the door chain, pin tumbler lock, the jam lock and padlock etc. Other recently developed security devices are gadgets like laser beam detectors, motion detectors and magnetic card readers. Most recent of these devices are offshoots of biometric engineering. They include voice recognition systems, finger print readers, retina eye scanners, etc. (Prabhakar, 2003). The major characteristic of security devices is to prevent an intruder from gaining access to a location. Most of these devices however have lapses which give an unauthorized person access to where they are barred i.e. the simple jam lock and pad lock can be forced open or the keys duplicated by unauthorized persons and under certain conditions, i.e. physical changes of the individual concerned, the biometric devices sometimes fail in recognizing the authentic individual concerned (Matyás, 2012). Hence they cannot be totally relied on. Furthermore, these devices are very expensive (Chien, 2011), its use is restricted to only a few individuals or organizations that can afford it. Biometric systems may violate users privacy while some users consider them to be personally invasive and may also imply loss of anonymity (Matyás et al., 2012). Devices such as motion detectors, light detectors among others are susceptible to be triggered by false signals such as noise impulses, whenever its sensitivity is increased (Matyás et al., 2012). They are not suitable for most outdoor security protection due to the fact that they don’t posses high discriminative capability during operation and they are fairly expensive.

It is hence imperative to provide a security door, one which is also efficient and reliable; with high discriminative capability, non reliance on the physical quality of the individual concerned does not have key access or any physical locking interface and which is by far less expensive than their counterparts (Alsaadi, 2015). This has led to the design and construction a remote control security door using microcontroller. It includes remote control and using correct personal identification numbers to operate the locking device manually, by conditioning the access based on the configuration of the security device thereby granting access to the user with correct pin number.

The remote control security door finds application in homes, banks in the field of military applications i.e. ammunition ware house, industries and ministries and Government Parastatals, airports nuclear power plants etc.

There are three important components of access control: Identification, Authentication, and Authorization. Identification is the activity of the subject supplying information to identify itself to an authentication service. Authentication is the second part of a credential set to verify the identity of the subject. These mechanisms could be passphrases, passwords, cryptographic keys, PIN numbers, or tokens. Authorization is the process of determining what this identified subject can actually access and what operations it can carry out (Mahdi, 2013).

1.2     Problem statement

The security situation in many parts of the world today leaves much to be desired. In Nigeria particularly, the prevalence of armed robbers and other groups that constitute nuisance to the society has led to the loss of lives and properties worth millions of dollars. Many of the attacks that led to the loss have occurred in the homes or in guarded compounds and the attacks took place in spite of the existence of seemingly impregnable security gates that were designed to ward off intruders. The needs for remote controlled gates that have superior security features to those operated manually thus exist and have been on the increase in recent times.

1.3      Aim and objectives of the study

The main aim of this work is to build a remote control door Lock Circuit for safety purposes. The objectives of this work are:

  1. To improve security in our homes and industries
  2. To replace metallic keys by building a fully featured remote enabled electronic security system prototype
  • To study the workings of an infrared sensor

1.4   Scope of the study

The scope of this work covers the building of a Remote control Door Lock Circuit for safety purposes. Remote Control Door Locks allow Wireless Control. This means one can unlock or lock their doors with just one click from remote control. It replaces the traditional lock system and provides a modern lock that is way more secure.

Arduino microcontroller is used making this circuit. Electromagnetic door lockwas used in building the device. The Magnetic locks use electromagnetism to deal with the entire locking mechanism. The circuit is easy to build and simple to use required few electronic components.

1.5     Applications of the scope

  • We can use it in industries, homes, offices for the security purpose.
  • Safety devices.
  • Home automation system
1.6                                          LIMITATIONS OF THE PROJECT
·        It is a low range circuit, i.e. it has limited coverage.
  • If there is no power supply and the battery is not charged, it is not possible to open the door.
  • IR Transmitter and Receiver require line of sight communication i.e. they need to be facing each other.
  • The range of IR communication is less and is reliable for short range and small amounts of data.

1.7                                                  DEFINITION OF TERMS

Secure Area: A designated area in which access into and out of is controlled and can be monitored.

Secure Door: A door in which access through is controlled and can be monitored.

Short Circuit: An unintentional connection that provides a low resistance path between two points in a circuit or between a point in a circuit and ground. A Short Circuit can drastically affect the operation of a circuit. If excessive current flow results from the Short Circuit, a device may be damaged or ruined.

Switch: A device used to either connect or interrupt an electronic circuit.

Chapter Two: Literature Review

2.0 INTRODUCTION:

This chapter provides the background and context of the research problems, reviews the existing literature on the Design And Construction Of Door Security System Using Remote Control And Sensors, and acknowledges the contributions of scholars who have previously conducted similar research [REV27049] …

Document Information

    • Format: DOC/PDF
    • Type: Project Material
    • Title: Design And Construction Of Door Security System Using Remote Control And Sensors:

YOU MAY LOVE THESE (Recommended)

  • Role Of School Administrator In Managing Insecurity Challenges In Nigeria School System

    To write about the Role Of School Administrator In Managing Insecurity Challenges In Nigeria School System research project, follow this helpful guideline: This study was carried out to examine the role of school administrator in managing insecurity challenges in Nigeria school system using selected secondary Emuoha Local Government Area, Rivers State as a case study. The study was carried out to determine the prevalence of insecurity challenges in …

    59 Pages 1 - 5 Chapters 13,874 Words DOC/PDF Format Instant Download UPN41250

  • Design And Implementation Of Radio Controlled Car Lock With 5min Ignition Deactivation

    To write about the Design And Implementation Of Radio Controlled Car Lock With 5min Ignition Deactivation research project, follow this helpful guideline: The rate of car theft nowadays according to daily crime analysis is on the increase. Manual key locks have proven to be inefficient. This thesis aims at designing a radio-controlled car door locking system. The two main objectives are to unlock a set of vehicle doors when the owner approaches his…

    74 Pages 1 - 5 Chapters 14,507 Words DOC/PDF Format Instant Download UPN24887

  • Design And Implementation Of Face Recognition – Based Door Access Control System

    To write about the Design And Implementation Of Face Recognition – Based Door Access Control System research project, follow this helpful guideline: With recent dramatic development in the field of artificial intelligence (AI), smart access control has become crucial part of our modern everyday lives. This paper presents a door security system designed to prevent trespassing in a highly secure areas like home environment. The implemented syst…

    46 Pages 1 - 5 Chapters 8,666 Words DOC/PDF Format Instant Download UPN50828

  • Design And Implementation Of A Smart Door Lock System Using Finger Print

    To write about the Design And Implementation Of A Smart Door Lock System Using Finger Print research project, follow this helpful guideline: Authentication plays a very critical role in security-related applications like e-commerce. There are a number of methods and techniques for accomplishing this key process. In this regard, biometrics is gaining increasing attention these days. Security systems, having realized the value of biomet…

    42 Pages 1 - 5 Chapters 5,726 Words DOC/PDF Format Instant Download UPN25621

  • 1.0 INTRODUCTION 1.1 BACKGROUND OF THE STUDY The need for having home protection has always been there. But in the recent times, considering a dramatic rise in petty crimes like robbery and theft, the need has been more strongly felt to have a fool proof protection of the belongings and the family members. Home security has come a long way in the last few decades. It was in the hands of a guard who manually provided surveillance during […]

    64 Pages 1 - 5 Chapters 10,002 Words DOC/PDF Format Instant Download UPN26955

  • Reduction Of Oil Spillage Using Wood Plastic Composite From Saw Dust, White Sand And Low Density Polyethylene Waste

    To write about the Reduction Of Oil Spillage Using Wood Plastic Composite From Saw Dust, White Sand And Low Density Polyethylene Waste research project, follow this helpful guideline: Wood plastic composite (WPC) is a combination of wood and plastic with the plastic as the matrix and the wood as the reinforcement. WPC can be made from virgin materials as well as recycled ones. This work presents a study of WPC made from recycled plastic waste, sawdust, white sand and low densi…

  • Utilization Of Plantain Stem Fibre For Making Wrapping Materials

    To write about the Utilization Of Plantain Stem Fibre For Making Wrapping Materials research project, follow this helpful guideline: Wood has historically been a primary raw material for pulp, paper, and fiber-based products. However, the escalating demand for wood in construction, furniture, fuel, charcoal, and other industries, coupled with concerns about deforestation and wood scarcity in many regions, has spurred interest …

    39 Pages 1 - 5 Chapters 9,247 Words DOC/PDF Format Instant Download UPN47998

  • Design And Implementation Of A Bill Of Materials Processing System

    To write about the Design And Implementation Of A Bill Of Materials Processing System research project, follow this helpful guideline: With the trend of technology growth in the world of today, virtually every facet of human work has been affected; even the remotest of it all, and the production circle cannot be left out. This study was carried out to verify all the manual processes involved in bill-of-material processing system…

    66 Pages 1 - 7 Chapters 7,577 Words DOC/PDF Format Instant Download UPN24027

  • Design Of A Computer Assisted Multiple Choice Examination System

    To write about the Design Of A Computer Assisted Multiple Choice Examination System research project, follow this helpful guideline: With the thoughtful application of emerging technologies and in a bid to improve on the effort towards the conduction of the multiple choice assessments, this project is designed to automate all multiple choice assessments and examinations in the department of computer science, Federal Polytechni…

    71 Pages 1 - 6 Chapters 8,466 Words DOC/PDF Format Instant Download UPN24220

  • Design And Implementation Of An Online Driving School Management System

    To write about the Design And Implementation Of An Online Driving School Management System research project, follow this helpful guideline: With the rapid development in technology, there is a need to develop a management system for drive-training enterprise. Driving-training school’s efficiency will be managed and the will be a reduced waste of human power and information resources. The Management System will grow for the most part …

    44 Pages 1 - 5 Chapters 8,483 Words DOC/PDF Format Instant Download UPN27639

Live Chat