28
NOTRE DAME OF TACURONG COLLEGE City of Tacurong THESIS PROPOSAL I- Research Title AUTOMATED CLASSROOM MAGNETIC DOOR LOCK WITH ATTENDACE MONITORING SYSTEM USING R.F. I.D. II- Name of Proponents Christopher King D. Garcia Student Federico J. Pagmanoja III Student Michael F. Roque Student James Paul S. Bernardo Student Name of College or Department: College of Arts and Sciences and Education, BSCS/BSCPE Department Name of the Head of the College or Department: Dr. Angelie Fiel C. Ballena (CAS-Ed Dean) Acel S. Monares (BSCS/BSCPE Program Head)

Classroom locking-system (1)

Embed Size (px)

Citation preview

Page 1: Classroom locking-system (1)

NOTRE DAME OF TACURONG COLLEGECity of Tacurong

THESIS PROPOSAL

I- Research TitleAUTOMATED CLASSROOM MAGNETIC DOOR LOCK WITH ATTENDACE MONITORING SYSTEM USING R.F. I.D.

II- Name of Proponents

Christopher King D. GarciaStudent

Federico J. Pagmanoja IIIStudent

Michael F. RoqueStudent

James Paul S. BernardoStudent

Name of College or Department: College of Arts and Sciences and Education, BSCS/BSCPE Department

Name of the Head of the College or Department: Dr. Angelie Fiel C. Ballena (CAS-Ed Dean)Acel S. Monares (BSCS/BSCPE Program Head)

Page 2: Classroom locking-system (1)

III- Background of the Study

The innovations status of security systems now a days has been on its most

technological advancement. From the primitive metal locks and door knobs, to complex

wireless controlled, digitally interrelated reciprocal devices programs and other sensory

devices using motion, shadow, heat and other unwitting features to commoner.

Some students of NDTC unregularly enters and uses the facilities, especially the

classroom unknown having without any official authorization from the school

administrator or personnel in charge of building or facility. Students from the other hand

unnoticeably consume and waste energy.

Implementation of discipline from attendance and tardiness is one of the teachers’

headache and schools’ disciplinary offices dilemma. Student regulations have been taken

unserious.

Along with this situational problem and idea with the accompaniment vision

statement of NDTC, This encourages us, the Computer Science students to build and

develop an AUTOMATED CLASSROOM MAGNETIC DOOR LOCK WITH

ATTENDACE MONITORING SYSTEM USING R.F. I.D. which will focused mainly in

magnetic door lock control and operation, monitoring and validation of student’s

attendance, as well as in restriction of unauthorized usage of rooms by the use of the

(combined) current and existing technology that we have today.

Page 3: Classroom locking-system (1)

Through this system, it is a part of our goal to help and give benefit to the school in creating a

system for student entry validation and giving them admission notifications as well as in saving

energy consumption and maintaining security restriction to unauthorized usage of rooms and its

facilities within its premises. This will also help the faculty members in monitoring, observation

and implementation in molding student’s performance enrolled at the same time helping the

school to upgrade and to contribute on its technological state of advancement.

IV- Objectives

General Objective

This study aims to develop an AUTOMATED CLASSROOM MAGNETIC

DOOR LOCK WITH ATTENDACE MONITORING SYSTEM USING R.F. I.D. for the

College Classrooms of Notre Dame of Tacurong College in which could help in

providing room security and restriction implementation together with digital attendance

monitoring system for students and for teachers use.

Specific Objectives

Specifically, it aims the following to:

1. Conduct a study which assesses the current security and attendance existing

system flow.

2. Design a conceptual flow or model which will illustrate the methodology of

the proposed system.

3. Formulate and create our own operational and system software logic for the

locking system and attendance.

Page 4: Classroom locking-system (1)

4. Identify software and hardware devices which will be used in developing the

locking and attendance system.

5. Discuss technical aspects, backgrounds and methods for said system.

6. Develop software to monitor student’s attendance and performance.

7. To help upgrade the technological state of advancement of the school.

V- Significance of the Study

The study on Automated Classroom magnetic Door Lock with Attendance

Monitoring System Using R.F. I.D. is to implement and contribute in door locking

security and attendance system of the school for Students and teachers of the campus

using only their given and existing Radio Frequency Identification Cards.

The results of this study could help in assisting both institution and its faculty into

reconsiderations to develop new ways in implementing school regulations which could

possibly help students avert rule deviation, tardiness, cutting of classes and other

unethical misconducts. The occurrences of such actions and behaviors requires and

demands for a new systematic approach which will assist institution to enforce the

students to exercise rules properly.

This could furthermore benefit the institution in upgrading its technological state

of advancement and security maintenance as well as extending the use of student’s

distributed and assigned Radio Frequency I.D.

VI- Scope of the Study

Page 5: Classroom locking-system (1)

The scope of this automated system focuses only in developing security

restrictions system, student entry validation, attendance monitoring using Radio

Frequency I.D. Develop our own program software and system logic for our device. It

has a battery installed in it and codes

The system limits itself in having no internet connection and neither centralized

nor interconnected network system from the device to (every) Personal Computers on

offices mentioned on previous statements and it doesn’t have any backup power saver

or generator hardware.

VII- Definition of terms

Security Lock – refers to the automated classroom door device.

Magnetize/De-Magnetize – refers to the status of the Magnetic lock mechanism.

Text-Based Database File- refers to the location and the database storage tool inside the SD Card.

Power Loss – It is an interruption in the regulated supply of energy.

Security Status – it is the state of the something or device which controls and filters the entry of someone.

System Override – it is the way of forcing the security device to nullify, deactivate or allows the user to control the access.

Security Device- refers to the Automated Classroom Magnetic Lock with Attendance Monitoring System Device.

VIII- Related Literature

Page 6: Classroom locking-system (1)

REVIEW OF RELATED LITERATURE AND STUDIES

This chapter presents the related literature and studies after the thorough and in-

depth search done by the researchers. This will also present the synthesis of the art,

theoretical and conceptual framework to fully understand the research to be done.

RFID Technology Development Radio frequency identification is a developing

technology that uses several basic components in order to satisfy the needs of the implementing

organization. Radio frequency identification (RFID) is not a new technology. It has been around

since the early 1900’s and was utilized during World War II (Domdouzis, Kumar et al. 2007).

Radio frequency identification is a technology that uses a few simple components. The ID tag, is

composed of an antenna, integrated circuit, a reader that gathers information from the id tag, and

a database system that is used to store the information gained through interrogating the id tag

(Roberts 2006).

Based upon the application, the identification tag can be active or passive. Active tags in

addition to the circuit and antenna have a battery that powers the circuit and allows the tag to pg.

2 broadcast information that will be picked up by a reader (Roberts 2006).

Passive tags collect and store power from the reader through the use of a capacitor

located within the circuit. The circuit then utilizes the energy collected to transmit tag

information to the reader (Weinstein 2005). Low cost passive tags are the predominantly used

form of identification tag. Deciding whether to use active or passive tags is an important

component of the architectural design process. Architectural design of the RFID network is

Page 7: Classroom locking-system (1)

imperative when developing a RFID system. This system will be evaluated on the basis of how

well it tracks objects. In their article Architecture design and performance evaluation of RFID

object tracking systems, Jiann-Liang Chen, Ming-Chiao Chen, Chien-Wu Chen, and Yao-Chung

Chang discuss the development of an RFID/IP gateway that uses the Object Naming Service

(ONS) protocol to improve the performance of an RFID network (Chen, Chen et al. 2007).

According to Solanas and Domingo-Ferrer, it is important to design a network that has the

ability to scale in size and maintain data privacy (Solanas, Domingo-Ferrer et al. 2007).

A quantitative analysis on a cell based network simulation was performed and the results

were gathered for three different conditions to test the scalability of a private network. To meet

application requirements autonomous RFID systems have been developed that have the ability to

read tags from greater distances (Jedermann, Behrens et al. 2006).

Developing RFID technology to support data privacy and the utilization of secret-key,

public-key, symmetric and asymmetric cryptographic algorithms to protect the data transmitted

via the id tag during interrogation by the reader is critical to the protection and integrity of the

system (Robshaw 2006). Additionally, design systems that are interoperable with other

technologies such as global positioning satellite pg. 3 technology will allow the deployment of

RFID systems designed for unique situations (Song, Haas et al. 2007).

When it comes to security, the RFID card transmits its information using 40-bit

encryption, which means that the card can hold a number between 1 and

Page 8: Classroom locking-system (1)

1,099,511,627,776 and that is, according to the programmer very hard to guess compared

to a regular pin code. But on the other hand, if the user forgets his or her

RFID card, then the key pad can be used to unlock. The read range is a few inches and the keys

are easy to change and they are retained even without batteries installed. It has a built in alarm

that is activated if force is used and an auto lock feature that guaranties that the door is always

locked. Which the protocols and algorithms are used and if the lock is protected from

reprogramming.

This RFID Proximity access controller using proximity system is one of the modern

access control systems. The state-of-the-art CPU and integrated circuit techniques are applied to

keep all the data from loss due to power failure. It is powerful and can open the door using

proximity cards, passwords, or the hybrid.

The access controller can provide users with more convenience by connecting to terminals,

including the button for opening the door, doorbell, and electric lock that is normally open or

closed.

This embedded device offers a method for controlling access safely and automatically,

qualifying it as an ideal equipment for businesses, offices, factories, and communities.

Page 9: Classroom locking-system (1)

IX- Technical Background

Radio frequency

(Abbreviated RF, rf, orr.f.) is a term that refers to alternating current (AC) having

characteristics such that, if the current is input to an antenna, an electromagnetic (EM) field is

generated suitable for wireless broadcasting and/or communications.

RF Card/Id ( R adio F requency ID entification)

A data collection technology that uses electronic tags for storing data. The tag, also

known as an "electronic label," "transponder" or "code plate," is made up of an RFID chip

attached to an antenna. Transmitting in the kilohertz, megahertz and gigahertz ranges, tags may

be battery-powered or derive their power from the RF waves coming from the reader.

RF Reader

A transmitter/receiver that reads the contents of RFID tags in the vicinity. Also called an

"R.F. ID interrogator." The maximum distance between the reader's antenna and the tag vary,

depending on application. Credit cards and ID badges have to be brought fairly close to the

readers, somewhat like barcodes. For other applications, passive RFID tags can be read up to

approximately 10 feet away, while active tags with batteries can be several hundred feet from the

reader.

Page 10: Classroom locking-system (1)

LCD Display ( L iquid C rystal D isplay)

A screen display technology developed in 1963 at the David Sarnoff Research Center in

Princeton, NJ. The LCD technology is extraordinary. Sandwiched between polarizing filters and

glass panels, liquid crystals are rod-shaped molecules that flow like liquid and bend light like

crystal. The orientation of the filters and panels determines how light passes through the crystals.

For more details, see LCD subpixels, LCD types and liquid crystal.

MicroController

A single chip that contains the processor (the CPU), non-volatile memory for the program

(ROM or flash), volatile memory for input and output (RAM), a clock and an I/O control unit.

Also called a "computer on a chip," billions of microcontroller units (MCUs) are embedded each

year in myriad products from toys to appliances to automobiles. For example, a single vehicle

can use 70 or more microcontrollers.

Relay

An electrical switch that allows a low power to control a higher one. A small current

energizes the relay, which closes a gate, allowing a large current to flow through.

SD Card ( S ecure D igital Memory Card)

A family of very popular flash memory cards used for storage in portable devices.

Introduced in 1999 by Panasonic, Toshiba and SanDisk, the original, full-size SD Card is the

most popular digital camera storage, and the smaller mini and micro versions are widely used in

mobile devices.

Page 11: Classroom locking-system (1)

Electro Magnetic Lock

It is a locking device that consists of an electromagnet and an armature plate. There are

two main types of electric locking devices. Locking devices can be either "fail safe" or "fail

secure". A fail-secure locking device remains locked when power is lost. Fail-safe locking

devices are unlocked when de-energized. Direct pull electromagnetic locks are inherently fail-

safe.

Authentication

It is any process by which a system verifies the identity of a User who wishes to access it.

Since Access Control is normally based on the identity of the User who requests access to a

resource.

PCB Layout A printed circuit board ( PCB )

Mechanically supports and electrically connects electronic components using conductive

tracks, pads and other features etched from copper sheets laminated onto a non-conductive

substrate.

Keypad Buttons

In computing, a keyboard is a typewriter-style device, which uses an arrangement of

buttons or keys, to act as mechanical levers or electronic switches.

Page 12: Classroom locking-system (1)

CMOS battery

A battery that maintains the time, date, hard disk and other configuration settings in the

CMOS memory. CMOS batteries are small and are attached directly to the motherboard. See

BIOS setup and batteries.

C language

A high-level programming language developed by Dennis Ritchie at Bell Labs in the

mid-1970s. Although originally designed as a systems programming language, C has proved to

be a powerful and flexible language that can be used for a variety of applications, from business

programs to engineering.

Page 13: Classroom locking-system (1)

X- Methodology

Fig.1

Page 14: Classroom locking-system (1)

Fig. 2

Page 15: Classroom locking-system (1)

In this Methodology chapter highlights and shows the technical procedure and tools of the proposed system which include different figures of operations.

Figure 1: Before/When Entering the Classroom

Teacher

The first process is to insert the (SD) Card from the teacher in which it will serve

as the storage for his/her text-based database file in which enables the system of

automated security locking device to process the reading, writing and recording students’

attendance into it.

He/She next enters or tap his/her Access/Entry Code to Change the Security

Status mode to UNLOCKED. In this status, the students may now tap their R.F. I.D for

the recording and storing of their attendances into the system.

STUDENT/S

Student/s during tapping of their R.F. Identification Card, the security locking

system compares the R.F. I.D. number of the student to the text-based database files stored in the

teachers’ SD Card. If the comparison of the R.F. I.D. number is successful, it stores time the log

time, the student I.D. number and the student name only once into the database then security

device will trigger light and beep sound and the magnetic lock mechanism to de-magnetize itself.

A student is not allowed to enter the classroom and doesn’t have the capability to use and

access the security locking device and its system if there is no present (SD) Card in it.

Page 16: Classroom locking-system (1)

If a student has to go outside for some reasons, they only have to enter their student I.D. using

the keypad buttons located other part of the door or inside the classroom which is still connected

to the security locking device.

Figure 1.2: After/When Leaving the Classroom

Teacher

When the room is already cleared out of students, the teacher enters the Locking

Code which will trigger the automated security locking system and device to temporarily

magnetize itself for the next class session or for the next insertion of teachers (SD) Card.

After deactivating and setting the security status in to Locked Mode, the teacher

then removes his/her (SD) Card.

Figure 1.3: Monitoring/Creating of Student Attendance

Teacher

In Monitoring/Creating of Student Attendance, the teacher uses his/her personal

computer or Laptop with the Installed Attendance Monitoring System Program. This

program allows the teacher/s to view and print student log the records and to monitor the

late and absences of the students and their performances.

Page 17: Classroom locking-system (1)

Figure 2: Security Override and Security Status Mode

The image on this figure 2 explains the system overriding and changing of the security

status mode. Both only the teacher/s and the School Admin, Staff of Personnel holds the system

override code.

There are several cases in which the security override code is applicable:

1. It is only applicable whenever there will be a loss in power which activates and

converts the operation of the device and its system into battery operation mode during

the class to open the door from the inside or outside.

2. It is applicable whenever there will be a system fail in the comparison of R.F. I.D

codes or with the student’s I.D. exit code on or with the (SD) Card.

3. If there is some occurrences of things that is need to be checked or to be done or

something that is left inside the classroom by someone (teacher/student).

4. If there are occurrence of emergency and security or facility checkups.

Page 18: Classroom locking-system (1)

XI- Calendar of Activities

XII- Budgetary Outlay

Page 19: Classroom locking-system (1)

PARTICULAR QUANTITY UNIT PRICE TOTAL

RF CARD/ID 1 1442.530 1442.530

RF READER 1 946.94 946.94

Power Cord/Wire 1Length based

/unknown 0

Electric Wire Receptacle

1 unknown 0

LCD DISPLAY 2 31.59 63.18

Power Socket 1 unknown 0

MICRO CONTROLLER

1 120.51 120.51

RELAY 1 268.56 268.56

SD CARD 1 292.03 292.03

ELECTRO MAGNETIC LOCK

1 708.18 708.18

PRINTED CIRCUIT BOARD (PCB)

1 190.92 190.92

KEYPAD BUTTONS 2 142.63 293.26

CMOS BATTERY 1 167.00 167.00

TOTAL COST 3,050.58