AUTOMATIC DOOR ACCESS USING ARM 7
Volumn 3

AUTOMATIC DOOR ACCESS USING ARM 7

1.Ms.Gopika Nair

2.Ms.Ayushi Ikhare

3.Ms.Divyani Shende

4. Ms.Samiksha Morey

Department of ETC Engineering

Jhulelal Institute of Technology,Lonara,

Nagpur University,

Nagpur, India.

E-mail id: 1.gopika.n.14@gmail.com

2.ayushi21.ikhare@gmail.com

3. samiksha.morey@gmail.com

4.  divyani396.shende@gmail.com

Mr.Swaroop Gandewar

Assistant Professor

Department of ETC Engineering

Jhulelal Institute of Technology,Lonara,

Nagpur University,

Nagpur, India.E-mail id:  sagandewar@gmail.com

Abstract

The rapid change in Technology bring user to be more comfortable with user friendly devices, this makes the consumer feel ease. This project describes, a FINGERPRINT and PASSWORD system. Fingerprint module is used to identify that the registered person is accessing the door and password system is used for confirming that the registered person knows the password that he/she can enter to access the door. It is a theft alert system. In our project we are using both Embedded and Biometric feature to access the door. It is a high security system which can be used at banks, schools / colleges, homes, offices.

Keywords— Fingerprint, Password.

1. Introduction

This project consist of a fingerprint module and password system. A biometric feature is used because it is the best way to identify or verify a person by physiological or behavioral characteristics, it is an easy way to identify a person, fingerprint module is used to identify the registered person it is the only method to identify a person using his/her fingerprint, when a person wants to access the door first he has to scan his/her fingerprint at the fingerprint module then if the fingerprint is matched with the registered fingerprint then the system will ask the person to enter password, if the fingerprint is not matched with the registered fingerprint then a text message will be send to the registered user mobile phone about the access. The password system is used because if the fingerprint is matched with registered fingerprint then to confirm that the registered person knows the password which has to be entered if the password entered is right then the door will open automatically, if by someway the fingerprint is wrong or password entered is incorrect, then a text message will be delivered to the authorized or registered person. When both fingerprint and password entered is correct then the door will be opened automatically otherwise it will not open the door but a text message will be delivered to the authorized user. This project includes a two level security system as two methods are used such as fingerprint and password , therefore this system is highly secured and makes user to be comfortable with device.     

2. RELATED WORK

There are many antitheft system , to protect the user from there assets and  privacy. In our project we use more secured and modern way to access the door. The ARM microcontroller is being used , the ARM LPC2148 it is a single-chip 16-bit/32-bit microcontroller ,  up to 512 KB flash with ISP/IAP, USB 2.0 full-speed device , 10-bit ADC and DAC. We are using fingerprint module and password system , which gives a two level security system.

3. SYSTEM OVERVIEW

This project consist of two main parts , one is the door access and second is the security for accessing. A message is send to registered user with the help of GSM which uses serial communication

4. HARDWARE SPECIFICATIONS

4.1 FINGERPRINT MODULE

Fingerprint Module is an input device in this we scan our fingerprint and stores the data This is a fingerprint sensor module with TTL UART interface for direct connections to microcontroller UART or to PC through MAX232 / USB-Serial adapter. The FP module can directly interface with 3.3 or 5V Microcontroller. A level converter (like MAX232) is required for interfacing with PC serial port.

4.2 MICROCONTROLLER

The ARM microcontroller is a general purpose 32-bit microcontroller, which offers high performance and very low power consumption. The ARM architecture is based on Reduced Instruction Set Computer (RISC) principles, and the instruction set and related decode mechanism are much simpler than those of micro programmed Complex Instruction Set Computers (CISC). This simplicity results in a high instruction throughput and impressive real-time interrupt response from a small and cost-effective processor core.

Pipeline techniques are employed so that all parts of the processing and memory systems can operate continuously.

ARM microcontroller has 512 KB flash memory system. This memory may be used for both code and data storage. It has 32 KB of  static RAM.

4.3 LCD

LCD used here is 16 by 2. Following fig. shows the microcontroller and LCD interface.

LCD Pin Description:

LCD pin configuration is as follows

VCC, VSS, VEE

VCC & VSS provides +5V & ground respectively, VEE is used for adjusting LCD contrast.

Register Select

If RS = 0, the instruction command code register is selected, allowing the user to send a command such as clear display, cursor at home, etc. If RS = 1, data to be displayed on LCD.

R/W (Read/Write)

If R/W = 1, Read operation. If R/W = 0, Write operation. The LCD, to latch information presented to its data pins uses the enable pin. When data is supplied to data pins, a high to low pulse must be applied to this pin in order to latch data present at the data pins. The pulse must be a minimum of 450ns wide. D0-D7 is used to send information to the LCD or read the contents of the LCD’s internal registers. To display letters and numbers, ASCII codes are sent for the letters A-Z, a-z and numbers 0-9 to these pins while making RS=1. There are also instruction command codes that can be sent to the LCD to clear the display or force the cursor to the home position or blink the cursor. We also use RS = 0 to check the busy flag bit. When D7 = 1, the LCD is busy in taking care of the internal operation, will not accept any new information. When D7 = 0, the LCD is ready to receive new data.

4.4 RELAY

The relay takes advantage of the fact that when electricity flows through a coil, it becomes an electromagnet. The electromagnetic coil attracts a steel plate, which is attached to a switch. So the switch’s motion (ON and OFF) is controlled by the current flowing to the coil, or not, respectively.
A very useful feature of a relay is that it can be used to electrically isolate different parts of a circuit. It will allow a low voltage circuit (e.g. 5VDC) to switch the power in a high voltage circuit (e.g. 100 VAC or more).
The relay operates mechanically, so it cannot operate at high speed.

4.5 GSM

GSM (Global System for Mobile communications) is an open, digital cellular technology used for transmitting mobile voice and data services. GSM (Global System for Mobile communication) is a digital mobile telephone system that is widely used in Europe and other parts of the world. GSM uses a variation of Time Division Multiple Access (TDMA) and is the most widely used of the three digital wireless telephone technologies (TDMA, GSM, and CDMA). GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot. It operates at either the 900 MHz or 1,800 MHz frequency band. It supports voice calls and data transfer speeds of up to 9.6 Kbit/s, together with the transmission of SMS (Short Message Service).

4.6 KEYPAD

Keypad is commonly used input/output device. Rows are connected to an output port; columns are connected to an input port. Microcontroller scans the keypad to detect the key pressed. When the key is pressed, rows and columns are connected. There is no connection between them when no key is pressed.

4.7 POWER SUPPLY:

This circuit is a small +5V power supply, which is useful when experimenting with digital electronics. Small inexpensive wall transformers with variable output voltage are available from any electronics shop and supermarket. Those transformers are easily available, but usually their voltage regulation is very poor, which makes then not very usable for digital circuit experimenter unless a better regulation can be achieved in some way.

SOFTWARE

Keil was founded in 1986 to market add-on products for the development tools.It is provided by many of the silicon vendors.The Keil generates code for any device that is compatible with the 8051,251,C16x/ST10, or ARM microcontrollers.The expectation to this would be a device that has removed or changed the instruction set.However, that device would no longer be a compatible part.When we start a project using Keil uVision integrated development environment,we must select a chip from database.Keil constantly updates the database.To ensure that we always have the latest database,we may download the recent updates from the Keil website.The programming can be done by using ‘embedded C’.

RESULT

Figure 1: ARM7 Board (LPC2148)

The implementation of realization of “AUTOMATIC DOOR ACCESS USING ARM7is done successfully. The communication is properly done without any interference between different modules in the design. Design is done to meet all the specifications and requirements. Software tools like keil uvision simulator, Flash magic to dump the source code into the microcontroller, orcad lite for the schematic diagram have been used to develop the software code before realizing the hardware.

Figure 2: Message sending

Circuit is implemented in Orcad and implemented on the microcontroller board. The performance has been verified both in software simulator and hardware design. The total circuit is completely verified functionally and is following the application software. It can be concluded that the design implemented in the present work provide portability, flexibility and the data transmission is also done with low power consumption.

Figure 3: Enter OTP

CONCLUSION

We have implemented a locker security system using FINGERPRINT, PASSWORD and GSM. It is a low cost, low in power conception, compact in size and standalone system. The microcontroller compares the passwords entered by keyboard and the registered password. If these passwords are correct the microcontroller provides necessary control signal to open the locker.This identifies a high level model for the modification of security system using both security protocols as PIN and biometric fingerprint strategy and GSM technology. We have been able to develop a fingerprint mechanism as a biometric measure to enhance the security features and the prototype of the developed application has been found promising on the account of its sensitivity to the recognition of the owners fingerprint as contained in the database.LPC 2148 provide low power consumption platform and the speed of execution can be enhanced with the use of more sophisticated microcontroller.

References

  1. INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN COMPUTER ENGINEERING & TECHNOLOGY (IJARCET) VOLUME 1, ISSUE 9, NOVEMBER 2012
  2. INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 4, ISSUE 06, JUNE 2015
  3. INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN ELECTRICAL, ELECTRONICS, INSTRUMENTATION AND CONTROL ENGINEERING VOL. 3, ISSUE 7, JULY 2015
  4. INTERNATIONAL JOURNAL OF SCIENCE AND RESEARCH (IJSR) VOLUME 5 ISSUE 5, MAY 2016
  5. INTERNATIONAL JOURNAL FOR EMERGING TRENDS IN ENGINEERING AND MANAGEMENT RESEARCH (IJETEMR) VOLUME II, ISSUE II -21ST JUNE 2016
  6. INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY (IJERT VOL. 2 ISSUE 9, SEPTEMBER – 2013
  7. D. VINOD KUMAR, PROF.M R K MURTHY, “ FINGERPRINT BASED ATM SECURITY BY USING ARM7”, IOSR JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING (IOSRJECE) ISSN : 2278-2834.
  8. INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 4, ISSUE 06, JUNE 2015 ISSN 2277-8616.
  9. INTERNATIONAL JOURNAL FOR EMERGING TRENDS IN ENGINEERING AND MANAGEMENT RESEARCH (IJETEMR) VOLUME II, ISSUE II -21ST JUNE 2016 ISSN NO: 2455-7773.

Related posts

AUTOMATIC IDENTIFICATION OF BROWN SPOT AND BLAST DISEASES OF RICE USING K-MEANS CLUSTERING ALGORITHM

admin

Efficient Integer DCT Architecture for mpeg-4 part 10/HEVC

admin

Classroom Automation and RFID Based Classroom Attendance

admin

Leave a Comment