Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 42

CHAPTER ONE

1.0 INTRODUCTION

Any system that controls the entrance and exit to those who have been authorized
may be called an access control system. The most common methods of access
control which all of us are familiar with is the traditional lock and key
arrangement. It is fine for small applications but has a number of pitfalls,
especially in application where there is a large number of a user or common door.
A properly selected access control system can overcome these problems and can be
integrated with other systems to provide a more rounded overall security solution.
Microcontroller based door control using RFID is a combination of electrical,
electronics, and mechanical technology. In our project we will like to use AT89c51
or AT89c52 microcontroller. The purpose of using this microcontroller is because
its cheaper and further upgrading is possible without changing the processing of
the chip.

1.1OBJECTIVE OF THE PROJECT

The main objective of this project is to provide security in an organization by


allowing only the authorized personnel to access the secure area. The security of
any organization is a priority for the authorities.

1.2 SIGNIFICANCE OF THE PROJECT

2. The project Enhances safety and security.


3. The project is Portable.
4. The project is Reliable
5. The project is Reconfigurable and reusable.

1.3 APPLICATIONS OF THE PROJECT

This simple circuit can be used at residential places to ensure better safety. It can
be used at organizations to ensure authorized access to highly secured places. With

1
a slight modification this Project can be used to control the switching of loads
through RFID.

1.4 SCOPE OF THE PPROJECT

RFID cards have been advertised as suitable for personal identification tasks
because they are engineered to be tamper resistant. The chip usually implements
some cryptographic algorithm. There are, however, several methods for recovering
some of the algorithm's internal state. Differential power analysis involves
measuring the precise time and electrical current required for certain encryption or
decryption operations. This can deduce the on-chip private key used by public key
algorithms such as RSA. Some implementations of symmetric ciphers can be
vulnerable to timing or power attacks as well. RFID cards can be physically
disassembled by using acid, abrasives, or some other technique to obtain
unrestricted access to the onboard microprocessor. Although such techniques
obviously involve a fairly high risk of permanent damage to the chip, they permit
much more detailed information (e.g. photomicrographs of encryption hardware) to
be extracted.

1.5 LIMITATION OF THE PROJECT

The major disadvantages of RFID technology are:


1. Its cost.
2. While the readers and sensors used to read the information are comparable in
cost to the components of a typical EM or RF theft detection system.
3. Another problem of the project is that it can deny everybody access when there
is no power supplied to the system.
4. Even though RFID Technology is secure, the security can be increased by
integrating other security measures like facial detection, finger print scanner
etc.
5. As the card details are stored in the microcontroller, only a limited number of
card details can be stored. This can be increased by implementing a memory
unit like EEPROM.

2
1.6 FUTURE SCOPE OF THE PROJECT

Health Services: The card can be used to store information such as administrative,
medical, biological and pharmaceutical records. The card simplifies the
administrative process and enables doctors to have access to a more complete and
comprehensive healthcare information. Education: The card has the function of
identifying the student and also acts as an electronic purse and can be used
purchase products from stores or tickets to public transportation. Transportation:
Rechargeable contactless cards allow ticketless and cashless travels. Parking and
telecommunications can also be paid using the smart card. This will simplify the
passenger boarding process. Welfare: Card can be used to identify the holder using
a series of personal keys and fingerprint. The card holder then uses the card to
access government databases and receive the welfare payment. The security will
help eliminate fraud.

3
CHAPTER TWO

2.0LITERATURE REVIEW

The security situation in many parts of the world today leaves much to be desired.
In Nigeria particularly, the prevalence of armed robbers and other groups that
constitute nuisance to the society has led to the loss of lives and properties worth
millions of dollars. Many of the attacks that led to the loss have occurred in the
homes or in guarded compounds and the attacks took place in spite of the existence
of seemingly impregnable security gates that were designed to ward off intruders.
The needs for electronically controlled gates that have superior security features to
those operated manually thus exist and have been on the increase in recent times.
Many attempts have been made to design such gates with various types of security
features.
In the work by D. L. Wu, Wing W. Y. NG, D. S. Yeung, and H. L. Ding (2009, pp.
2330-2334) a microprocessor was used to monitor two gates which sense the
approach of a vehicle. The gates automatically open, wait for a specified time and
then close. It is clear that the features of these gates do not provide adequate
security since any vehicle can gain entry into the compound. A system that
provides efficient gate access and an estate control to perform the job of the gate
security guard is discussed in the work by G. Ostojic, S. Stankovski, and M.
Lazarevic. The main pitfall of this system is that it uses a telephone to identify
visitors; the telephone can be used by anyone who approaches the gate.
According to F. Lourenco and C. Almeida (2009) a low-cost private office access
control system permits a user with the correct password entered on a keypad to
gain entry by controlling an electromagnetic door lock. The fact that passwords
belonging to one individual can be learned by another without the owner’s
permission is a major drawback of the system: the rogue can use the stolen
password to gain entry into the system. Radio frequency (RF) has been used in
conjunction with microcontrollers to control gates to enable vehicles to pass
through (R. Weinstein,X. L. Meng, Z. W. Song, & X. Y. Li, 2006)
D. L. Wu, Wing W. Y. NG, Patrick P. K. Chan, H. L. Ding, B. Z. Jin& D. S.
Yeung (2010, pp. 675-680.) have described a system in which swing gates are
controlled electronically using microcontrollers and infrared transmitters. This
system is only required to close and open gates and has a very limited security
feature.
4
According to M. A. Mazidi, J. C. Mazidi, & R. D. Mckinaly (2006) surveillance
cameras are used to capture and recapture the face of the driver as well as vehicle
plate numbers. These data are stored in a databank for future comparison with
visitors who will only be able to gain entry into a compound through gates if the
data match. The system has the disadvantage that users must have been properly
documented to enable them pass through the gate. The system that has been
designed in this work uses microcontrollers and radiofrequency
transmitter/receiver pair as major components. A microcontroller is programmed to
decode a given sequence of keys that is entered on a keypad; the microcontroller
commands a transmitter module to send out this code as signal at a given radio
frequency. Upon reception of this RF signal by the receiver module, another
microcontroller activates a circuitry to operate the gate automatically. And after all
challenges faced by the past developers they were not all that able to come up with
a standard system that server for security purpose and that while our group decided
to embark on this project to develop a system that will serve more than the past
once and we deiced to use a module called RFID (RADIO FREQUENCY
IDENTIFICATION).

2.1THE HISTORY OF RFID TECHNOLOGY

Radio frequency identification has been around for decades. Let see how it evolved
from its roots in World War II radar systems to today's hottest supply chain
technology.

What is RFID?
First stands for Radio Frequency Identification. Any method of identifying unique
items using radio waves. Typically, a reader (also called an interrogator)
communicates with a transponder, which holds digital information in a microchip.
But there are chipless forms of RFID tags that use material to reflect back a portion
of the radio waves beamed at them.
It’s generally said that the roots of radio frequency identification technology can be
traced back to World War II. The Germans, Japanese, Americans and British
were all using radar—which had been discovered in 1935 by Scottish physicist Sir
Robert Alexander Watson-Watt—to warn of approaching planes while they were
still miles away. The problem was there was no way to identify which planes
5
belonged to the enemy and which were a country’s own pilots returning from a
mission. The Germans discovered that if pilots rolled their planes as they returned
to base, it would change the radio signal reflected back. This crude method alerted
the radar crew on the ground that these were German planes and not Allied aircraft
(this is, essentially, the first passive RFID system). Under Watson-Watt, who
headed a secret project, the British developed the first active identify friend or foe
(IFF) system. They put a transmitter on each British plane. When it received
signals from radar stations on the ground, it began broadcasting a signal back that
identified the aircraft as friendly. RFID works on this same basic concept. A signal
is sent to a transponder, which wakes up and either reflects back a signal (passive
system) or broadcasts a signal (active system).
Retrieved from https://www.rfidjournal.com/articles/view?1338

Advances in radar and RF communications systems continued through the 1950s


and 1960s. Scientists and academics in the United States, Europe and Japan did
research and presented papers explaining how RF energy could be used to identify
objects remotely. Companies began commercializing anti-theft systems that used
radio waves to determine whether an item had been paid for or not. Electronic
article surveillance tags, which are still used in packaging today, have a 1-bit tag.
The bit is either on or off. If someone pays for the item, the bit is turned off, and a
person can leave the store. But if the person doesn't pay and tries to walk out of the
store, readers at the door detect the tag and sound an alarm.
Retrieved from https://www.rfidjournal.com/articles/view?1338/2

The First RFID based Patents


Mario W. Cardullo claims to have received the first U.S. patent for an active RFID
tag with rewritable memory on January 23, 1973. That same year, Charles Walton,
a California entrepreneur, received a patent for a passive transponder used to
unlock a door without a key. A card with an embedded transponder communicated
a signal to a reader near the door. When the reader detected a valid identity number
stored within the RFID tag, the reader unlocked the door. Walton licensed the
technology to Schlage, a lock maker, and other companies. The U.S. government
was also working on RFID systems. In the 1970s, Los Alamos National Laboratory
was asked by the Energy Department to develop a system for tracking nuclear
materials. A group of scientists came up with the concept of putting a transponder
in a truck and readers at the gates of secure facilities. The gate antenna would wake
up the transponder in the truck, which would respond with an ID and potentially
6
other data, such as the driver's ID. This system was commercialized in the mid-
1980s when the Los Alamos scientists who worked on the project left to form a
company to develop automated toll payment systems. These systems have become
widely used on roads, bridges and tunnels around the world. At the request of the
Agricultural Department, Los Alamos also developed a passive RFID tag to track
cows. The problem was that cows were being given hormones and medicines when
they were ill. But it was hard to make sure each cow got the right dosage and
wasn't given two doses accidentally. Los Alamos came up with a passive RFID
system that used UHF radio waves. The device drew energy from the reader and
simply reflected back a modulated signal to the reader using a technique known as
backscatter.

Later, companies developed a low-frequency (125 kHz) system, featuring smaller


transponders. A transponder encapsulated in glass could be injected under the cow
skin. This system is still used in cows around the world today. Low-frequency
transponders were also put in cards and used to control the access to buildings.
Retrieved from https://www.rfidjournal.com/articles/view?1338/2

Based on Research we found out the following:


Radio Frequency Identification or simply RFID is a wireless technology generally
used for automatic identification and data collection. RFID technology is used for
accessing data from a uniquely identify RFID card or tag by combining the radio
frequency and microchip technologies i.e. the data is retrieved or stored into the
RFID cards without making any physical contact. With the help of RFID
technology we can create smart systems that can be used personnel identification,
product monitoring, individual or organization security, transportation,
maintenance of inventory and supply chain tracking. RFID systems usually
comprises of three components: an RFID Card, an RFID Reader Module and a host
device where our host device is AT89S52 controller. RFID Card or Tag consists
of the data in the embedded microchip. RFID Reader is used to read the data from
the RFID Card and transfer it to the host device. The communication between the
Reader and Card is using Radio Technology whereas the communication between
RFID Reader and the host device like a microcontroller is through serial protocol.

7
2.2 CLASSIFICATION OF RFID TAGS

RFID are generally classified into two tags:


1. Active RFID Tags and
2. Passive RFID Tags.
Active RFID Tags are battery powered and they have an electronically erasable
and programmable memory. So, the necessary data can be written in to the
memory by the user and read using a RFID Reader. As they are battery powered
devices, Active RFID Tags can communicate with the RFID Reader over distances
larger than 100 feet.
Passive RFID Tags on the other hand, do not contain any battery. Passive RFID
Tags consists of a coil and a microchip. The coil acts as an antenna as well as the
source of power through induction. The microchip is a read only type memory and
the user can only read the data that already stored by the manufacturer. Passive
RFID Tags are used for short distance communication, usually 10 feet or less.
Retrieved from https://www.electronicshub.org/rfid-security-access-control-
system/
The most commonly used RFID reader is EM-18 reader module and that is the
one we are using on this project. This module has a built in antenna which is used
to power the RFID Cards and also extract the information from the Card’s
microchip. 
The development of a computer controlled security gate system explained by N.
Ahmad, S. Butler, & U. Ramachandran (2010, pp. 546-551) allows privileged
users to gain entry through a keyless door by using smart card authentication. It is
true that smart cards can be stolen thus compromising the security of this system.

Some advantages of the system over those described by K. S. Huang and S. M.


Tang, S.Lahiri, F. Lourenco and C. Almeida include:
(i) It does not need close contact to control the gate; the control can be done
from inside the car at a distance.
(ii) It operates as a standalone system and does not require a network provider
for reception of signals.
(iii) It does not use a keypad to generate the code necessary for the opening and
closing of the gate.
(iv) RFID module enhances the security of the system since it does not require
very many trials by an intruder to succeed in breaking into the system.
(v) The features of the system that are controlled by the firmware resident in the
memory of the microcontrollers can be easily improved for future upgrade.
8
9
CHAPTER THREE

3.0 DESIGN METHODOLOGY

Before we continue with our report let look at the concept of the project

3.1 DESIGN CONCEPT

A RFID based Door Lock or Access Control System is based on some simple
concepts. We store a set of RFID card data in our system, say 3 or 10 RFID card
data. When the person with the right RFID card (compatible to data preloaded in
our program/system) come and swipes his RFID tag, access will be granted. When
the person with the wrong RFID card (whose data is not loaded in our system)
swipes his RFID tag, access will be denied. I hope you understand the system
concept of RFID based Door Lock.

3.2 DESIGN SPECIFICATION


Calculation to the power supply circuit or panel for the project;
The formula for calculating the Capacitive Reactance is given below.

So, for 2.2µF Capacitor, XC can be calculated as follows.

So, from Ohm’s Law, the current that the capacitor allows is given by I = V/R.
Hence, the current through the capacitor is = 230/1447.59 = 0.158 Amperes =
158mA.
This is the total current that enters the bridge rectifier. Now, output of the Bridge
Rectifier is filtered using a Capacitor. It is important to select an appropriated
voltage rating for this capacitor.
The input to the Bridge Rectifier is 230V AC, which is the RMS Voltage. But the
maximum voltage at the input of the Bridge Rectifier is given by
VMAX = VRMS x √2 = 230 x 1.414 = 325.26 V.
Hence, you need to use a 400V rated filter capacitor. The Rectified DC voltage is
around 305V. This must be brought down to a usable range for lighting up the
LED. Hence, LM78xx series regulator is used in the project.
An LM7805 is used for this purpose. There are three important factors associated
with the LM7805 that is acting as a regulator: A Series Resistor, Power rating of

10
that Resistor and the Power Rating of the regulator first, and the Series Resistor.
This resistor will limit the current flowing through the regulator. The following
formula can be used in selecting the series resistor.
RS – VIN – VR/IL + IR
Here, VIN is the input voltage to the Zener Diode and is = 305V.
VR is the Regulator Voltage (which is same as the load voltage VL) = 5V.
IL is the load current i.e. the current through the LED and is = 5mA.
IZ is the current through the Regulator and is = 1000mA.
Therefore, the value of the Series Resistor RS can be calculated as follows.
RS = 305 – 5/ 5*10-3+10*10-3 = 20,000/ approx. 20k
Now, the Power rating of this Resistor. The Power Rating of the series resistor is
very important as it determines the amount of power the resistor can dissipate. To
calculate the power rating of the Series Resistor R S, you can use the following
formula.
Power Rating of Rs = (VIN – VR)2/ RS = (305 – 5)2 / 20000 = 4.5W
Finally, the Power Rating of the Regulator. You can use the following formula to
calculate the Power Rating of the Zener Diode.
Power Rating Of Regulator = (VIN-VR)*VR/RS = (305-5)*5/20000 = 0.08W
Based on the above calculations, we have chosen the series resistor of 20KΩ
Resistance rated at 5W and a 5V regulator rated at 1W (actually, a quarter Watt
regulator would suffice).

3.3 BLOCK DIAGRAM OF RFID BASED DOOR CONTROL

A block diagram is a diagram of a system in which the principal parts or functions


are represented by blocks connected by lines that show the relationships of the
blocks by Wikipedia. They are heavily used in engineering in hardware design,
electronic design, software design, and process flow diagrams. Block diagrams are
typically used for higher level, less detailed descriptions that are intended to clarify
overall concepts without concern for the details of implementation. Contrast this
with the schematic diagrams and layout diagrams used in electrical engineering,
which show the implementation details of electrical components and physical
construction.

POWER AT89S52 DISPLAY UNIT 11


MODULE
RFID LOAD
MODULE

Fig 3.01 Block diagram description of RFID based door control

Power module:
The power module unit consist of a step down transformer of a value 240-12volt
were connected to the four diodes which were connected back to back and front to
front to the capacitor(100nf/50volt) and the diode convert the alternative current
of 12V which is the output from the transformer to direct current. The rectified
output passes through an electrolytic capacitor to filter out the ripples. The resistor
in this power module unit was used as a current limiter (i.e. current limiting
resistor) also an indicator which is a light emitting diode (LED) was used to
indicate the presence of alternative current in the circuit.

RFID module:
The RFID module unit is consist of passive smart card reader that is connected to
the micro-controller (AT89S52) through the serial port of the controller, A Passive
type RFID Card is used in this project. When this card is placed near the RFID
Reader Module, the antenna coil in the Reader energies the coil in the RFID card
through mutual induction. As a result, the microchip in the reader also gets enough
power to turn it on. Now the coil in the reader acts as an antenna and transfers the
data in the microchip to the reader module through radio communication. The
reader module, then communicates with the microcontroller through UART
protocol to transfer the data received from the card.

DISPLAY UNIT

12
In this display unit an 2x16 LCD is used to display massage for the user weather
he/she is using the correct card, if using correct card it will display access granted
but in a situation where by the user is with a wrong card it will display access
denied.

LOAD UNIT
This unit consist of a high power motor driver that is build around LM293 IC that
is used to drive a dc motor, so when the user swipe a correct card on the module it
activate the motor through the IC.

AT89S52 UNIT
8052 microcontroller is used for controlling the complete process of this RFID
based door control system. Here by using 8052 we are receiving RFID data and
sending status or messages to LCD and also controlling the load that is connected
to the load driving unit.

3.4 CIRCUIT DIAGRAM OF RFID BASED DOOR CONTROL

Fig 3.02The circuit diagram of RIFD based door control

13
Fig 3.03 The power supply diagram of RIFD based door control

14
3.5 PROGRAM FLOW CHART

START

INITIALIZEING

NO
IS CARD
CLOSE TO READER

YES

IS CODE NO
ACCESS DENIED
OK

YES

ACCESS GRANTED

STOP

Fig. 3.04 Programme Flow Chart

15
CHAPTER FOUR

4.0 CONTRUCTION, TESTING AND PACKAGING

Circuit Construction

The main components of our project are Microcontroller, RFID Reader, RFID
Cards or Tags, an LCD display, L293D Motor Driver IC and a Motor. For the
microcontroller to function properly, we need to connect an 11.0592 MHz
oscillator along with two ceramic capacitors of capacitance 33pF to the
microcontroller. Pin 31 of the microcontroller i.e. EA Pin is connected to 5V using
a current limiting resistor of resistance 10KΩ.In order to reset the microcontroller,
the RST pin (Pin 9) must be momentarily connected to 5V. Hence, a combination
of push button, 10KΩ resistor and 10µF capacitor is used in the reset circuit. An
LCD Display is used in this project to display the details of the card. The data pins
of the LCD are connected to PORT1.The control pins are connected to P3.6, GND
and P3.7 and a 10KΩ potentiometer is connected to adjust the contrast. The next
component we need to connect to the microcontroller is the RFID reader module.
The communication between the Reader and the microcontroller is using UART
protocol. Hence, we need to use the TX and RX pins for communication. Connect
the RXD pin (Pin 3.0) of the microcontroller to the TX pin of the RFID Reader
module. Similarly, connect the TXD pin (P3.1) of the microcontroller to the RX
pin of the RFID Reader module. Finally, we need to connect the motor driver IC to
the PORT0 of the microcontroller. An important note is that Port 2 pins must be
externally pulled high in order to use them as input / output pins. Connect the two
input pins of the motor driver i.e. IN1 and IN2 (Pins 2 and 7) to Port 2 pins i.e.
P2.0 and P2.1 of the microcontroller. A motor is connected to output pins of the
motor driver. And the hole circuit is power with AC supply rectifying circuit that is
used to convert AC to DC.

16
4.1COMPOMENT DESCRIPTION

Fig 4.01 Lm7805 Regulator

Power supply IC 7805


The KA78XX/KA78XXA series of three-terminal positive regulator are available
in the TO-220/D-PAK package and with several fixed output voltages, making
them useful in a wide range of applications. In the name of this IC the last two
numbers indicate the regulated voltage which will be the output of this IC i.e. 7805
indicate that the regulated voltage in the output if this is 5 volts. Each type employs
internal current limiting, thermal shut down and safe operating area protection,
making it essentially indestructible. If adequate heat sinking is provided, they can
deliver over 1A output current. Although designed primarily as fixed voltage
regulators, these devices can be used with external components to obtain adjustable
voltages and currents.

Features
• Output Current up to 1A
• Output Voltages of 5, 6, 8, 9, 10, 12, 15, 18, 24V
• Thermal Overload Protection
• Short Circuit Protection
• Output Transistor Safe Operating Area Protection

17
Microcontroller

Fig 4.02 Microcontroller AT89S52

The AT89S52 (6 AND 12 clock per machine cycle) is a low-power, high


performance CMOS 8-bit microcontroller with 4K bytes of in-system
programmable Flash memory. The device is manufactured using Philips’s high-
density nonvolatile memory technology. The on-chip Flash allows the program
memory to be reprogrammed in-system or by a conventional nonvolatile memory
pro- grammar. By combining a versatile 8-bit CPU with in-system programmable
Flash on a monolithic chip, the Philips AT89S52 is a powerful microcontroller
which provides a highly-flexible and cost-effective solution to many embedded
control applications.
The AT89S52 provides the following standard features: 4K bytes of Flash, 128
bytes of RAM, 32 I/O lines, Watchdog timer, two data pointers, two 16-bit
timer/counters, a six-vector two-level interrupt architecture, a full duplex serial
port, on-chip oscillator, and clock circuitry. In addition, the AT89S52 is designed
with static logic for operation down to zero frequency and supports two software
selectable power saving modes. The Idle Mode stops the CPU while allowing the
RAM, timer/counters, serial port, and interrupt system to continue functioning. The
Power-down mode saves the RAM con- tents but freezes the oscillator, disabling
all other chip functions until the next interrupt or hardware reset.

FEATURES
• 4 KB Reprogrammable flash.
• 32 Programmable I/O lines.
• 16 bit Timer/Counter 2.

18
• 8 Interrupt sources.
• Power range: 4V – 5.5V
• Endurance : 1000 Writes / Erase cycles
• Fully static operation: 0 Hz to 33 MHz
• Three level program memory lock
• Full duplex UART serial channel
• Low power idle and power down modes
• Interrupt recovery from power down modes
• 128 B internal RAM.

Pin description

Fig 4.03 Microcontroller pin description

VCC
The VCC pin if for the supply voltage. The microcontroller supply voltage is 5
volts. The VCC is applied at pin no.40 of the microcontroller as shown in figure-
3.02.

GND
The GND is for ground. In microcontroller ground is at pin no.20 as shown in
figure-3.02.

19
OSCILLATOR (XTAL1 AND XTAL2)
The XTAL1 and XTAL2 are provided for connecting a resonant network to form
an oscillator. Crystal frequency ranges from 1MHz to 16MHz. the oscillator
formed by the crystal, capacitor and an on-chip inverter generates a pulse train at
frequency of the crystal.

Port 0
Port 0 is an 8-bit open drain bidirectional I/O port. As an output port, each pin can
sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as
high impedance inputs. Port 0 can also be configured to be the multiplexed low-
order address/data bus during accesses to external program and data memory. In
this mode, P0 has internal pull-ups. Port 0 also receives the code bytes during
Flash programming and outputs the code bytes during program verification.
External pull-ups are required during program verification.

Port 1
Port 1 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 1 output
buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins, they
are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 1
pins that are externally being pulled low will source current (IIL) because of the
internal pull-ups. In addition, P1.0 and P1.1 can be configured to be the
timer/counter 2 external count input (P1.0/T2) and the timer/counter 2 trigger input
(P1.1/T2EX), respectively, as shown in the following table. Port 1 also receives the
low-order address bytes during Flash programming and verification.

Port 2
Port 2 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 2 output
buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins, they
are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 2
pins that are externally being pulled low will source current (IIL) because of the
internal pull-ups. Port 2 emits the high-order address byte during fetches from
external program memory and during accesses to external data memory that uses
16-bit addresses (MOVX @DPTR). In this application, Port 2 uses strong internal
pull-ups when emitting 1s. During accesses to external data memory that uses 8-bit
addresses (MOVX @ RI), Port 2 emits the contents of the P2 Special Function
Register. Port 2 also receives the high-order address bits and some control signals
during Flash programming and verification.

20
Port 3
Port 3 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 3 output
buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins, they
are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 3
pins that are externally being pulled low will source current (IIL) because of the
pull-ups.

Port Pin Alternate Functions


P3.0 RXD (serial input port)
P3.1 TXD (serial output port)
P3.2 INT0 (external interrupt 0)
P3.3 INT1 (external interrupt 1)
P3.4 T0 (timer 0 external input)
P3.5 T1 (timer 1 external input)
P3.6 WR (external data memory write strobe)
P3.7 RD (external data memory read strobe)
P1.0 T2 (external count input to Timer/Counter 2), clock-out
P1.1 T2EX (Timer/Counter 2 capture/reload trigger and direction control)
P1.5 MOSI (used for In-System Programming)
P1.6 MISO (used for In-System Programming)
P1.7 SCK (used for In-System Programming)
Port 3 receives some control signals for Flash programming and verification.
Port 3 also serves the functions of various special features of the AT89S52, as
shown in the following table.

RST
Reset input high on this pin no.9 as shown in figure-3.3 for two machine cycles
while the oscillator is running resets the device. This pin drives high for 98
oscillator periods after the Watchdog times out. The DISRTO bit in SFR AUXR
(address 8EH) can be used to disable this feature. In the default state of bit
DISRTO, the RESET HIGH out feature is enabled.

ALE/PROG
Address Latch Enable (ALE) is an output pulse for latching the low byte of the
address during accesses to external memory. The ALE pin is pin no.30 in the
microcontroller chip as shown in figure-3.06. This pin is also the program pulse
input (PROG) during Flash programming. In normal operation, ALE is emitted at a
constant rate of 1/6 the oscillator frequency and may be used for external timing or
21
clocking purposes. Note, however, that one ALE pulse is skipped during each
access to external data memory. If desired, ALE operation can be disabled by
setting bit 0 of SFR location 8EH. With the bit set, ALE is active only during a
MOVX or MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the
ALE-disable bit has no effect if the microcontroller is in external execution mode.

PSEN
Program Store Enable (PSEN) is the read strobe to external program memory. The
PSEN pin is pin no.29 in the microcontroller chip. When the PV89V51RD2 is
executing code from external program memory, PSEN is activated twice each
machine cycle, except that two PSEN activations are skipped during each access to
external data memory.

EA/VPP
External Access Enable. The EA/VPP is pin no.31 in microcontroller. EA must be
strapped to GND in order to enable the device to fetch code from external program
memory locations starting at 0000H up to FFFFH. Note, however, that if lock bit 1
is programmed, EA will be internally latched on reset. EA should be strapped to
VCC for internal program executions. This pin also receives the 12-volt
programming enable voltage (VPP) during Flash programming.

Resistor:

Fig. 4.04 Resistor and symbol


Types of resisters.
A resistor is a linear, passive two-terminal electrical component that implements
electrical resistance as a circuit element. The current through a resistor is in direct
proportion to the voltage across the resistor's terminals. Thus, the ratio of the
voltage applied across a resistor's terminals to the intensity of current through the
circuit is called resistance. This relation is represented by Ohm's law:
22
Resistors are common elements of electrical networks and electronic circuits and
are ubiquitous in most electronic equipment. Practical resistors can be made of
various compounds and films, as well as resistance wire (wire made of a high-
resistivity alloy, such as nickel-chrome). Resistors are also implemented within
integrated circuits, particularly analog devices, and can also be integrated into
hybrid and printed circuits.

The electrical functionality of a resistor is specified by its resistance: common


commercial resistors are manufactured over a range of more than nine orders of
magnitude. When specifying that resistance in an electronic design, the required
precision of the resistance may require attention to the manufacturing tolerance of
the chosen resistor, according to its specific application. The temperature
coefficient of the resistance may also be of concern in some precision applications.
Practical resistors are also specified as having a maximum power rating which
must exceed the anticipated power dissipation of that resistor in a particular circuit:
this is mainly of concern in power electronics applications. Resistors with higher
power ratings are physically larger and may require heat sinks. In a high-voltage
circuit, attention must sometimes be paid to the rated maximum working voltage of
the resistor.
Practical resistors have a series inductance and a small parallel capacitance; these
specifications can be important in high-frequency applications. In a low-noise
amplifier or pre-amp, the noise characteristics of a resistor may be an issue. The
unwanted inductance, excess noise, and temperature coefficient are mainly
dependent on the technology used in manufacturing the resistor. They are not
normally specified individually for a particular family of resistors manufactured
using a particular technology. A family of discrete resistors is also characterized
according to its form factor, that is, the size of the device and the position of its
leads (or terminals) which is relevant in the practical manufacturing of circuits
using them.

23
Capacitor

Fig. 4.05 Capacitor

Types of capacitor

Fig. 4.06 Structure of capacitor

A capacitor (formerly known as condenser) is a passive two-terminal electrical


component used to store energy in an electric field. The forms of practical
capacitors vary widely, but all contain at least two electrical conductors separated
by a dielectric (insulator); for example, one common construction consists of metal
foils separated by a thin layer of insulating film. Capacitors are widely used as
parts of electrical circuits in many common electrical devices.

24
When there is a potential difference (voltage) across the conductors, a static
electric field develops across the dielectric, causing positive charge to collect on
one plate and negative charge on the other plate. Energy is stored in the
electrostatic field. An ideal capacitor is characterized by a single constant value,
capacitance, measured in farads. This is the ratio of the electric charge on each
conductor to the potential difference between them.
The capacitance is greatest when there is a narrow separation between large areas
of conductor; hence capacitor conductors are often called "plates," referring to an
early means of construction. In practice, the dielectric between the plates passes a
small amount of leakage current and also has an electric field strength limit,
resulting in a breakdown voltage, while the conductors and leads introduce an
undesired inductance and resistance. Capacitors are widely used in electronic
circuits for blocking direct current while allowing alternating current to pass, in
filter networks, for smoothing the output of power supplies, in the resonant circuits
that tune radios to particular frequencies and for many other purposes.
The simplest capacitor consists of two parallel conductive plates separated by a
dielectric with permittivity ε (such as air). The model may also be used to make
qualitative predictions for other device geometries. The plates are considered to
extend uniformly over an area A and a charge density ±ρ = ±Q/A exists on their
surface. Assuming that the width of the plates is much greater than their separation
d, the electric field near the centre of the device will be uniform with the
magnitude E = ρ/ε. The voltage is defined as the line integral of the electric field
between the plates. Solving this for C = Q/V reveals that capacitance increases
with area and decreases with separation
εA
C=
d
.

The capacitance is therefore greatest in devices made from materials with a high
permittivity, large plate area, and small distance between plates.

We see that the maximum energy is a function of dielectric volume, permittivity,


and dielectric strength per distance. So increasing the plate area while decreasing
the separation between the plates while maintaining the same volume has no
change on the amount of energy the capacitor can store. Care must be taken when
increasing the plate separation so that the above assumption of the distance
between plates being much smaller than the area of the plates is still valid for these
equations to be accurate.
25
LED
A light-emitting diode (LED) is a semiconductor light source. LEDs are used as
indicator lamps in many devices and are increasingly used for other lighting.
Introduced as a practical electronic component in 1962, early LEDs emitted low-
intensity red light, but modern versions are available across the visible, ultraviolet,
and infrared wavelengths, with very high brightness.

Fig. 4.07 Light Emitting Diode


When a light-emitting diode is forward-biased (switched on), electrons are able to
recombine with electron holes within the device, releasing energy in the form of
photons. This effect is called electroluminescence and the color of the light
(corresponding to the energy of the photon) is determined by the energy gap of the
semiconductor. LEDs are often small in area (less than 1 mm2), and integrated
optical components may be used to shape its radiation pattern. LEDs present many
advantages over incandescent light sources including lower energy consumption,
longer lifetime, improved robustness, smaller size, and faster switching. LEDs
powerful enough for room lighting are relatively expensive and require more
precise current and heat management than compact fluorescent lamp sources of
comparable output.
Light-emitting diodes are used in applications as diverse as replacements for
aviation lighting, automotive lighting (in particular brake lamps, turn signals, and
indicators) as well as in traffic signals. LEDs have allowed new text, video
displays, and sensors to be developed, while their high switching rates are also
useful in advanced communications technology. Infrared LEDs are also used in the
remote control units of many commercial products including televisions, DVD
players, and other domestic appliances.
The first commercial LEDs were commonly used as replacements for
incandescent and neon indicator lamps, and in seven-segment displays, first in
expensive equipment such as laboratory and electronics test equipment, then later
26
in such appliances as TVs, radios, telephones, calculators, and even watches (see
list of signal uses).
These red LEDs were bright enough only for use as indicators, as the light output
was not enough to illuminate an area. Readouts in calculators were so small that
plastic lenses were built over each digit to make them legible. Later, other colors
grew widely available and also appeared in appliances and equipment. As LED
materials technology grew more advanced, light output rose, while maintaining
efficiency and reliability at acceptable levels. The invention and development of
the high-power white-light LED to use for illumination, which is fast replacing
incandescent and fluorescent lighting. (See list of illumination applications). Most
LEDs were made in the very common 5 mm T1¾ and 3 mm T1 packages, but with
rising power output, it has grown increasingly necessary to shed excess heat to
maintain reliability, so more complex packages have been adapted for efficient
heat dissipation. Packages for state-of-the-art high-power LEDs bear little
resemblance to early LEDs.
LCD

Fig, 4.08 Liquid Crystal Display

These LCD screens are limited to monochrome text and are often used
in copiers, fax machines, laser printers, industrial test equipment, networking
equipment such as routers and storage devices.
The screens come in a small number of standard configurations. Common sizes are
8x1 (one row of eight characters), 16×2, 20×2 and 20×4. Larger custom sizes are
made with 32, 40 and 80 characters and with 1, 2, 4 or 8 lines. The most commonly
manufactured larger configuration is 40×4 characters, which requires two
individually addressable HD44780 controllers with expansion chips as a single
HD44780 chip can only address up to 80 characters. A common smaller size is
27
16×2, and this size is readily available as surplus stock for hobbyist and
prototyping work.
Character LCDs can come with or without backlights, which may
be LED, fluorescent, or electroluminescent. Character LCDs use a standard 16
contact interface, commonly using pins or card edge connections on 0.1 inch /
2.54mm centers. Those without backlights may have only 14 pins, omitting the
final two pins powering the light.
The pin out is as follows:
• Ground
• VCC (+3.3 to +5V)
• Contrast adjustment (VO)
• Register Select (RS). RS=0: Command, RS=1: Data
• Read/Write (R/W). R/W=0: Write, R/W=1: Read
• Clock (Enable). Falling edge triggered
• Bit 0 (Not used in 4-bit operation)
• Bit 1 (Not used in 4-bit operation)
• Bit 2 (Not used in 4-bit operation)
• Bit 3 (Not used in 4-bit operation)
• Bit 4
• Bit 5
• Bit 6
• Bit 7
• Backlight Anode (+)
• Backlight Cathode (-)
The nominal operating voltage for LED backlights is 5V at full brightness, with
dimming at lower voltages dependent on the details such as LED color. Non-LED
backlights often require higher voltages.
The LCD interface allows for two modes of operation, 8-bit and 4-bit. Using the 4
bit mode is more complex, but reduces the number of active connections needed.
The chip starts in 8 bit mode, with the instruction set designed to allow switching
without requiring the lower four data pins. Once in 4 bit mode, character and
control data is transferred as pairs of 4 bit "nibbles" on the upper data pins, D4-D7.
28
L293D IC

Fig. 4.09 L293D IC

L293D is a typical Motor driver or Motor Driver IC which allows DC motor to


drive on either direction. L293D is a 16-pin IC which can control a set of two DC
motors simultaneously in any direction. It means that you can control two DC
motor with a single L293D IC. Dual H-bridge Motor Driver integrated circuit
(IC).
Concept
It works on the concept of H-bridge. H-bridge is a circuit which allows the voltage
to be flown in either direction. As you know voltage need to change its direction
for being able to rotate the motor in clockwise or anticlockwise direction, Hence
H-bridge IC are ideal for driving a DC motor.
In a single L293D chip there are two h-Bridge circuit inside the IC which can
rotate two dc motor independently. Due its size it is very much used in robotic
application for controlling DC motors. Given below is the pin diagram of a L293D
motor controller. There are two Enable pins on l293d. Pin 1 and pin 9, for being
able to drive the motor, the pin 1 and 9 need to be high. For driving the motor with
left H-bridge you need to enable pin 1 to high. And for right H-Bridge you need to
make the pin 9 to high. If anyone of the either pin1 or pin9 goes low then the motor
in the corresponding section will suspend working. It’s like a switch.
TIP: you can simply connect the pin16 VCC (5v) to pin 1 and pin 9 to make them
high.
 

29
Fig. 4.10 L293D Pin Diagram

 Working of L293D
There are 4 input pins for l293d, pin 2,7 on the left and pin 15 ,10 on the right as
shown on the pin diagram. Left input pins will regulate the rotation of motor
connected across left side and right input for motor on the right hand side. The
motors are rotated on the basis of the inputs provided across the input pins as
LOGIC 0 or LOGIC 1.
In simple you need to provide Logic 0 or 1 across the input pins for rotating the
motor.

L293D Logic Table.


Let’s consider a Motor connected on left side output pins (pin 3.6). For rotating the
motor in clockwise direction the input pins has to be provided with Logic 1 and
Logic 0.   
• Pin 2 = Logic 1 and Pin 7 = Logic 0 | Clockwise Direction
• Pin 2 = Logic 0 and Pin 7 = Logic 1 | Anticlockwise Direction
• Pin 2 = Logic 0 and Pin 7 = Logic 0 | Idle [No rotation] [Hi-Impedance state]
• Pin 2 = Logic 1 and Pin 7 = Logic 1 | Idle [No rotation]

30
Crystal oscillator

Electronic symbol

31
Fig. 4.11 Crystal oscillator

A crystal oscillator is an electronic oscillator circuit that uses the mechanical


resonance of a vibrating crystal of piezoelectric material to create an electrical
signal with a precise frequency. This frequency is often used to keep track of time,
as in quartz wristwatches, to provide a stable clock signal for digital integrated
circuits, and to stabilize frequencies for radio transmitters and receivers. The most
common type of piezoelectric resonator used is the quartz crystal, so oscillator
circuits incorporating them became known as crystal oscillators, [1] but other
piezoelectric materials including polycrystalline ceramics are used in similar
circuits.
A crystal oscillator, particularly one made of quartz crystal, works by being
distorted by an electric field when voltage is applied to an electrode near or on the
crystal. This property is known as electrostriction or inverse piezoelectricity. When
the field is removed, the quartz - which oscillates in a precise frequency - generates
an electric field as it returns to its previous shape, and this can generate a voltage.
The result is that a quartz crystal behaves like an RLC circuit.
Quartz crystals are manufactured for frequencies from a few tens of kilohertz to
hundreds of megahertz. More than two billion crystals are manufactured
annuallyMost are used for consumer devices such as wristwatches, clocks, radios,
computers, and cell phones. Quartz crystals are also found inside test and
measurement equipment, such as counters, signal generators, and oscilloscopes.

32
The crystal oscillator circuit sustains oscillation by taking a voltage signal from the
quartz resonator, amplifying it, and feeding it back to the resonator. The rate of
expansion and contraction of the quartz is the resonant frequency, and is
determined by the cut and size of the crystal. When the energy of the generated
output frequencies matches the losses in the circuit, an oscillation can be sustained.
An oscillator crystal has two electrically conductive plates, with a slice or tuning
fork of quartz crystal sandwiched between them. During startup, the controlling
circuit places the crystal into an unstable equilibrium, and due to the positive
feedback in the system, any tiny fraction of noise is amplified, ramping up the
oscillation. The crystal resonator can also be seen as a highly frequency-selective
filter in this system: it only passes a very narrow sub band of frequencies around
the resonant one, attenuating everything else. Eventually, only the resonant
frequency is active. As the oscillator amplifies the signals coming out of the
crystal, the signals in the crystal's frequency band becomes stronger, eventually
dominating the output of the oscillator. The narrow resonance band of the quartz
crystal filters out all the unwanted frequencies. The output frequency of a quartz
oscillator can be either that of the fundamental resonance or of a multiple of that
resonance, called a harmonic frequency. Harmonics are an exact integer multiple
of the fundamental frequency. But, like many other mechanical resonators, crystals
exhibit several modes of oscillation, usually at approximately odd integer multiples
of the fundamental frequency. These are termed "overtone modes", and oscillator
circuits can be designed to excite them. The overtone modes are at frequencies
which are approximate, but not exact odd integer multiples of that of the
fundamental mode, and overtone frequencies are therefore not exact harmonics of
the fundamental. High frequency crystals are often designed to operate at third,
fifth, or seventh overtones. Manufacturers have difficulty producing crystals thin
enough to produce fundamental frequencies over 30MHz. To produce higher
frequencies, manufacturers make overtone crystals tuned to put the 3rd, 5th, or 7th
overtone at the desired frequency, because they are thicker and therefore easier to
manufacture than a fundamental crystal that would produce the same frequency—
although exciting the desired overtone frequency requires a slightly more
complicated oscillator circuit. A fundamental crystal oscillator circuit is simpler
and more efficient and has more pull ability than a third overtone circuit.
Depending on the manufacturer, the highest available fundamental frequency may
be 25 MHz to 66MHz. A major reason for the wide use of crystal oscillators is
their high Q factor. A typical Q value for a quartz oscillator ranges from 104 to 106,
compared to perhaps 102 for an LC oscillator. The maximum Q for a high stability

33
quartz oscillator can be estimated as Q = 1.6 × 107/f, where f is the resonant
frequency in megahertz.
One of the most important traits of quartz crystal oscillators is that they can exhibit
very low phase noise. In many oscillators, any spectral energy at the resonant
frequency is amplified by the oscillator, resulting in a collection of tones at
different phases. In a crystal oscillator, the crystal mostly vibrates in one axis;
therefore only one phase is dominant. This property of low phase noise makes
them particularly useful in telecommunications where stable signals are needed
and in scientific equipment where very precise time references are needed.
Environmental changes of temperature, humidity, pressure, and vibration can
change the resonant frequency of a quartz crystal, but there are several designs that
reduce these environmental effects. These include the TCXO, MCXO, and OCXO
which are defined below. These designs, particularly the OCXO, often produce
devices with excellent short-term stability. The limitations in short-term stability
are due mainly to noise from electronic components in the oscillator circuits. Long-
term stability is limited by aging of the crystal.
Due to aging and environmental factors (such as temperature and vibration), it is
difficult to keep even the best quartz oscillators within one part in 10 10 of their
nominal frequency without constant adjustment. For this reason, atomic oscillators
are used for applications requiring better long-term stability and accuracy.

LM2003A (RELAY DRIVER)

Fig. 4.12 LM2003A (Relay Driver)

34
The relay driver uln2003 IC is a high voltage and current Darlington array IC, it
comprises of 7-open collector Darlington pairs with common emitters. A pair of
Darlington is an arrangement of two bipolar transistors. This IC belongs to the
family of ULN200x ICs and various types of this family interface to various logic
families. This ULN2003 IC is for 5V TTL and CMOS logic devices. These ICs are
used as relay drivers as well as to drive a wide range of loads, line drivers, display
drivers etc. This IC is also normally used while driving Stepper Motors. The pairs
of Darlington in ULN2003 is esteemed at 500mA and can withstand peak current
of 600mA.In the pin layout, the i/ps & o/ps are provided reverse to each other.
Each driver also has a suppression diode to dissipate voltage spikes while driving
inductive loads

WORKING OF ULN2003 IC:

The ULN2003 IC consists of eight NPN Darlington pair which provides the proper
current amplification required by the loads. We all know that the transistors are
used to amplify the current but here Darlington transistor pairs are used inside the
IC to make the required amplification.

Fig. 4.13 An NPN Darlington pair

A Darlington pair is two transistors that act as a single transistor providing high
current gain. In this pair the current amplified by the first transistor is further
amplified by the next transistor providing high current to the output
terminal. When no base voltage is applied that when no signal is is given to the
input pins of the IC, there will be no base current and transistor remains in off
state. When high logic is fed to the input both the transistors begin to conduct
providing a path to ground for the external load that the output is connected. Thus

35
when an input is applied corresponding output pin drops down to zero there by
enabling the load connected to complete its path.

Transformers

Fig. 3.14 Transformer

A transformer uses the principles of electromagnetism to change one A.C. voltage


level to another. Faraday's work in the 19th century showed that a changing current
in a conductor (e.g. a transformer primary winding) sets up a changing magnetic
field around the conductor. If another conductor (secondary winding) is placed
within this changing magnetic field a voltage will be induced into that winding.

Fig. 3.15 Basic Transformer Operation.

36
Transformation Ratio.
Basic Transformer operation can be described by two formulae relating the
transformation ratio to the turns ratio of the transformer windings.
 VP = the primary voltage.
 IP = the primary current.
 VS = the secondary voltage.
 IS = the secondary current.
 NP = the number of turns in the primary winding.
 NS = the number of turns in the secondary winding.

Volts per Turn.


A transformer with a primary winding of 1000 turns and a secondary winding of
100 turns has a turn’s ratio of 1000:100 or 10:1. Therefore 100 volts applied to the
primary will produce a secondary voltage of 10 volts. Another way to consider
transformer voltages is by volts/turn; if the 100 volts applied to the 1000 turn
primary produces 100/1000 = 0.1 volts per turn, then each single turn on the 100
turn secondary winding will produce 0.1V so the total secondary voltage will be
100 × 0.1V = 10V.The same method can be used to find the values of voltage
appearing across individual tapping’s of an autotransformer when the number of
turns per tapping is known. Simply divide the total voltage across the whole
winding by the total number of turns, and multiply this result by the number of
turns in the particular tapping.

4.2 TESTING INSTRUMENT

When it comes to designing electronic circuits, testing and measuring various


parameters like current, voltage, frequency, resistance, capacitance, etc. is very
important. Hence, the Test and Measurement Equipment like Oscilloscopes, Multi-
meters, Logic Analyzers, Function Generators (or Signal Generators) are often
used regularly but in our project we used multi-meter only

Multi-meter

A multi-meter is a combination of Voltmeter, Ammeter and Ohmmeter. They


provide an easy way to measure different parameters of an electronic circuit like
current, voltage etc. Multi-meters can measure values in both AC and DC. Earliest

37
Multi-meters are Analog and consists of a pointing needle. Modern Multi-meters
are Digital and are often called as Digital Multi-meters or DMMs.

Fig. 4.17 Multimeters

DMMs are available as handheld devices as well as bench devices. A Multi-meter


can be very handy in finding basic faults in a circuit.

38
CHAPTER FIVE

5.0 ENGINEERING BILL OF MATERIALS FOR RFID BASED DOOR


CONTROL SYSTEM

S/N Description Qty Price per rate (N) Total price (N)
1 IN40007 6 30 180

2 Resistor 6 20 120

3 Crystal Oscillator 1 100 100

4 RFID module 1 15000 15000

5 Transformer (Half- 3 1200 3600


Wave)
6 Led 1 30 30

7 Jumper Wire 2yrds 100 200

8 Vero-board 1 150 150

9 Plastic Casing 1 800 800

10 Gum 1ptn 400 400

11 Soldering Led 3yrds 100 300

12 Soldering Iron 1 850 850

13 Lm7805 2 150 300

14 LM293 1 300 300

15 Relay 3 300 900


16 Motor 1 400 400
TOTAL 23,730

Table 5.1 Engineering bill of material

39
CHAPTER SIX

6.0 CONCLUSION

In conclusion, the aim of this project is to design an RFID based security access
control system using 8051 microcontroller, in which only authorized personnel are
allowed access to a secure area. The working of the project is explained here.
When the circuit is powered ON, the microcontroller will initially display a
message as “Swipe the Card” on the LCD display. When the RFID Card or Tag is
swiped against the RFID reader, it will detect the ID card and sends the unique
card no. to the microcontroller via serial terminal. With the help of suitable
programming, we need to compare the received card no. with the numbers that are
already stored in the microcontroller or any database like external memory unit. If
the received number is matched with the already stored number, then the
microcontroller will display the name of the card holder on the LCD and activates
the motor driver IC. As a result, the door is opened for a predefined duration after
which the door is automatically closed. If there is no match for the received
numbers with the stored numbers, then the microcontroller will not open the door
and displays a message as “Access Denied” on the LCD display. 

40
6.1 RECOMMENDATION
We are recommending this project to industries, house and organization that needs
a security system that will prevent unauthorized personnel to enter some areas in
the office, if they have been using other types of security gadget and is not serving
them well, we recommend they try this our new project because it will serve them
better in the area of security.

41
6.2 REFERENCE
1. B. Yan and D. Y. Lee, “Design of spot ticket management system based on
RFID,” in Proc. International Conference on Networks Security, Wireless
Communications and Trusted Computing, 2009, pp. 496-499.
2. D. L. Wu, Wing W. Y. NG, Patrick P. K. Chan, H. L. Ding, B. Z. Jing, and
D. S. Yeung, “Access control by RFID and face recognition based on neural
network,” in Proc. International Conference on Machine Learning and
Cybernatics, July 11-14, 2010, pp. 675-680.
3. D. L. Wu, Wing W. Y. NG, D. S. Yeung, and H. L. Ding, “A brief survey on
current RFID applications,” in Proc. International Conference on Machine
Learning and Cybernatics, Baoding, July 12-15, 2009, pp. 2330-2334.
4. F. Lourenco and C. Almeida, “RFID based monitoring and access control
system,” in Proc. INFORUM, 2009.
5. G. Ostojic, S. Stankovski, and M. Lazarevic, “Implementation of RFID
technology in parking lot access control system,” in Proc. Annual RFID
Eurasia Conference, 2007, pp. 1-5.
6. K. S. Huang and S. M. Tang, “RFID applications strategy and deployment in
bike renting system,” in Proc. ICACT 2008, pp. 660-663.
7. L. Meng, Z. W. Song, and X. Y. Li, “RFID-Based security authentication
system based on a novel face-recognition structure,” in Proc. WASE
International Conference on Information Engineering, 2010, pp. 97-100.
8. N. Ahmad, S. Butler, and U. Ramachandran, “GuardianAngel: An RFID
based indoor guidance and monitoring system,” 2010, pp. 546-551.
9. M. A. Mazidi, J. C. Mazidi, and R. D. Mckinaly, The 8051 Microcontroller
and Embedded Systems, Pearson Education, 2006.
10. R. Weinstein, “RFID: A technical overview and its application to the
enterprise,” IT Professional, 2006, vol. 7.
11. S. Lahiri, RFID sourcebook, IBM Press, Westford, Massachusetts, 2006.
12. en.m.wikipedia.org/wiki/blockdiagram/
13. https://www.rfidjournal.com/articles/view?1338
14. https://www.rfidjournal.com/articles/view?1338/2
15. https://www.electronicshub.org/rfid-security-access-control-system/

42

You might also like