0% found this document useful (0 votes)
21 views

IoT - Activity Based Learning

Uploaded by

2204805
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

IoT - Activity Based Learning

Uploaded by

2204805
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Password Based Door Locking Security

System using Arduino

Presented By:-

Name - Azharuddin Middya


Roll - 2204805
Branch - ETC
Subject - IOT
Submitted to:- Prof V.K JHA
Contents
• Objective
• Introduction
• Components Used
• Circuit Diagram
• Software Description
• Advantages
• Disadvantages
• Final Setup project
• Future Scope
• Conclution
• Reference
OBJECTIVE
• Increase the security level to prevent an unauthorized
unlocking of the door.
• Give the flexibility to the user to change or reset the
password in case the user forgets that combination.
• Lock the door by using password.
• To give user more secure yet cost-efficient way of door
locking system.
INTRODUCTION
Since the main intension of this project is to design a
security Door locks system. In order to fulfill this
application there are few steps that has been performed
i.e.
• Designing the power supply for the entire circuitry.
• Selection of microcontroller that suits our application.
• Selection Key pad.
• Selection of DC motor.
• Selection of buzzer according to the requirement.
Complete studies of all the above points are useful to
Components

• Arduino UNO R3
• Relay board
• Solenoid Lock
• 12 volt Adaptar
• Jumper Wires
Circuit Diagram
Software Description
• PROTEUS SOFTWARE is used for the simulation of
circuit.
• CODING USED: Embedded C Language with the
implementation of Keil Software.
• USB programmer Avrupro + was used to burn the code
in microcontroller.
• Progisp Flash tool
Advantages

• No keys to be lost, stolen or occupied.


• Can be locked using keypad.
• Automatic door opening.
• Gives an indication for unauthorized entry.
• Totally cost efficient.
Disadvantages
• Currently if the personal identification number is somehow
forgotten the system could not be accessed.
• Powered by electricity may not function properly in the
case of a power failure.
Final Setup project
Future Scope
• We can send this data to a remote location using mobile
or internet.
• We can add fingerprint sensor so entry will be allowed for
the authorized person using their fingerprints.
• We can add fire, wind and LPG sensors so that in case of
accident, the doors will automatically open.
Conclution
• PASSWORD BASED DOOR LOCKIING SECURITY
SYSTEM is used in the places where we need more
security. It can also used to secure lockers and other
protective doors. The system comprises a number keypad
and the keypads are connected to the 8 bit
microcontroller AT89S52. The microcontroller
continuously monitor the keypad and if somebody enters
the password it will check the entered password with the
password which was stored in the memory and if it they
are same then the microcontroller will switch on the
corresponding device. The system will allow the person
Reference

Book References:
• 8051 Reference Manual, TICO Institute of Embedded Technology.
• Fundamentals of Embedded Software: Where C and Assembly Meet by
Lewis Daniel.
Web References:
• www.atmel.com
• www.electronicshub.org
• www.keil.com
• http://www.edgefxkits.com/remote-password- operated-load-control-by-
android-applications
• http://www.edgefxkits.com/password-based-circuit- breaker
THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy