ABSTRACT
This simple key-operated gate locking system allows only those persons who know the preset code to open the gate. The code is to be entered from the keypad within the preset time to operate the motor fitted in the gate. If anyone trying to open the gate presses a wrong key in the keypad, the system is disabled and, at the same time, sounds an alarm to alert you of an unauthorized entry.
TABLE OF CONTENTS
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENT
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE PROJECT
1.2 AIM OF THE PROJECT
1.3 OBJECTIVE OF THE PROJECT
1.4 SIGNIFICANCE OF THE PROJECT
1.5 PURPOSE OF THE PROJECT
1.6 APPLICATION OF THE PROJECT
1.7 ADVANTAGES OF THE PROJECT
1.8 PROBLEM/LIMITATION OF THE PROJECT
1.9 PROJECT ORGANISATION
CHAPTER TWO
2.0 LITERATURE REVIEW
2.1 REVIEW OF RELATED STUDIES
2.2 REVIEW OF RELATED TERMS
CHAPTER THREE
3.0 CONSTRUCTION METHODOLOGY
3.1 SYSTEM CIRCUIT DIAGRAM
3.2 SYSTEM OPERATION
3.3 CIRCUIT DESCRIPTION
3.4 SYSTEM CIRCUIT DIAGRAM
3.5 CIRCUIT OPERATION
3.6 IMPORTANCE AND FUNCTION OF THE MAJOR COMPONENTS USED IN THIS CIRCUIT
3.7 POWER SUPPLY UNIT
CHAPTER FOUR
RESULT ANALYSIS
4.0 CONSTRUCTION PROCEDURE AND TESTING
4.1 CASING AND PACKAGING
4.2 ASSEMBLING OF SECTIONS
4.3 TESTING
4.4.1 PRE-IMPLEMENTATION TESTING
4.4.2 POST-IMPLEMENTATION TESTING
4.5 RESULT
4.6 COST ANALYSIS
CHAPTER FIVE
5.1 CONCLUSION
5.2 RECOMMENDATION
5.3 REFERENCE
CHAPTER ONE
1.1 INTRODUCTION
The security situation in many parts of the world today leaves much to be desired. In Nigeria particularly, the prevalence of armed robbers and other groups that constitute nuisance to the society has led to the loss of lives and properties worth millions of dollars. Many of the attacks that led to the loss have occurred in the homes or in guarded compounds and the attacks took place in spite of the existence of seemingly impregnable security gates that were designed to ward off intruders. The needs for electronically controlled gates that have superior security features to those operated manually thus exist and have been on the increase in recent times.
Many attempts have been made to design such gates with various types of security features. In the work by Shoewu and Baruwa a microprocessor was used to monitor two gates which sense the approach of a vehicle. The gates automatically open, wait for a specified time and then close. It is clear that the features of these gates do not provide adequate security since any vehicle can gain entry into the compound. A system that provides efficient gate access and an estate control to perform the job of the gate security guard is discussed in the work by Lau and Choo [4]. The main pitfall of this system is that it uses a telephone to identify visitors; the telephone can be used by anyone who approaches the gate. The development of a computer-controlled security gate system explained by Arulogun et al. allows privileged users to gain entry through a keyless door by using smart card authentication. It is true that smart cards can be stolen thus compromising the security of this system. An attacker only needs to acquire a valid smart card in order to gain entry through the door [6]. A low-cost private office access control system developed and discussed by Khan [7] permits a user with the correct password entered on a keypad to gain entry by controlling an electromagnetic door lock. The fact that passwords belonging to one individual can be learned by another without the owner’s permission is a major drawback of the system: the rogue can use the stolen password to gain entry into the system. Olatinwo and Shoewu [10] have described a system in which swing gates are controlled electronically using integrated circuit (I.C) and infrared transmitters. This system is only required to close and open gates and has a very limited security feature. In the work done by Adewuyi et al. [11, 12] surveillance cameras are used to capture and recapture the face of the driver as well as vehicle plate numbers. These data are stored in a databank for future comparison with visitors who will only be able to gain entry into a compound through gates if the data match. The system has the disadvantage that users must have been properly documented to enable them pass through the gate.
The system that has been designed in this work uses integrated circuit (I.C) and radio-frequency transmitter/receiver pair as major components. A integrated circuit (I.C) is programmed to decode a given sequence of keys that is entered on a keypad; the integrated circuit (I.C) commands a transmitter module to send out this code as signal at a given radio frequency. Some advantages of the system over those described in [5], [6] and [7] include:
(i) It does not need close contact to control the gate; the control can be done from inside the car at a distance.
(ii) It operates as a stand-alone system and does not require a network provider for reception of signals.
(iii) The use of a keypad to generate the code necessary for the opening and closing of the gate enhances the security of the system since it requires very many trials by an intruder to succeed in breaking into the system.
(iv)The features of the system that are controlled by the firmware resident in the memory of the microcontrollers can be easily improved for future upgrade.
1.2 OBJECTIVE OF THE PROJECT
The main objective of this project is to develop an embedded system, which is used to verify and authenticate the authorized and person enter the room. This code is entered from a handheld unit. The security of the system is enhanced since the code is not easy to break and is only known to the operator.
1.3 SIGNIFICANCE OF THE PROJECT
- This project provides security
- Power consumption is less
- Used commonly available components
- Project is simple and easy
1.4 APPLICATIONS OF THE PROJECT
· This simple circuit can be used at residential places to ensure better safety.
- It can be used at organizations to ensure authorized access to highly secured places.
- With a slight modification this Project can be used to control the switching of loads through password.
1.5 SCOPE OF THE PROJECT
The main component in the circuit is the controller. In this project 4×3 keypad is used to enter the password. The password which is entered is compared with the predefined password.
If the entered password is correct then the system opens the door by rotating door motor and displays the status of door on LED.
1.6 LIMITATIONS OF THE PROJECT
· It is a low range circuit, i.e. it is not possible to operate the circuit remotely.
- If you forget the password it is not possible to open the door.
1.7 PURPOSE OF THE SYSTEM
The purpose of the system is to provide a user friendly security system for organizations and homes. This system is password based and allows only authorized person to access it with a password. It also has the provision of changing the password.
1.8 PROJECT WORK ORGANISATION
The various stages involved in the development of this project have been properly put into five chapters to enhance comprehensive and concise reading. In this project thesis, the project is organized sequentially as follows:
Chapter one of this work is on the introduction to a simple key-operated gate locking system. In this chapter, the background of a simple key-operated gate locking system, significance of a simple key-operated gate locking system, objective of a simple key-operated gate locking system, limitation and problem of a simple key-operated gate locking system were discussed.
Chapter two is on literature review of a simple key-operated gate locking system. In this chapter, all the literature pertaining to this work was reviewed.
Chapter three is on design methodology. In this chapter all the method involved during the design and construction were discussed.
Chapter four is on testing analysis. All testing that result accurate functionality was analyzed.
Chapter five is on conclusion, recommendation and references.
Simple Key-Operated Gate Locking System. (n.d.). UniTopics. https://www.unitopics.com/project/material/simple-key-operated-gate-locking-system/
“Simple Key-Operated Gate Locking System.” UniTopics, https://www.unitopics.com/project/material/simple-key-operated-gate-locking-system/. Accessed 22 November 2024.
“Simple Key-Operated Gate Locking System.” UniTopics, Accessed November 22, 2024. https://www.unitopics.com/project/material/simple-key-operated-gate-locking-system/
Here’s a typical structure for Simple Key-Operated Gate Locking System research projects:
- The title page of Simple Key-Operated Gate Locking System should include the project title, your name, institution, and date.
- The abstract of Simple Key-Operated Gate Locking System should be a summary of around 150-250 words and should highlight the main objectives, methods, results, and conclusions.
- The introduction of Simple Key-Operated Gate Locking System should provide the background information, outline the research problem, and state the objectives and significance of the study.
- Review existing research related to Simple Key-Operated Gate Locking System, identifying gaps the study aims to fill.
- The methodology section of Simple Key-Operated Gate Locking System should describe the research design, data collection methods, and analytical techniques used.
- Present the findings of the Simple Key-Operated Gate Locking System research study using tables, charts, and graphs to illustrate key points.
- Interpret Simple Key-Operated Gate Locking System results, discussing their implications, limitations, and potential areas for future research.
- Summarize the main findings of the Simple Key-Operated Gate Locking System study and restate its significance.
- List all the sources you cited in Simple Key-Operated Gate Locking System project, following a specific citation style (e.g., APA, MLA, Chicago).