0% found this document useful (0 votes)
18 views

Implementation of A Passworddd

This document discusses implementing a password-protected door lock system using Arduino technology at a university. It aims to design hardware and software for the system, including keypads, servo motors, and password management. The goal is to enhance security at university buildings by allowing password-based access and evaluating the system's performance, reliability, and security.

Uploaded by

je3256206
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

Implementation of A Passworddd

This document discusses implementing a password-protected door lock system using Arduino technology at a university. It aims to design hardware and software for the system, including keypads, servo motors, and password management. The goal is to enhance security at university buildings by allowing password-based access and evaluating the system's performance, reliability, and security.

Uploaded by

je3256206
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Implementation of a Password- procedures by adopting cutting-edge and

contemporary solutions, protecting sensitive


Protected Door Lock System data especially in the present environment,
Using Arduino in University where privacy and secrecy are crucial.

Facilities Review of Related Literature:

Francis Don Maria E. De Guzman, Wesleyan One of the key benefits of a password door lock
University-Philippines system is that you will perpetually be exempt
from the inconvenience of losing or misplacing
Abstract: keys. By committing a series of access codes to
The goal of this research project is to employ memory, you will have the ability to enter and
Arduino technology to create an excellent and exit your dwelling by just pressing a button.
user-friendly door lock system that can be (Password Door Lock Systems Offering a
installed in university buildings. By adding an Plethora of Benefits. 2024, January 12). Keypad
extra layer of security against unwanted access, lock systems can be used as part of an access
the technology seeks to improve confidentiality control system. This allows companies to restrict
security on university property. The design of entry permission, even when using a correct
hardware and software, the creation of user code, during certain hours of the day or night.
interfaces, security procedures, and the possible With a keypad lock system, it’s easy to change
integration of this Lock system in university the security pin code whenever necessary. A
confines are among the main elements of the high-quality keypad door lock should last longer
research. The system's security, dependability, with standard hardware. (Ventino Corporation
and performance will be evaluated through Sdn Bhd. 2020, November 4).
testing in a variety of scenarios.

Keywords:
 Password-protected door lock system Objective:
 Arduino
 University facilities The aim of this research study is to implement
 Security implementation, an Arduino-based password-secured door
locking mechanism within university premises.

Specific aims include:


Introduction:
 To design and integrate hardware
Strong security on university property has components, including Arduino boards,
grown more and more important in today's keypads, and servo motors, for the door
environment. Even if they were before lock system.
dependable, traditional lock and key systems  To develop software algorithms to
could not offer the degree of security required manage user input, validate passwords,
to thwart unwanted access. Therefore, the goal control the servo motor, and interface
of this project is to improve security measures with external devices.
at university buildings by using Arduino  To design an intuitive and user-friendly
technology to implement a password-protected interface for entering and managing
door lock system. I hope to strengthen security
passwords, potentially utilizing LCD study because it aims to address a specific
screens or graphical interfaces. practical problem or need: enhancing security
 To implement encryption techniques within university facilities. By developing a
and security protocols to safeguard password-protected door lock system using
password data and prevent Arduino technology, the research seeks to
unauthorized access or tampering. provide a tangible solution to improve security
 To conduct comprehensive testing and measures within academic environments.
evaluation to assess the system's Applied research focuses on the practical
performance, reliability, and security application of knowledge and aims to produce
under various conditions. results that can be directly implemented or
utilized to solve real-world problems. In this
case, the goal is to create a door lock system
Scope and Limitation: that can be deployed in university facilities to
enhance security, thereby fulfilling the practical
The goal of this project is to use Arduino needs of the university community.
technology to develop and install a password-
protected door lock system in academic
buildings. The project scope includes testing, Research Locale:
user interface design, security implementation,
hardware and software development, and The research will be carried out within the
interfacing with home automation systems. campus of Wesleyan University-Philippines,
When adopting new technology in a complex focusing on selected buildings and facilities
organizational structure, frequent challenges representative of typical academic
include logistical challenges, time constraints, environments.
and budgetary constraints.
Materials:
Beneficiaries of System:
The circuit of this project is very simple which
Faculty, staff, and administrators at universities contains Arduino, keypad module, buzzer, Servo
who need secure access to important areas Motor, and LCD. Arduino controls the complete
within campus buildings will all profit from this processes like taking a password from the
approach. Furthermore, improved effectiveness keypad module, comparing passwords, driving
and efficiency in protecting university property buzzer, rotating servo motor, and sending status
will be advantageous to security staff in charge to the LCD display. The keypad is used for taking
of overseeing and managing access control the password. The buzzer is used for indications.
systems. Servo motor is used for opening the gate while
rotating and LCD is used for displaying status or
Methodology: messages on it. (How2electronics. 2022).
Research Design: Hardware components
Applied research is the practical application of  Arduino Board
basic research. It involves the assessment of  Keypads
solving a practical problem by using empirical  servo motors
methodologies. (Journal of Research and  Jumper wires
Development). Applied research is used in this  Breadboard
 LCD Screen comprehensive feedback on the implemented
 Buzzer system.

The sole software component include:
Statistical Tool:
 Arduino IDE
Statistical analysis is crucial for
Instrument: evaluating the Arduino-based
password door lock system. Three
The instrument employed in this research study main statistical tools are employed:
will be a comprehensive questionnaire. This
questionnaire serves as a pivotal tool for
 Mean: This measures the
gathering essential data from participants. It
average performance across
encompasses a series of thoughtfully crafted
multiple trials, helping
questions designed to elicit insightful responses
gauge overall effectiveness.
relevant to the research objectives. By utilizing
this questionnaire, researchers aim to
 Standard Deviation: This
systematically collect and analyze pertinent
indicates the consistency
information regarding the implementation and
and reliability of system
efficacy of the password-protected door lock
performance. A low
system using Arduino technology in university
standard deviation suggests
facilities. The type of questionnaire that will be
more consistent
used is the likert scale. A Likert scale is a rating
performance.
scale that quantitatively assesses opinions,
attitudes, or behaviors. It is made up of 4 or
 T-test: This compares the
more questions that measure a single attitude
system's performance with
or trait when response scores are combined.
that of other access control
(Bhandari, P., & Nikolopoulou, K. 2023, June 22).
methods, determining
The format of a typical five-level Likert question, statistical significance and
for example, could be: validating effectiveness.

 Strongly disagree Inferential statistics, including


 Disagree hypothesis testing and graphical
 Neither agree nor disagree representations, are used to draw
 Agree conclusions from the data. This
 strongly agree rigorous analysis ensures the
reliability, efficiency, and security of
the developed system, contributing
to access control technology
advancement.
Sampling:
Sampling techniques will involve purposive
Procedure:
sampling of university personnel representing
different duties and responsibilities to ensure
A. REQUIREMENT
 Unlocking with Correct Password

- The primary functionality of the system is to


allow access to the door when the correct
password is entered.

- Upon entering the correct password, the


system should promptly unlock the door,
allowing entry to authorized users.

- The password should be securely stored and


encrypted within the system to prevent
unauthorized access.

 Error Handling for Incorrect Password

- In the event of an incorrect password entry,


the system should provide appropriate error
handling mechanisms.

- This may include displaying an error message


indicating an incorrect password and prompting
the user to try again.

B. Quick design

 BLOCK DIAGRAM

 WIREFRAME
Ethical Basis:  Data Protection: The system should
adhere to data protection laws and
 Privacy and Security: The system
regulations, ensuring that personal
respects the privacy and security of
data is securely stored and
individuals by providing a secure
processed in accordance with
method of access control. It ensures
relevant standards. This includes
that only authorized individuals can
measures to prevent unauthorized
gain entry, protecting the privacy
access, disclosure, or alteration of
and safety of the occupants.
data.

 Equity and Access: The system


 User Empowerment: The system
should be designed to provide equal
should empower users to control
access to all authorized users
their own security settings, including
without discrimination. It should not
the ability to change passwords,
unfairly disadvantage any individual
manage access permissions, and
or group based on factors such as
monitor access logs. Users should
socioeconomic status, race, gender,
have the autonomy to customize
or disability.
their security settings to suit their
individual needs and preferences.

 Transparency and Accountability:


The system should operate
 Ethical Design and Development:
transparently, with clear guidelines
The system should be designed and
and procedures for access control. It
developed with ethical
should also be accountable for any
considerations in mind, taking into
misuse or breaches of security, with
account potential risks and impacts
mechanisms in place to investigate
on individuals and society. This
and address such incidents.
includes conducting thorough risk
assessments, implementing
safeguards against misuse, and
 Informed Consent: Users should be
prioritizing the safety and well-being
fully informed about how their
of users.
personal data is collected, stored,
and used by the system. They should
have the opportunity to consent to
the use of their data for access
control purposes, with the option to
opt out if desired.
By adhering to these ethical principles, the https://www.longdom.org/journal-of-research-
WQRduino password door lock system can and-development.html
provide a secure and reliable means of Cint. (2022, June 29). What Is a Questionnaire
access control while upholding the rights and How Is It Used in Research? [Blog post].
and dignity of individuals. https://www.cint.com/blog/what-is-a-
questionnaire-and-how-is-it-used-in-research/

Bhandari, P., & Nikolopoulou, K. (2023, June 22).


References:
What Is a Likert Scale? | Guide & Examples.
How2electronics. (2022). Password-based Scribbr. Retrieved April 15, 2024, from
security system using Arduino & keypad. https://www.scribbr.com/methodology/likert-
https://how2electronics.com/password-based- scale/
security-system-arduino-keypad/
Bevans, R. (2023, June 22). One-way ANOVA |
Goyal, A. (2020, November 10). Password Based When and How to Use It (With Examples).
Door Lock System Using Arduino Uno [Blog Scribbr. Retrieved April 21, 2024, from
post]. HatchnHack Cart. https://www.scribbr.com/statistics/one-way-
anova/
Password Based Door Lock System Using
Arduino Uno (hnhcart.com) Simplilearn. (n.d.). What is Descriptive Statistics:
Definition, Types, Applications, and Examples.
Password Door Lock Systems Offering a Plethora Retrieved from
of Benefits. (2024, January 12). https://www.simplilearn.com/what-is-
Password Door Lock Systems Benefits | Dorset descriptive-statistics-article
(dorsetindia.com)

Ventino Corporation Sdn Bhd. (2020, November


4).

The Advantages of Using a Keypad Lock System -


Nov 04, 2020, Selangor, Malaysia, Penang, Kuala
Lumpur (KL), Subang Jaya, Bukit Mertajam
Supplier, Suppliers, Supply, Supplies | Ventino
Corporation Sdn Bhd (hotelsupplier.my)

Journal of Research and Development. (n.d.).

You might also like