RES100-B3
Short Description
Download RES100-B3...
Description
DEVELOPMENT OF AUTOMATED ROOM SECURITY LOCK WITH FINGERPRINT IDENTIFICATION FOR SECURITY IMPROVEMENT IN MAPÚA INSTITUTE OF TECHNOLOGY
Presented by: ALVAREZ JR., Angel N. RAGUINDIN, Jardine Davis D. RIGOR, Paul Kenneth V. SANTOS, Mark Angelo ZULUETA, Jeffery Johns Section B3
Engr. Rafael G. Maramba Professor
RES100 – METHODS OF RESEARCH School of EE-ECE-CpE Mapua Institute of Technology June 2010
i
TABLE OF CONTENTS
Title Page………………………………………………………………………………...i Table of Contents………………………………………………………………….…….ii List of Tables…………………………………………………………………………....iii
Chapter I.
INTRODUCTION Background of the Study………………………………………………. 1 Statement of the Problem………………………………………………. 2 Significance of the Study………………………………………………. 2 Objective of the Study…………………………………………..……... 3 Scope and Delimitations of the Study……………………..……………3
II.
REVIEW OF RELATED LITERATURE AND STUDIES Basic Concepts and Related Literature………………………………… 4 Related Studies………………………………………………………… 8 Conceptual Framework………………………………………………… 9 Hypothesis……………………………………………………............... 10 Definition of Terms……………………………………………………..10
III.
METHODOLOGY Research Design………………………………………………………...12 The Subjects…………………………………………………………..... 12 Data Gathering Instruments……………………………………………. 12 Data Gathering Procedure…………………………………………….... 13 Procedure………………………………………………………………. 15 System Design…………………………………………………………..16 System Flow…………………………………………………………… 17 Statistical Treatment…………………………………………………… 18
REFERENCES…………………………………………………………………….…...20
ii
LIST OF TABLES
Table No.
Description
Page
1
Comparison of Biometric Devices
6
2
Sample Table for the Occurrence of
13
Theft, Robbery and Similar Cases per Week in Mapua Institute of Tehnology
iii
CHAPTER 1 INTRODUCTION
Background of the Study Technologies nowadays are advanced and many countries have switched from manual system to electronic machines. Different devices are invented for the betterment of humanity and one of its benefits is security. Security has always been a major issue in our society. Cases of vandalism,
robbery and trespassing are now just common
scenarios in today’s generation. As a matter of fact, no system or institution can claim of being entirely secured. Even the most high-tech security systems proved to be vulnerable to malicious intents. That is why most business establishments invest highly on security. And when it comes to security, most progressive countries use biometric locks, an alternative to manual and card locks to secure homes and offices, as well as business establishments. One of the most the most frustrating things to realize is when someone has forgotten his keys, locked himself out of his house, had them lost or stolen, or that an intruder has broken in.
For instance, when a room is restricted and only authorized personnel are allowed to get in, monitoring such rooms is difficult considering that the room should be opened for easy access to those persons. In some establishments like schools, they have routine access to rooms that should be locked and opened at a certain hour or at the next hour. This is done mostly by janitors, security guards or employees in which oftentimes they
1
forget to do because they have other tasks to do. This scenario is evident at Mapúa Institute of Technology which will be the basis of the research.
From this, the group has come up with an idea of developing an automated security room lock with fingerprint identification that will eliminate the aforementioned problems. This system will be designed for the purpose of securing school classrooms and facilities, wherein theft, vandalism, and trespassing are prevalent. Through the technology of biometrics, embedded system circuit design and computers, this system would be capable of preventing possible theft, vandalism, and trespass.
Statement of the Problem The main problem of this study is to develop an automated room security lock that will integrate fingerprint identification to improve the security in classrooms and facilities in Mapúa Institute of Technology. Specific Problem: 1. What is the effect on the security of employing fingerprint identification in authorizing access to a room?
Significance of the Study The study will be a significant endeavor in ensuring security of the school’s facilities, especially those containing high-tech equipments which are very much subject to theft and vandalism like audio visual rooms and laboratories. Security personnel’s tasks will be reduced significantly since the proposed system requires very minimal human intervention and is actually almost a substitute to guards and padlocks; thus they 2
could have more time in doing other essential tasks. Unauthorized use of facilities will be prevented because only permitted person/s will be able to lock or unlock the right room at the right time. Lastly, the study will be a helpful reference for researchers for their related studies in the future.
Objectives of the Study The main objective of this study is to develop an automated room security lock that will integrate fingerprint identification to improve the security in classrooms and facilities in Mapúa Institute of Technology. Specific Objective: 1. To determine the effect on the security of employing fingerprint identification in authorizing access to a room.
Scope and Delimitation The device is capable of automating room security locks through fingerprint identification of the user requesting access to a certain room. The history of room users and their room usage times are kept track through a computer interfaced to the device. The number of actual occupants in a room is not counted; only the information of the person in charge of the room is stored on the computer.
Authorization of room entry is possible only through the fingerprint of the user to automate the locking or unlocking of the room. In case of power interruption, system
3
malfunction will occur. In this case, tampering of the device will be necessary if emergency entry to a room is a must.
The study focuses mainly on eliminating unauthorized persons accessing a certain room. Theft and vandalism are most probable when unauthorized room entry is allowed; therefore prevention of unauthorized room access should be observed at all costs. These cases are also possible for authorized entries, but these are easily resolved since room users are kept track and are easily held liable when something undesirable happens to the room.
4
CHAPTER 2 REVIEW OF RELATED LITERATURE
Review of Related Literature The article entitled, “The State of the Biometric Industry: The Search for Security and Convenience”, written by Peter Burgess, Technical Manager of RSA Security in America (2001), discussed the prevalent industry of biometrics. The author said “biometrics apply to a broad range of electronic techniques that use unique physical characteristics of human beings as a means of authentication. Usually these are considered the domain of James Bond films or ultra sensitive military installations. However, the current range of its application is now rapidly increasing that is why more organizations whether from the government, school, or business districts need it for positive identification.”
The use of biometric devices falls into 2 main categories: law enforcement (government) and building access. Authentication purposes, convenience and passwordreplacements have been its strongest drivers.
One of the primary drivers for biometrics is its ability to provide a viable alternative to the ubiquitous password. Passwords are now widely recognized as an extremely weak form of authentication. In fact, up to 50% of costly help desk calls are from the users who have forgotten or misplaced their passwords.
5
Authentication by biometric verification is becoming increasing common in corporate and public security systems, consumer electronics and point of sale (POS) applications. In addition to security, the driving force behind biometric verification has been convenient.
Face
H
L
M
H
L
H
L
Fingerprint
M
H
H
M
H
M
H
Hand veins
M
M
M
M
M
M
H
Iris
H
H
H
L
H
L
H
Retinal scan
H
H
M
L
H
L
H
Signature
L
L
L
H
L
H
L
Voice
M
L
L
M
L
H
L
n
Circumventio
Acceptability
Performance
Collectability
Permanence
Uniqueness
Universality
Biometrics
Table 1. Comparison of Biometric Devices
Table 1 shows a comparison of existing biometric devices. A.K. Jain ranks each biometric device based on the categories as being low, medium or high. A low ranking category indicates poor performance in the evaluation criterion, whereas high ranking category indicates a very good performance. It is possible to understand if a human characteristic can be used for biometrics in terms of parameters: universality, uniqueness, permanence, collectability, performance, acceptability and circumvention. 1. Universality: each person should have the characteristic 6
2. Uniqueness: how well the biometric separates individually from another 3. Permanence: measures how well a biometric resists aging. 4. Collectability: ease of acquisition from measurement. 5. Performance: accuracy, speed, and robustness of technology used. 6. Acceptability: degree of approval of a technology. 7. Circumvention: ease of use of substitute.
Furthermore, a biometric device that uses fingerprints show more pleasing results among the rest. Other than the parameters stated in the table the researchers shoes a fingerprint over other biometrics because of its cost and portability. A finger print scanner can be easily installed and integrated to a program based from its application. It is cost efficient and acceptable by the industry. While all types of biometrics are likely to grow as cost reduced, technology improves and demand increases, fingerprint scanning will continue to hold the largest market share and offers the best trade-off between cost and reliability/user-friendly.
The promise of biometrics combines both security and convenience because the user does not have to carry any additional device or remember a static pin. Examples from specific vertical markets have shown significant demand for biometrics to date that provide perfect illustrations. On financial services, it is faster and simpler for traders on a hectic trading floor to log into the network with a fingerprint scanner than having to remember or enter a 6-digit password. For healthcare, the primary object is to enable clinicians to quickly access electronic patient records in campus-type environments. The
7
quicker they are in and out of the network, the sooner they can care for patients. Both of these examples also show how organization can justify an investment in biometric solutions if users can execute more transactions per day or visit with more patients per day.
Peter Burgess stated in 2001 that biometrics promise both security and convenience. The use of such device proposes a viable solution to an efficient means on building access while providing positive authentication. Implementing biometric system offers convenience and efficiency in terms of time and productivity.
According to this article, fingerprint scanner is the most accepted biometric device that the researchers can start to work with. It offers a better trade-off between cost and reliability. Based form the studies and articles that the researchers have gathered, a system basically a finger print scanner interfaced with a computer software to control a door (locking or unlocking) can be a good design which can be an innovation on old fashioned doors.
Related Studies
The PIC-based door lock system designed by A. Bitoon, et.al., (September 2003), stated that, “PIC-based door lock system provides a means of replacing old fashioned locks using keys by means of sensors and readers. With this door lock system homes and establishments can avail of better safety and security. It uses components such as a
8
keypad for password input and Programmable Integrated Circuit microcontroller as to control the functions of the system.”
Another study was done by S. Viscusi (2006) which is the Sequiam Biometric Door Lock. The Biometric Deadbolt lock aside from being a standalone lock replaces the use of keys to enter a room. This provides an authorized entry to prevent intruders to break in homes. A swipe of an authorized finger through a scanner grants access. It uniquely solves the problems of homeowners in securing their homes while having easiest way to enter their houses.
Based on this study, the writers learned that microcontroller can also be used as a device for locking and unlocking doors. This concept gave the researchers the idea to create a device that will enable automatic locking and unlocking of door that can be used in homes and establishments that can avail of better safety and security.
Conceptual Framework
fingerprint identification system independent variable
power interruption intervening variable
9
room security dependent variable
Hypothesis There will be a significant improvement in the security when fingerprint identification is employed in authorizing access to a room.
Definition of Terms Automated Security Room Lock is a security device that has an ability to manage the registered users directly on the lock and will allow you to see who came in and what time. Automated Lock System is a technique that uses biometric lock on doors to systematize security devices electronically. Biometrics is the use of measurable, biological characteristics such as fingerprints or iris patterns to identify a person to an electronic system (Microsoft Encarta, 2009) Biometric Lock is a security device which uses biometrics as replacement to keys. Biometric Deadbolt Lock is a security device that uses a bolt that is operated directly by a biometric and not by a spring mechanism. (Microsoft Encarta, 2009) Consumer Electronics include electronic equipment intended for everyday use. Embedded System Circuit Design is a computer system designed to perform one or a few dedicated functions often with real-time computing constraints. Key Lock System is the technique that uses keys as instrument to unlock and lock doors. Microcontroller is a microprocessor that controls some or all of the functions of an electronic device (as a home appliance) or system. (Merriam Webster Dictionary, 1971) Password is a secret word or phrase that somebody must use to gain entry to a place. (Microsoft Encarta, 2009)
10
Programmable Integrated Circuit (PIC) contains circuits whose logical function and connectivity can be programmed by the user, rather than being fixed by the integrated circuit manufacturer. Point of Sale (POS) or checkout is the location where a transaction occurs. Power Interruption is a short-or long-term loss of the electric power to an area. Security Systems is a technique of assuring the rooms to be free from unauthorized entries that may result to theft, vandalism and the like.
11
CHAPTER 3 METHODOLOGY
Research Design The research design that the researchers will use will be experimental design, specifically two-group design. This design will be the most appropriate because two comparable groups are employed as experimental and control group. In this study, the traditional key-locked doors will serve as the control group since it has been used or existed for quite a long time. On the other hand, the automated room security lock with fingerprint identification will serve as the experimental group since it will be the new system that would be implemented.
The Subjects The major subject of our research will be the whole population of Mapua Institute of Technology, specifically the professors and students. Since the research focuses on improving the security of equipments and other facilities of the institution, students and professors who mainly use the different facilities will be of much benefit. In addition, the security personnel of the institution will perform more efficiently as they will be helped by the implementation of the research.
Data Gathering Instruments The researchers will use observation scheduled in a certain span of time for gathering the data. This method will prove whether the installation of the automated room
12
security lock with fingerprint identification will really improve the security of different facilities and equipments inside a classroom with automated lock system.
Data Gathering Procedure Having the equipment installed, the researcher will secure a written permit from the administration to allow them to conduct the study in Mapua Institute of Technology. After the approval of the permit, in cooperation with the security staff of the institution, all unauthorized room accesses as well as theft and vandalism (if there’s any) will be recorded from rooms with the traditional key-lock system and with the automated room security lock with fingerprint identification system. The frequency for all violations occurred in each classroom in a span of three months or one whole term will be recorded and totaled. After the retrieval of enough data, the researchers will tabulate and process the data manually. The data gathered will be analyzed and interpreted.
Table 2: Sample Table for the Occurrence of Theft, Robbery and Similar Cases per Week in Mapua Institute of Tehnology Week 1
X1 ( Keylock System) x1
x1 - x1
X2 ( Automated System)
(x1 - x1 )2
2 3 4
13
x2
x2 - x2
(x2- x2 )2
5 6 7 8 9 10 11 Total
The previous table will be used for the tabulation of all the data that would be acquired during the course of the research.
14
Procedure START
Monitor rooms with traditional key-lock system and with automated room security lock with fingerprint identification system
Does unauthorized room access or any other violations occurred?
Yes
No
Mark whether the violation occurred in the traditional or the proposed system
Has 3 months time allotted for the conducting the study passed?
Yes Analyze and interpret the data
END
15
No
System Design
16
System Flow START
Detect fingerprint on fingerprint scanner Transmit fingerprint data to the computer Analyze fingerprint data on the computer
Is the fingerprint authorized to access the room at that time?
Yes
Is the user trying to enter(log-in) or exit (log-out)?
log-out
Remove user to that room; record user’s log-out time
log-in
Assign user to that room; record user’s name and log-in time
Transmit a “lock room” signal to the device
Transmit an “unlock room” signal to the device
Respond to the transmitted signal from the computer; trigger locking/unlocking of room
No
Is there a power interruption?
Yes END
17
Statistical Treatment The statistical technique used in analyzing and interpreting the data and testing the hypotheses of the study will be t-test. For this technique, the weighted arithmetic mean of the experimental and control group will be determined in order to discern the frequency of theft, robbery, vandalism and the like,. The formula to be used is as follows: (Calmorin and Calmorin, 2010) =
+ +
+⋯…… +⋯……
=
∑ ∑
where, x stands for the weighted arithmetic mean, ∑ fx , sum of the products f times x where f, frequency of each option and x, weight of each option; and ∑ f, sum of the frequencies of the subjects tested. Also, the researchers will solve for the variance of the each variable through the formula: =
∑( − ) −
where, SD2 stands for the variance, N as the total number of operations for the variable.
T-test was used to determine the significant difference between on the occurrence of robbery, theft, vandalism of different equipments inside a classroom with a key lock security system and the automated lock security system . The t-value will be computed by using the formula: =
− +
18
where, x1 stands for the mean of the first variable (key-lock system), x2 , mean of the second variable (automated lock system); SD12, variance of x1 , SD22, variance of x2 ; N1, total; number of operations of the first variable and N2, total number of operations of the second variable.
In this connection, the researchers will use 5 percent level of probability with 95 percent reliability to determine the degree of significance of the findings.
19
REFERENCES
Araneta, A., et. Al. PIC-based Doorlock System. September 2003. Burgess, Peter. The State of Biometric Industry: The Search for Security and Convenience. July 2001. Calmorin, Laurentina P. and Calmorin, Melchor A. 2010.Methods of Research and Thesis Writing. Rex Book Store. Manila.390 pp. Viscusi, S., Sequiam Biometric Door Lock, 2006.
20
View more...
Comments