You are on page 1of 64

DOOR LOCK SECURITY SYSTEM 1

DEVELOPMENT OF RFID-BASED DOOR LOCK SYSTEM

Reynaldo T. Faustino Jr.

Jayvee C. Logronio

A Thesis Presented to the Faculty

of the College of Science

Technological University of the Philippines

Ayala Blvd., Manila

In Partial Fulfillment of the

Requirements for the Degree

Bachelor of Science in Computer Science

March 2014
DOOR LOCK SECURITY SYSTEM 2

Technological University of the Philippines


COLLEGE OF SCIENCE
Manila

APPROVAL SHEET
This thesis here to entitled:

RFID-BASED DOOR LOCK


prepared and submitted by REYNALDO T. FAUSTINO JR. and JAYVEE C. LOGRONIO
in partial fulfillment of the requirements for the degree Bachelor of Science in Computer Science
has been examined and is recommended for acceptance and approval for ORAL
EXAMINATION.

DARWIN C. VARGAS
Adviser
Approved by the Committee on Oral Examination with a grade of PASSED on March 15,
2014.

MARIA CARMELA F. FRANCISCO

WELLANIE M. MOLINO FERDINAND A. BARRAL JR.


Member Member

Accepted in partial fulfillment of the requirements for the degree Bachelor of Science in
Computer Science.

Prof. Marilyn M. Ignacio


Date: OIC, Office of the Dean
DOOR LOCK SECURITY SYSTEM 3

ACKNOWLEDGEMENT

We would like to express our deepest gratitude first and foremost to our creator, Lord

God for giving us knowledge, strength, and courage.

To our loved ones, Faustino and Logronio family for being patient and supportive enough

for us to finish this project.

To our friends and classmates for helping us in identifying some problems regarding the

project and to our thesis adviser, Mr. Darwin C. Vargas for being more that just our mentor, he

became our friend. Thank you!

-R.T.F and J.C.L


DOOR LOCK SECURITY SYSTEM 4

ABSTRACT

The study developed a door lock device that can minimize security problems. It is a two-way
security door lock system which uses Radio Frequency Identification and Microcontroller. The
users can simply scan their I.D. on to the scanner then input the password on the RFID door lock
device. The process was made easier since the device included light signals and voice prompt
that inform the user what to do. Once the device has recognized the I.D. and the password
correctly, it will automatically unlock the room. The project was evaluated by 30 respondents
who answered the evaluation sheet. The evaluation criteria include functionality, aesthetics,
workability, durability, economy, safety and saleability.
DOOR LOCK SECURITY SYSTEM 5

Table of Contents

PRELIMINARIES PAGE

Title Page 1

Approval Sheet 2

Acknowledgment 3

Abstract 4

Table of Contents 5

List of Tables 7

List of Figures 8

Chapter 1 THE PROBLEM AND ITS SETTING

Introduction 9

Background of the Study 11

Objectives of the Study 12

Scope and Limitation of the Study 13

Chapter 2 CONCEPTUAL FRAMEWORK

Review of Related Literature 14

Related Studies 24

Conceptual Model of the Study 29

Operational Definition of Terms 32

Evaluation System 33

Evaluation Procedure 33
DOOR LOCK SECURITY SYSTEM 6

Chapter 3 METHODOLOGY

Project Design 35

Operation Procedure 38

Project Development 38

Chapter 4 RESULTS AND DISCUSSION

Project Description 41

Project Structure 42

Project Capabilites and Limitations 46

Project Evaluation 47

Chapter 5 SUMMARY OF FINDINGS, CONCLUSIONS

AND RECOMMENDATIONS

Summary of findings 55

Conclusions 56

Recommendations 57

REFFERENCES 58

APPENDIXES

Appendix A 60

Appendix B 61

Appendix C 62

Appendix D 63

CURRICULUM VITAE
DOOR LOCK SECURITY SYSTEM 7

LIST OF TABLES

TABLES PAGE

1 Respondents’ Mean Rating for Functionality 47

2 Respondents’ Mean Rating for Aesthetics 48

3 Respondents’ Mean Rating for Workability 49

4 Respondents’ Mean Rating for Durability 50

5 Respondents’ Mean Rating for Economy 51

6 Respondents’ Mean Rating for Safety 52

7 Respondents’ Mean Rating for Saleability 53

8 Respondents’ Overall Mean Rating of the Project 54


DOOR LOCK SECURITY SYSTEM 8

LIST OF FIGURES

FIGURE PAGE

1 RFID Scanner 15

2 PIC Microcontroller 15

3 Resonator 16

4 Internal Oscillator 17

5 Capacitor 18

6 Power Supply 20

7 Proteus VSM 21

8 Proton Development Project 23

9 The Conceptual Model of the Study 30

10 Block Diagram of the RFID Door Lock 36

11 Schematic Diagram 37

12 Flow Chart of Project Development 40

13-20 RFID Door Lock 41-45


DOOR LOCK SECURITY SYSTEM 9

CHAPTER 1

THE PROBLEMS AND ITS SETTING

This chapter discusses the introduction, background of the study, objectives of the study,
significance of the study, and scope and limitations of the study.

Introduction

As the 20th century enters and with the advancement of technology, everything seems to

be possible. The problem with this is that people can use the power of technology to harm others,

that’s why security is still one of the major problems people are facing right now. Keys and other

old fashioned security tools are not even worth to trust.

Kevin Coffey (2011) stated that, home security now poses great threat against burglars or

theft. The door lock is the primary security in every home. Burglars and thieves have their own

techniques in opening a certain door and even breaking in into one's house. This is the reason

why we need a certain technology which can fully secured houses- from the door lock up to the

inside portion of the house.

As stated by Shradha Thale (2012) it can be wise and an important decision to look into

taking advantage of the protection that this kind of system can offer. The two most important and

valued items you own are your family and your life, and they need to be guarded. Using this kind

of system, it allows you to minimize the chance of burglars harming you and your family. Also,

there is another advantage with the protection of your personal safety.

There are several things in your home that probably hold value to you, be it sentimentally

or numerically. In using this system, those items and belongings are granted further protection.
DOOR LOCK SECURITY SYSTEM 10

Lastly, a benefit that comes from having security system installed is a lot less tangible, but still

very important. In using these devices, you are able to gain a peace of mind that you might not

otherwise have. Because of this, your stress level may decrease, and you may even sleep better

during the nights since you will not have to worry about anyone breaking in during the evenings.

Hence, home security systems should never be ignored by anyone.

A study done by Roy Want (2006), Radio Frequency Identification (RFID) enables

identification from a distance, and unlike earlier bar-code technology, it does so without

requiring a line of sight. RFID is a wireless non-contact use of radio-frequency electromagnetic

fields to transfer data, for the purposes of automatically identifying and tracking tags attached to

objects. The tags contain electronically stored information. RFID tags are ID system that uses

small radio frequency identification devices for identification and tracking purposes. An RFID

tagging system includes the tag itself, a read/write device, and a host system application for data

collection, processing, and transmission. An RFID tag (sometimes called an RFID transponder )

consists of a chip , some memory and an antenna.

A study done by S.E. Sarma, S.A.Weis and D.W. Angels RFID systems are comprised of

three main components: The RFID tag, or transponder, which is located on the object to be

identified and is the data carrier in the RFID system, RFID reader, or transceiver, which may be

able to both read data from and write data to a transponder, and data processing subsystem which

utilizes the data obtained from the transceiver in some useful manner.

With the advancement of technology, it can greatly help in solving, if not, minimizing

this problem. Using the idea of Radio Frequency Identification or RFID and Microcontroller, it

can serves as a new security item with convenience, reliability and user friendly.
DOOR LOCK SECURITY SYSTEM 11

Background of the Study

We all want to sleep peacefully at night, knowing that our place is secure and safe to live

with. We all want our investments and properties to be safe. Security is indeed one of the biggest

concerns nowadays.

Security tests by Consumer Reports Magazine in the 1990s found that many residential

doors fail or delaminate when force is applied to them. This only shows that we should never be

confident enough by just locking our doors and windows.

As stated by The Chula Vista Residential Burglary-Reduction Project's finding, from

victim interviews, learned that in 87% of the break-ins that occurred when intruders defeated

locked doors with tools such as screwdrivers or crowbars, the burglars targeted the one door that

had no deadbolt lock, not one burglar attempted to break a double-pane window during the

course of successful or attempted burglary.

In this study, the researchers attempted to solve or minimize the problems of security

system by developing a Door Lock security system using Radio Frequency Identification or

RFID and Microcontroller. The users can simply scan their I.D. on to the scanner then input the

password on the RFID door lock device. The process was made easier since the device will

include light signals and voice prompt that will inform the user what to do. Once the device

recognized the I.D. and the password correctly, it will automatically unlock the room.
DOOR LOCK SECURITY SYSTEM 12

Objectives of the study

The general objective of the study is to develop a RFID Door Lock device that will help

in solving or minimizing security problems.

Specifically, the study aims to:

1.) Design a RFID Door Lock device with the following characteristics:

a. A two-way security door lock system.

b. Let the user scan their I.D. and input password to access the room.

c. Includes release button.

d. Includes signal lights and voice prompt that inform the user what to do and tell

whether the user’s request is granted or not

e. Change of password.

f. Can be use as a normal door in case of brownouts.

2.) Create the device as designed.

3.) Test and improve the device in terms of functionality, aesthetics, workability, economy and

safety.

4.) Determine the level of acceptability of the prototype using the TUP evaluation instrument.
DOOR LOCK SECURITY SYSTEM 13

Scope and Limitations of the Study

This study will be composing of software and hardware implementation.The purpose of

the study is to create a RFID Door Lock device using Radio Frequency Identification,

Microcontroller and other hardware. The user can easily access a room by just scanning his/her

I.D. and entering the password. The process of doing this is made easier by using light signals

and voice prompt that will inform the user what to do and whether the user can access the room

or not. Also, it includes release button inside the room for user to exit easily and it can be used as

a normal door in case of brownouts.

On the other hand, the study has the following limitations. First, a maximum of 10

different RFID can be stored and recognize by the device having the same password. Also, the

device should be always connected to the power supply.


DOOR LOCK SECURITY SYSTEM 14

Chapter 2

CONCEPTUAL FRAMEWORK

The chapter II contains the review of the related literature, related studies, conceptual

model of the studies, and definition of the terms.

REVIEW OF THE RELATED LITERATURE

The following literatures are the ideas which help in the conceptualization of the study.

Radio-frequency identification (RFID)

Radio-frequency identification (RFID) is the wireless non-contact use of radio-frequency

electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking

tags attached to objects. The tags contain electronically stored information. Some tags are

powered by and read at short ranges (a few meters) via magnetic fields (electromagnetic

induction). Others use a local power source such as a battery, or else have no battery but collect

energy from the interrogating EM field, and then act as a passive transponder to emit microwaves

or UHF radio waves (i.e., electromagnetic radiation at high frequencies). Battery powered tags

may operate at hundreds of meters. Unlike a bar code, the tag does not necessarily need to be

within line of sight of the reader, and may be embedded in the tracked object.
DOOR LOCK SECURITY SYSTEM 15

Figure 1.RFID Scanner

PIC microcontroller and minimum support components

A study done by Vivek R. (June 29, 1011), a PIC microcontroller, even though it may

have been programmed, is not of much use unless it is supported by a number of components,

such as the timing components and the reset circuitry. PIC microcontroller requires an external

clock circuit (some PIC microcontrollers have built-in clock circuits) to function accurately.

A PIC microcontroller starts executing the user program from address 0 of the program

memory when power is applied to the chip. The reset input (MCLR) of the microcontroller is

usually connected to the _V supply voltage through a 4.7K resistor.

Figure 2. PIC Microcontroller


DOOR LOCK SECURITY SYSTEM 16

Resonators

Resonators are more often used in microcontroller clock circuits because of their low

cost, simplicity, and low component count.

Figure 3. Resonators

PIC Micros

PIC micros do not need much to operate, just a steady and stable voltage for Vdd and

MCLR, and an external oscillator if you are not using the internal oscillator on the PIC.

The diagram below explains how to hook up the basic requirements of the PICmicro, and

although an 18 Pin PIC has been used in this example, the same analogy applies to any

PICmicro, that is,

 5 Volts too

 MCLR

 Vdd (40 pin PIC's have 2 Vdd's)

 Earth (GND) to Vss (28 and 40 Pin PIC's have 2 Vss)


DOOR LOCK SECURITY SYSTEM 17

Internal Oscillator

Crystal oscillator if most PIC's have one built in because the internal oscillator is not

nearly as accurate when compared to crystal oscillators, and for timing crucial (within range)

applications this is important to know. Of course this is not required for 95% of

projects/applications, just something to consider.

Figure 4. Internal Oscillator

The capacitors

The 10uF electrolytic capacitor is required to maintain a steady input voltage to the

regulator, and should be used in all designs. If you are driving high current loads, then use a

bigger capacitor, but in most cases, 10uF will be suffice. Keep in mind that electrolytic

capacitors are polarity sensitive, and the negative lead is marked with a band on the side of the

case.

The 0.1uF ceramic disc capacitor is used to remove transient noises on the output. These

are high frequency noises/spikes created from a range of sources and anomalies on your target
DOOR LOCK SECURITY SYSTEM 18

circuit, and although not required on non timing crucial applications, I still place one to ensure

the accurate timing operation of the PIC. Ceramic disc capacitors are not polarity sensitive.

The 5 volt regulator 7805can has a much higher input voltage then 12 volts, but heat

becomes an issue even with small loads.

Voltage regulators are essential with digital electronics, as most devices require a very

steady and clean 5 volts to operate correctly. Some devices require 3.3 volts, but the concept is

exactly the same.

The 7805 is a 3 pin package that is easily designed for regulating any voltage over 6.5

volts down to a constant and steady 5 volts. The reason why you need 6.5 volts or more is to

accommodate for the internal requirements of the IC itself.

Figure 5. Capacitor

RS232 Level Conversion

Based on Craig Peacock (25th Oct. 2010), almost all digital devices which we use require

either TTL or CMOS logic levels. Therefore the first step to connecting a device to the RS-232

port is to transform the RS-232 levels back into 0 and 5 Volts. As we have already covered, this

is done by RS-232 Level Converters. Another device is the MAX-232. It includes a charge
DOOR LOCK SECURITY SYSTEM 19

pump, which generates +10V and -10V from a single 5V supply. This I.C. also includes two

receivers and two transmitters in the same package. This is handy in many cases when you only

want to use the Transmit and Receive data lines. You don't need to use two chips, one for the

receive line and one for the transmit. However all this convenience comes at a price, but

compared with the price of designing a new power supply it is very cheap. There are also many

variations of these devices. The large values of capacitors are not only bulky, but also expensive.

Therefore other devices are available which use smaller capacitors and even some with inbuilt

capacitors. (Note: Some MAX-232's can use 0.1 micro farad capacitors). However the MAX-232

is the most common, and thus we will use this RS- 232 Level Converter in our circuit.

Power supply

A study done by Vivek R. (June 29, 1011), every electronic circuit requires a power supply

to operate. The required power can either be provided from a battery, or the mains voltage can be

used and then reduced to the required level before it is used in the circuit (e.g. a mains adapter).

In this section, we shall look at the design of a power supply circuit to power our

PICmicrocontroller circuits using a battery as the source of power. PIC microcontrollers can

operate from a power supply voltage in the range 2 to 6V. The standard power supply voltage in

digital electronic circuits is +5 V and this is the voltage with which the PIC microcontrollers are

mostly operated. Unfortunately, it is not possible to obtain 5 V using standard alkaline batteries

only. The nearest we can get is by using three batteries, which gives 4.5 V and this is not enough

to power standard logic circuits. In this section, we shall see how to convert a standard 9-V

battery (e.g. type PP3) voltage to 5 V so that it can be used in our PIC microcontroller-based

projects.
DOOR LOCK SECURITY SYSTEM 20

The simplest solution to drop the voltage from 9 to 5 V is by using a potential divider

circuit using two resistors. Although a potential divider circuit is simple, it has the major

disadvantage that the voltage at the output depends on the current drawn from the circuit. As a

result of this, the output voltage will change as we add or remove components from our circuit.

Also, the output voltage falls as the battery is used.

The Power supply is basic circuit of full wave rectifier driven from AC mains and using

resistive load and filter. The output winding of the power transformer is center tap. Hence the

two diodes are equal in magnitude but opposite in phase.

Figure 6. Power Supply

Proteus VSM

As stated by LabcenterElectronics.com, Proteus Virtual System Modelling (VSM)

combines mixed mode SPICE circuit simulation, animated components and microprocessor

models to facilitate co-simulation of complete microcontroller based designs. For the first time

ever, it is possible to develop and test such designs before a physical prototype is constructed.
DOOR LOCK SECURITY SYSTEM 21

This is possible because you can interact with the design using on screen indicators such

as LED and LCD displays and actuators such as switches and buttons. The simulation takes place

in real time (or near enough to it): a 300 MHz Pentium II can simulate a basic 8051 system

clocking at over 12MHz. Proteus VSM also provides extensive debugging facilities including

breakpoints, single stepping and variable display for both assembly code and high level language

source.

The VSM architecture allows additional animated models to be created by anyone,

including end users. Whilst many types of animated model can be produced without resort to

coding, a documented interface has been provided for developers to write their own models

packaged as Windows DLLs. These models can implement purely electrical behaviour or

combine this with graphical behaviour so that almost any kind of application specific peripheral

can be simulated.

Figure 7. Proteus VSM


DOOR LOCK SECURITY SYSTEM 22

Proton Plus

A study made byMiercuri (09 Februarie 2011), the Proton Plus Compiler is probably the

easiest way to create programs for the ever–popular PICmicroTM microcontrollers. Proton Plus

Compiler generates files that can be programmed directly into a PICmicroTM, using any

Microchip compliant programmer. The PROTON Plus compiler offers flexibility, and

affordability that is unparalleled in the world of PICmicroTM programming. Proton Plus is now

considered by most to be the world leading PIC BASIC Compiler everything that can be

achieved with other PIC BASIC Compilers can be achieved with the PROTON Plus PIC BASIC

Compilers and the PROTON Plus BASIC Compilers do more, in less code space at a lower cost.

The PROTON Plus compiler offers the beginner a comfortable and familiar environment

to gently move into the world of PIC programming, and the Professional programmer will find

Proton+ offers a speedy route to market producing Tight Fast READABLE and EDITABLE

assembly, commented with PIC BASIC, with easy integration of existing assembly routines and

easy creation of Macro's and INCLUDE files to incorporate tried and tested routines.

Proton Development Suite

Proton Development Suite combines the Proton Plus Compiler with a brand new IDE and Virtual

Simulation Environment, creating a PICmicro BASIC development environment suitable for

both hobbyists and professionals.


DOOR LOCK SECURITY SYSTEM 23

Figure 8. Proton Development Suite

It is simple:

1. Write your BASIC code in the Proton IDE

2. Compile your code with the click of a button

Then test your code with the Virtual Simulator, or upload the code to your PICmicro using the

IDE's
DOOR LOCK SECURITY SYSTEM 24

Related Studies

Based onInternational Journal of Computer Applications (Volume 5- August 2010), RFID,

Radio Frequency Identification is an inexpensive technology, can be implemented for several

applications such as security, asset tracking, people tracking, inventory detection, access control

applications. The main objective of this paper is to design and implement a digital security

system which can deploy in secured zone where only authentic person can be entered. We

implemented a security system containing door locking system using passive type of RFID which

can activate, authenticate, and validate the user and unlock the door in real time for secure

access. The advantage of using passive RFID is that it functions without a battery and passive

tags are lighter and are less expensive than the active tags. A centralized system manages the

controlling, transaction and operation task. The door locking system functions in real time as the

door open quickly when user put their tag in contact of reader. The system also creates a log

containing check-in and check-out of each user along with basic information of user.

RFID, Radio Frequency Identification is a fundamental and inexpensive technology that

enables wireless data transmission. This technology has not been very often used in industry due

to lack of standardization among the manufacturing companies earlier. RFID technologies are

efficient and secure compare to other network . With RFID, wireless automatic identification

takes a very specific form: the object, location, or individual is marked with a unique identifier

code contained with an RFID tag, which is in some way attached to or embedded in the target.

RFID is not a single product but a comprehensive system, a typical RFID system include three

basic elements: RFID tag (transponder), reader (transceiver) and back-end application system (or

database), which demands the support of the computer network. The software is used for
DOOR LOCK SECURITY SYSTEM 25

management, controlling, transaction, operation and maintaining record of the various users. A

digital door locking system is also implemented and governed by RFID reader which

authenticate and validate the user and open the door automatically. It also keeps the record of

check-in and check-out of the user. It’s very important to authenticate the user before entering

into a secure space and RFID provide this solution. The system enables user to check-in and

check-out under fast, secure and convenient conditions. The system include door locking system

which open when the user put their tag in contact with reader and the user information matched

with the information already stored in database. The RFID controls the opening and closing of

the door. In this study we utilize RFID technology to provide solution for secure access of a

space while keeping record of the user. We used passive type of rfid here. The passive types of

rfid are battery-less and they obtain power to operate from reader. The major advantages of

passive rfid are its cost effective and small in size. Due to above advantages, it is widely use by

inventory tracking technology. Current antenna technology makes it possible to smaller in size.

A study made by Chris Huang, RFID Door Lock -- Many different updated forms of door

locks have been introduced to the market, even RFID door locks, but all of them really provide

any substantial convenience over the conventional key. This project will be the production in

prototype form of such a door lock, which will improve convenience above the existing types of

door locks on the market, at the same time still providing the security of a conventional door

lock. The produced door lock will require the user to simply have the key on the user, and with a

touch of the door lock, the door lock will verify the key's presence on the person by RFID, and

automatically unlock the door. Then the user simply opens the door.

A study made by Ononiwu G. Chiagozie and Okorafor G. Nwaji (March 2012), Radio-

frequency identification (RFID) is a technology that uses radio waves to transfer data from an
DOOR LOCK SECURITY SYSTEM 26

electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of

identifying and tracking the object. Radio frequency identification (RFID) is a matured

technology that incorporates the use of electromagnetic or electrostatic coupling in the radio

frequency portion of the electromagnetic spectrum to uniquely identify an object, animal, or

person. RFID chips contain a radio transmitter that emits a coded identification number when

queried by a reader device. Some RFID tags can be read from several meters away and beyond

the line of sight of the reader. The application of bulk reading enables an almost-parallel reading

of tags. This small type is incorporated in consumer products, and even implanted in pets, for

identification. The tag's information is stored electronically. The RFID tag includes a small RF

transmitter which transmits an encoded radio signal to interrogate the tag, and receiver which

receives the message and responds with its identification information. Some RFID tags do not

use a battery. Instead, the tag uses the radio energy transmitted by the reader as its energy source.

The RFID system design includes a method of discriminating several tags that might be within

the range of the RFID reader. RFID can be used in many applications. A tag can be affixed to

any object and used to track and manage inventory, assets, people, etc. For example, it can be

affixed to cars, computer equipment, books, mobile phones, etc. The Healthcare industry has

used RFID to reduce counting, looking for things and auditing items. Many financial institutions

use RFID to track key assets and automate compliance. Also with recent advances in social

media RFID is being used to tie the physical worldwith the virtual world. RFID in Social Media

first came to light in 2010 with Facebook's annual conference.

RFID is a superior and more efficient way of identifying objects than manual system or

use of bar code systems that have been in use since the 1970s. Furthermore, passive RFID tags

(those without a battery) can be read if passed within close enough proximity to an RFID reader.
DOOR LOCK SECURITY SYSTEM 27

It is not necessary to"show" the tag to the reader device, as with a bar code. In other words it

does not require line of sight to "see" an RFID tag, the tag can be read inside a case, carton, box

or other container, and unlike barcodes RFID tags can be read hundreds at a time. Bar codes can

only be read one at a time.

Radio frequency identification (RFID) is a matured technology that incorporates the use

of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic

spectrum to uniquely identify an object, animal, or person. They are grouped under the automatic

identification (Auto-ID) technologies. RFID tags are not an "improved bar code" as the

proponents of the technology would like you to believe. An RFID system consists of three

components which include: an antenna, a transceiver and a transponder (the tag). The antenna

and the transceiver are often incorporated into one reader. The antenna uses radio frequency

waves to transmit a signal that activates the transponder. When activated, the tag transmits data

back to the antenna. The RFID can read the tag using Radio Frequency, meaning that the RFID

reader can be read from a distance, right through your clothes, wallet, bags etc. An RFID tag

consists of unique ID for each tag. The RFID technology has been in existence since the early

1920s. This technology has been used in libraries, museums, race timing, toll collection and

contactless payment, tracking of persons and animals etc.

The RFID attendance system is an automatic embedded system used in taking attendance

of registered persons in a particular organization. The RFID attendance system offers an

organization, the efficiency and convenience associated with RFID technology at a low cost. This

method is fast as well as simple. Each employee uses an RFID card and the reader records the

data when the employee enters or exits. RFID devices and software must be supported by a

sophisticated software architecture that enables the collection and distribution of location based
DOOR LOCK SECURITY SYSTEM 28

information in near real time. A complete picture of theRFID attendance system combines the

RFID Tags and readers with access to global standardized database, ensuring real time access to

up-to-date information on the card. The card contains a unique identification number called an

electronic product code (EPC).

Nowadays, there are lots of companies around the world and some of them consist of

workers up to 10 thousand or more. To handle a large number of workers may be a problem

especially to get the attendance of the workers. The manual process means that whenever a

worker comes to work, he goes to sign at the time officer’s table. This manual process has some

flaws because in a case where a worker bribes the time officer or is familiar with him, the time

officer may tamper with the attendance records. This would be a big problem in the company and

might affect the productivity and management of the company.

The suitable solution for this problem is by designing a system that will record attendance

automatically. In this project, RFID system is used to record the numbers of employees’

attendance automatically. The ID cards of the employees is embedded with RFID tag which is

read by a reader. This RFID system is interfaced to a database through a computer. This method

is more effective to prevent problem encountered when getting attendance manually. Below is

the block diagram of an RFID attendance system.

A study made by Leon Theremin (1945),where he invented an espionage tool (for spy

activities) for the Soviet Union which retransmitted incident radio waves with audio frequency

information. Sound waves vibrated a diaphragm which slightly altered the shape of the resonator,

which modulated the reflected radio frequency even though this device was covert listening

device, not an identification device or tag, it is considered to be a predecessor of radio frequency


DOOR LOCK SECURITY SYSTEM 29

identification (RFID) technology because it was likewise passive, being energized and activated

by waves from an outside source. Similar technologies such as the IFF (identification friend and

foe) transponder developed in the United Kingdom, was are still used by most powered aircrafts

to this day.

A study made by Mario .W. Cardullo (1973), was the first to have received the United

States patent for an active RFID tag withre-writable memory on January 23, 1973 [4]. In that

same year, Charles Walton, a California entrepreneur, received a patent for a passive transponder

used to unlock a door without a key. A card with an embedded transponder communicates a

reader near a door, when the reader detects a valid identification number stored within the tag,

the reader unlocks the door. Walton licensed the technology to Schalge Lock of San Francisco, a

lock maker and other companies.

Conceptual Model of the Study

On the basis of the foregoing concepts, theories and findings or related literature, studies

presented and insights taken from them, a conceptual model was developed as shown in the next

page:
DOOR LOCK SECURITY SYSTEM 30

Input Process Output

Knowledge Requirements: Project Design:

 Basic programming  System


 Assembly language Context
 MCU Diagram

Software Requirements: Project


Development:
 PDS v8 SP1(Schematic  Activity RFID –BASED
Capture and Diagram
Simulation) DOOR LOCK
 Picbasic (MCU Testing and
debugging
Programming Software)
 Protel for
Windows(PCB Layout)
 PicKit2( Pic burner)

Hardware Requirements:

 RFID Reader
 Numeric Keypad
 Voice Module
Evaluation
 Door Latch/ Latch
Driver

Figure 9. The Conceptual Model of the Study


DOOR LOCK SECURITY SYSTEM 31

The conceptual model of the study as shown in figure 9 shows and explains the

components essential for the system. The components include input, process and output.

INPUT

The input contains knowledge, software and hardware requirements. The knowledge

requirements are composed of the following basic programming, assembly language and MCU.

PDS v8 SP1(Schematic Capture and Simulation), Picbasic (MCU Programming Software),

Protel for Windows(PCB Layout) and PicKit2( Pic burner) are the software requirements which

will be needed to construct the proposed study. The hardware requirements are the RFID Reader,

Numeric Keypad, VoiceModuleand Door Latch/ Latch Driver.

PROCESS

The process in the Conceptual Study is composed of three parts: project design

represented by a block diagram, project development by an activity diagram, testing and

debugging includes the procedure on how the project works.

OUTPUT

After integrating the knowledge, software and hardware requirements, the output of the

project will be a RFID-BASED Door Lock.


DOOR LOCK SECURITY SYSTEM 32

Operational Definition of Terms

The following are the operational definition of terms:

PDS orPartitioned Data Setare probably the most frequently manipulated type of data sets

on many OS/390 systems. We store JCL, source code, and system parameters in PDS.

PICBASIC Compiler (or PBP) is our next-generation programming language that makes

it even quicker and easier for you to program Microchip Technology=s powerful

PICmicro microcontrollers. The English-like BASIC language is much easier to read and

write than the quirky Microchip assembly language.

Protel Advanced PCB is one of the software that use to draw and design schematic and

layout PCB that has a higher completeness.

PICkit is a low-cost development tool with an easy to use interface for programming and

debugging Microchip’s Flash families of microcontrollers. In-Circuit-Debugging runs

halts and single steps the program while the PIC microcontroller is embedded in the

application. When halted at a breakpoint, the file registers can be examined and modified.

Baud Rate is the speed at which data is transmitted. It is represented by a number

indicating bits per second.

Parity bit is a sort of check to ensure the data sent and received are same. If parity is to

be implementedboth systems, sender and receiver must implement it. Parity bit is either

set to Even or Odd, indicating thenumber of 1s in sent data.

Stop bit logical ‘1’ is sent to indicate end of a byte.


DOOR LOCK SECURITY SYSTEM 33

Evaluation System

Evaluation system was used to test if the researchers met the criteria in developing the

system. The aim of the evaluation is to identify if the developed system is acceptable in the set

standards of the respondents. It consists of respondents’ profile and the evaluation instrument.

Evaluation Procedure

For the evaluator accomplished a form will be given where he/she can write a grade in

every criterion for the system. The evaluator must be knowledgeable about website.

The following steps will be performed:

1. A set of questionnaire was given to each respondent.

2. The researchers discuss the project and the users would test and evaluate its performance.

3. The results will be tabulate and the mean ratings will be compute to determine if the

project is acceptable.

The following are the criteria for the evaluation of the hardware.

 Functionality is measured according to its ease of operation, provision for comfort and

convenience, and user-friendliness.

 Aesthetic is measured according to its color appeal, attractiveness of design, and

appropriateness of size.

 Workability is measured according to the availability of materials, availability of

technical expertise, and availability of tools and machines.

 Durability is measured according to the quality of materials, quality of workmanship,

and quality of design.


DOOR LOCK SECURITY SYSTEM 34

 Economy is measured according to the economy in terms of materials needed, economy

in terms of time/labor spent, and economy in terms of machine/s required.

 Safety is measured according to the absence of toxic/hazardous materials, absence of

sharp edges, and provision for protection devices.

 Saleability is measured according to the presence of market demand, accessibility to

finished product, and competitiveness of price.


DOOR LOCK SECURITY SYSTEM 35

CHAPTER 3

METHODOLOGY

This chapter comprises the Project Design, Data Flow Diagram, Entity Relationship
Diagram, System Flowchart, Project Development Flow, System Operation and Testing
Procedure, and Evaluation Procedure.

Project Design

Figure 10 illustrates the project design of the RFID Door Lock. It is a device that will let the

user simply scan his/her I.D. and enter the password to access a room. The figure concentrates on

how the project will be executed in a procedural manner and the projects general flow. The

project will be equipped with Radio Frequency Identification reader, Microcontroller, Door

Latch and Voice Module. The device can only store and recognize a maximum of 10 RFID tags.
DOOR LOCK SECURITY SYSTEM 36

Figure 10. Block Diagram of the RFID Door Lock

The microcontroller unit will serve as the central processor that is responsible for all the

activities of the device such as storing and recognizing RFIDs. The microcontroller that used was

PIC16F877. The microcontroller works to control the hardware and to interface with the RFID

Module and the Door Latch.


DOOR LOCK SECURITY SYSTEM 37

Once the user scans his/her I.D. on to the scanner, the data will be sent to the MCU that will

recognize the RFID and command the voice module to let the user enter the password on to the

keypad. If all the data entered are recognize correctly by the device, and then the MCU will

release the Door Latch to let the user access the room.

Figure 11. Schematic Diagram


DOOR LOCK SECURITY SYSTEM 38

Operation Procedures:

The operation procedures undertaken were as follows:

1.) Scanned the RFID on to the scanner of the device.

2.) If it’s recognized, user entered the password.

3.) Door Latch opened if password is correct.

Project Development

Project development follows an order of activities to be accomplished. The flow chart as

shown in Figure 12 illustrates the process of conducting the research in the development of the

RFID-Based Door Lock.

Hardware Components

1. Door prototype assembly.

2. Microcontroller attachment and on-board controller

2.1 Cut the pre- sensitized board into desired dimension.

2.2 transferred the design etched.

2.3 Mounted and soldered the components.

2.4 Downloaded program to the microcontroller.

2.5 Installed microcontroller to the circuit.

2.6 Tested circuit.


DOOR LOCK SECURITY SYSTEM 39

3. Voice module connected to the microcontroller

Software Components

1. Coded the behavior in every motion signal using PIC Basic Programming.

2. Embedded the coded in the PIC16F877 microcontroller.

3. Designed the algorithm.

4. Encoded the listing of the program.

5. Ran and executed the program to test the performance of the prototype.
DOOR LOCK SECURITY SYSTEM 40

Figure 12. Flow Chart of Project Development


DOOR LOCK SECURITY SYSTEM 41

Chapter 4

RESULTS AND DISCUSSION

This chapter presents the results and details discussion of the final evaluation. It includes the
project description, project structure, project capabilities and limitations.

Project Description

The developed Door Lock is a device that can minimize security problems. It is a two-

way security door lock system which used Radio Frequency Identification and Microcontroller.

The users simply scan their I.D. on to the scanner then input the password on the RFID Door

lock device. The process made easier since the device includes light signals and voice prompt

that inform the users what to do. Once the device has recognized the I.D. and the password

correctly, it will automatically unlock the door.

Figure 13. Actual image of the RFID Door Lock

Figure 13 shows the outer part of the device consisting of the RFID Scanner, numeric

keypad, signal lights, and speaker.


DOOR LOCK SECURITY SYSTEM 42

Figure 14. The outer Part of the Device

Project Structure

The images of the hardware are all discussed in this section. Shown in the image is the

hardware connection that was used to control the door lock.

Figure 14 shows the actual scanning of I.D. onto the device and as it recognized the I.D.

correctly, lights turned into yellow and green and voice prompts “card recognized, please enter

your password”.
DOOR LOCK SECURITY SYSTEM 43

Figure 15. Actual Usage of the Device

Figure 15 shows the user tapping his/her I.D. onto the scanner and light remains red and
voice prompts, “card recognized” if it is not recorded on the device.

Figure 16. Actual Usage of the Device


DOOR LOCK SECURITY SYSTEM 44

Figure 16 shows the user entering her password. The light turns light green and voice

prompts, “access denied” if the password is not correct.

Figure 17. Actual Usage of the Device

Figure 17 shows that the door automatically unlocks once the user enters the correct I.D.

password.

Figure 18. The Door Automatically Unlocks


DOOR LOCK SECURITY SYSTEM 45

Figure 18 shows that the light turns back red and voice prompts, “ access denied” once

the user enters an invalid password.

Figure 19. Actual Usage of the Device

Figure 19 shows that the user uses key and doorknob once electricity is absent.

Figure 20. Actual Usage of the Device


DOOR LOCK SECURITY SYSTEM 46

Project Capabilities and Limitations

The developed Door Lock is a device that can minimize security problems through the

use of Radio Frequency Identification and microcontroller.

The project’s capabilities were scanning I.D. and inputs password to access the room. Also, it

includes light signals, voice prompt that informs the users what to do, and changing password. It

can be used as a normal door that uses door knob and keys in case of brownouts.

Although the project presents functions for security purposes, it also contains certain

limitations over which the user has no control.The limitation of the project is that users will be

having the same password on all I.D.s.


DOOR LOCK SECURITY SYSTEM 47

Project Evaluation

The project was evaluated by 30 respondents composed of 29 IT / CS Students and a

Computer Professional. This was to determine its functionality, aesthetics, workability,

durability, economy, safety and saleability, the results are shown in Appendix D.

During the actual testing of the device, many students tested it by scanning the I.D.s and

entering its password. Also, the place where it was tested is in a crowded area.

Table 1. Respondents’ Mean Rating for Functionality (n=30)

CRITERIA MEAN QUALITATIVE INTERPRETATION

1. Ease of operation 4.7 Excellent

2. Comfort and convenience 4.6 Excellent

3. User friendliness 6 Excellent

Over all Mean 4.6 Excellent

Table 1 shows the respondents’ mean rating for the functionality of the project. The highest

mean rating was obtained by the indicator ease of operation ( x=4.7), while comfort and

convenience and user friendliness were both rates the insert (x=4.6) of the device. Functionality

obtained an overall mean rating of 4.6 which is interpreted as “Excellent”.


DOOR LOCK SECURITY SYSTEM 48

Table 2. Respondents’ Mean Rating for the Aesthetics (n=30)

CRITERIA MEAN QUALITATIVE INTERPRETATION

1. Color appeal 3.8 Very Good

2. Attractiveness of design 4.0 Very Good

3. Appropriateness of size 4.1 Very Good

Over all Mean 4 Very Good

Table 2 shows the respondents’ mean rating for the aesthetics of the project. The highest

mean was obtained by the apprecaiteness of its design ( x=4.1), while color appeal obtained the

insert rate (x=3.8) of the device. Aesthetics obtained an overall mean rating of 4.0 which is

interpreted as “Excellent”.
DOOR LOCK SECURITY SYSTEM 49

Table 3. Respondents’ Mean Rating for the Workability (n=30)

CRITERIA MEAN QUALITATIVE INTERPRETATION

1. Availability of materials 3.3 Very Good

2. Availability of technical expertise 4.4 Very Good

3. Availability of tools and machines 4.4 Very Good

Over all Mean 4.4 Very Good

Table 3 shows the respondents’ mean rating for the workability of the project. The highest

mean rating were both obtained by the indicators technical expertise and tools and machines

(x=4.4) while materials get a mean rating of 3.3 obtained an overall mean rating of 4.4 which is

interpreted as “Very Good”.


DOOR LOCK SECURITY SYSTEM 50

Table 4. Respondents’ Mean Ratings for the Durability (n=30)

CRITERIA MEAN QUALITATIVE INTERPRETATION

1. Quality of materials 4.2 Very Good

2.Quality of workmanship 4.3 Very Good

3. Quality of design 4.0 Very Good

Over all Mean 4.1 Very Good

Table 4 shows the respondent’s mean ratings for the durability. The highest mean rating

durability was obtained by quality of workmanship (x=4.3), while quality of material obtained

the insert (x=3.2). Durability obtained an overall ratings of 4.1 which is interpreted as “ Very

Good”.
DOOR LOCK SECURITY SYSTEM 51

Table 5.Respondents’ Mean Rating for the Economy (n=30)

CRITERIA MEAN QUALITATIVE INTERPRETATION

1. Materials needed 4.2 Very Good

2. Time/labor spent 4.2 Very Good

3. Machine’s required 4.2 Very Good

Over all Mean 4.2 Very Good

Table 5 shows the respondent’s mean ratings for the economy. The highest mean rating

economy was obtained by both indicators time spent and machines required (x=4.3) while

materials needed got the insert (x=4.2). Economy obtained an overall rating of 4.3 which is

interpreted as “Very Good”.


DOOR LOCK SECURITY SYSTEM 52

Table 6.Respondents’ Mean Rating for the Safety (n=30)

CRITERIA MEAN QUALITATIVE INTERPRETATION

1. Absence of toxic 4.6 Excellent

2. Absence of sharp edges 4.3 Very Good

3.Provision for protection devices 4.5 Excellent

Over all Mean 4.5 Very Good

Table 6 shows the respondent’s mean ratings for the safety. The highest rating safety was

obtained by indicators provision for protection and absence of toxic materials and absence of

sharp edges obtained the insert (x=4.4) an overall of 4.5 which is interpreted as “Very Good”.
DOOR LOCK SECURITY SYSTEM 53

Table 7.Respondents’ Mean Rating for the Saleability (n=30)

CRITERIA MEAN QUALITATIVE INTERPRETATION

1. Presence of market demand 4.1 Very Good

2. Accessibility to finished product 4.4 Very Good

3. Competitiveness to price 4.2 Very Good

Over all Mean 4.2 Very Good

Table 7 shows the respondent’s mean ratings for the saleability. The highest mean rating

saleability was obtained by accessability (x=4.4) while market demand got the invert (x=4.2).

Saleability obtained an overall of 4.3 which is interpreted as “Very Good”.


DOOR LOCK SECURITY SYSTEM 54

Table 8. Respondents’ Overall Mean Rating of the Project (n=30)

CRITERIA MEAN QUALITATIVE INTERPRETATION

1. Functionality 4.6 Excellent

2. Aesthetics 3.9 Very Good

3.Workability 4.4 Very Good

4.Durabilty 4.1 Very Good

5.Economy 4.2 Very Good

6.Safety 4.5 Very Good

7.Saleabilty 4.2 Very Good

Over all Mean 4.3 Very Good

Table 8 shows the overall mean rating of the evaluators who rated the project. The

functionality got the mean rating (x=4.6) while aesthetics got the lowest mean rating (x=4.0). The

overall rating is 4.3 which falls within the range of the scale value “Very Good”. This establishes

the level of acceptability of the project.


DOOR LOCK SECURITY SYSTEM 55

Chapter 5

SUMMARY, CONCLUSIONS AND RECOMMENDATIONS

This chapter contains the summary, conclusions and recommendation for the project. It

responds to the closure of the idea of remote control in the future. Then, it also states suggested

development opportunities for the project that many will try their best to make it work.

Summary of Findings

The developed project was all about a two-way Door Lock security system using Radio

Frequency Identification and microcontroller. Through tapping of ID and input of password, a

user can access a room. The process were made easier with the help of light signals and voice

prompt which tells the user what to do. It can also be used as a normal door with door knob and

keys and includes changing of password.

The device was evaluated using the TUP Evaluation Sheet (Refer to Appendix D). The

respondents were composed of 29 IT / CS students and a computer professional and achieved a

mean raing of 4.3, which has an equivalent rating of “Very Good”.


DOOR LOCK SECURITY SYSTEM 56

Conclusions

The conclusions of the study are the following:

1. The device was designed with the following features:

a. A two-way security door lock system.

b. Let the user scan his/her I.D. and input password to access the room.

c. Includes release button.

d. Includes signal lights and voice prompt that informs the user what to do and tell

whether the user’s request is granted or not.

e. Changing of password.

f. Can be used as a normal door in case of brownouts.

2. The device was created using microcontroller device.

3. The device was tested and evaluated in terms of its security features.

4. The device was accepted in terms of its functionality,aesthetics, workability,

durability, economy, safety, saleability.


DOOR LOCK SECURITY SYSTEM 57

Recommendations

The following are the recommendations of the study

1. The device can be improved by adding LCD screen for registration and changing of

password.

2. The device would be better if it uses microchip rather than microcontroller.

3. The device will improved by enhancing the sounds.

4. The device will be improved by adding record system.


DOOR LOCK SECURITY SYSTEM 58

REFERENCES

Retrieved from file:///G:/Labcenter%20Electronics%20-%20Proteus%20VSM%20-


%20SPICE%20CoSimulation%20Debugging%20for%20PIC,8051,AVR,HC11%20and%20AR
M.htm

Craig Peacock (25th October 2010). Retrived from


file:///G:/Interfacing%20The%20Serial%20%20%20RS-232%20Port.htm

Miercuri (2009), Februarie (2011). Retrieved from file:///G:/Proton%20Basic.htm

Vivek R. (June 29, 2011). Retrieved from


file:///G:/Required%20Tools%20for%20PIC%20microcontroller%20project%20development%2
0-%20Electronic%20Circuits%20and%20Articles.htm

Retrieved from
file:///G:/Radio%20Frequency%20Identification%20%20%20Debatewise%20Where%20great%
20minds%20differ.htm

Fall (2007). Current Student Projects. Retrieved from file:///G:/rfidprojects.htm


DOOR LOCK SECURITY SYSTEM 59

APPENDIXES
DOOR LOCK SECURITY SYSTEM 60
DOOR LOCK SECURITY SYSTEM 61

Appendix B
TOTAL COST OF PRODUCTION

Hardware Requirements Quantity Cost (PhP)

Resistor 1k 1 2.50
2k 2 20.00 (10.00 each)
Capacitor 22p 2 10.00 (5.00 each)
2200 uf 1 27.00
1000 uf 1 226.00
Integrated Circuit PIC16F887 1 350.00
7805 1 34.50
Transistors IRF540 1 45.00
Diodes IN4007 2 6.00 (3.00 each)
IN4001 1 4.50
Connector- SIL2 5 75.00 (15.00 each)
Solenoid Latch 1 157.50
Crystal Speaker 1 150.00
40 Pin IC 1 28.00
16 Pin IC 1 9.00
Alexan Plastic Box 1 250.00
Connecting Wires 20 200.00 (10.00 each)
3x4 Numeric Keypad 1 267.00
Power Cord 1 98.00
Metal Door Latch 1 2,500.00
Door Prototype 1 1,500.00
750 MA Transformer 1 503.50
4 MHz Crystal 1 4.50
Door Knob 1 150.00

Software Requirements

Windows 7 Professional 7,599.00


PIC Basic PBP 3 Experimenter 2,379.81
Proton Development Suite 7,896.00

Labor Cost

Fabricator 10,000.00 per month 10,000.00


Programmer 20,000.00 per month, for 2 months 40,000.00
Miscellaneous 5,000.00

TOTAL COST PhP.79,493.81


DOOR LOCK SECURITY SYSTEM 62

APPENDIX C
TECHNOLOGICAL UNIVERSITY OF THE PHILIPPINES
COLLEGE OF SCIENCE

EVALUATION SHEET
Name (optional): _____________________________
Instruction: Please evaluate the project by using the given scale and placing a checkmark (✓) under the
corresponding numerical rating.
Numerical Rating Descriptive Rating

5 Excellent

4 Very Good
3 Good
2 Fair
1 Poor
5 4 3 2 1
A. Functionality
1. Ease of operation
2. Provision for comfort and convenience
3. User-friendliness
B. Aesthetics
1. Color appeal
2. Attractiveness of design
3. Appropriateness of size
C. Workability
1. Availability of materials
2. Availability of technical expertise
3. Availability of tools and machines
D. Durability
1. Quality of materials
2. Quality of workmanship
3. Quality of design
E. Economy
1. Economy in terms of materials needed
2. Economy in terms of time/labor spent
3. Economy in terms of machine/s required
F. Safety
1. Absence of toxic/hazardous materials
2. Absence of sharp edges
3. Provision for protection devices
G. Saleability
1. Presence of market demand
2. Accessibility to finished product
3. Competitiveness of price
Comments:
_____________________________________________________________________________________

Signature of Respondent
DOOR LOCK SECURITY SYSTEM 63

APPENDIX D
Summary of Evaluation Sheet

No. of
Respo
ndents FUNCTIONALITY AESTHETICS WORKABILITY DURABILITY ECONOMY SAFETY SALEABILIT
Y

1 5 5 5 4 4 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5
2 5 5 5 4 5 4 5 5 4 5 5 5 4 5 4 5 4 4 5 5 5
3 5 4 4 4 4 3 4 4 4 3 3 3 3 3 3 4 4 4 3 3 3
4 5 4 3 3 3 4 4 4 4 3 3 3 4 4 4 5 5 4 3 4 3
5 5 5 5 5 5 4 4 4 4 5 5 5 4 4 4 5 4 5 4 4 4
6 4 4 4 3 3 3 3 4 4 4 4 4 3 3 3 4 4 4 4 4 4
7 5 5 5 4 4 3 5 5 5 5 5 4 5 5 5 5 4 5 5 5 5
8 4 4 4 3 3 3 4 4 4 3 4 4 4 5 4 4 4 4 4 4 4
9 5 5 5 4 4 4 4 5 4 4 4 4 4 4 5 5 5 5 4 5 4
10 4 4 4 2 3 2 4 3 4 4 4 4 3 3 3 5 5 5 4 3 2
11 4 5 5 4 4 4 4 5 4 4 4 4 3 3 3 5 4 5 4 4 4
12 5 5 4 4 5 4 5 5 5 5 4 5 5 4 5 5 4 4 4 4 4
13 4 4 4 3 4 4 4 4 4 3 4 3 4 4 4 3 3 4 4 3 4
14 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5
15 5 5 5 3 4 4 5 4 5 4 5 4 4 4 4 4 4 5 5 5 5
16 5 5 4 3 4 5 5 5 5 4 5 4 5 5 5 5 4 4 4 5 5
17 4 5 5 4 4 4 4 4 5 4 4 5 5 5 5 5 5 5 4 5 4
18 5 5 5 4 4 5 4 5 4 4 5 4 5 4 5 5 5 4 4 5 4
19 5 5 5 4 3 3 4 4 5 3 4 3 5 4 4 5 3 5 3 4 4
20 5 5 4 4 5 5 5 5 5 5 5 5 5 5 5 4 4 4 4 5 4
21 5 5 5 5 5 5 4 5 5 4 4 4 5 5 5 5 5 5 5 5 5
22 5 5 5 5 5 5 4 5 5 4 4 4 5 5 5 5 5 5 5 5 5
23 4 3 3 2 2 4 3 3 3 3 4 3 3 3 4 4 4 4 3 4 3
24 4 4 5 4 4 5 5 5 5 4 5 4 3 4 4 4 4 5 3 4 3
25 5 4 4 5 5 4 4 4 4 5 3 2 3 3 3 5 5 4 4 4 5
26 5 5 5 3 4 5 5 4 4 5 4 3 5 5 4 5 5 5 4 4 5
27 5 5 5 5 4 5 5 5 5 5 3 5 4 5 5 5 5 5 5 5 5
28 5 5 5 3 3 3 5 5 5 5 5 3 4 4 4 4 4 4 4 5 4
29 5 5 5 5 5 5 4 4 5 5 5 5 5 5 5 5 5 5 4 5 5
30 4 4 5 4 4 4 4 4 4 5 5 5 5 5 5 4 4 5 5 5 5
MEAN 4.7 4.6 4.6 3.8 4 4.1 4.3 4.4 4.4 4.2 4.3 4 4.2 4.3 4.3 4.6 4.4 4.6 4.2 4.4 4.3

MEAN PER 4.6 4.0 4.4 4.2 4.3 4.5 4.3


CRITERION

OVERALL MEAN 4.3

OVERALL DESCRIPTIVE RATING“Very Good”


DOOR LOCK SECURITY SYSTEM 64

APPENDIX A
Project Gantt Chart

You might also like