Preview

Micr

Satisfactory Essays
Open Document
Open Document
587 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Micr
o
[pic]

FACULTY OF ENGINEERING AND TECHNOLOGY

DUO ASSIGNMENT 2010

MICROPROCESSOR AND MICROCONTROLLER
ECP 2216

|NAME |NUR AFIFAH BT HARIRI |INTAN MURSYAIDAH BT AJIS |
|ID |1091104797 |1081100308 |
|EMAIL |ifaizal_88@yahoo.com |bawank_pink@yahoo.com |
|MAJOR |TELECOMMUNICATION |BIO-INSTRUMENTATION |

INTRODUCTION

In real world , security is a major concern in our day-today life. Everyone wants to be as much secure as possible. An access control for doors forms a vital link in a security chain. The microcontroller based digital lock for doors is an access control system that allows only authorized persons to access a restricted area. The system is fully controlled by the 8 bit microcontroller AT89C2051 which has a 2Kbytes of ROM for the program memory. The password is stored in the EPROM so that we can change it at any time. The system has a Keypad by which the password can be entered through it. When the entered password equals with the password stored in the memory then the relay gets on and so that the door is opened. If we entered a wrong password for more than three times then the Alarm is switched on.

An electronic lock is a locking device which operates by means of electric current pass through it. The application for residential such as front doors on apartments and single-family houses.The correct code must be entered in order for the lock to deactivate. Such locks typically provide a keypad, and some feature an audible response to each press. Combination lengths are usually between 4 and 6 digits long.

Basically, electric locks use

You May Also Find These Documents Helpful

  • Good Essays

    Rapha provides exterior lockable doors and windows, in addition to the effective automated devise or system that alerts staff…

    • 699 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Physical entry controls will consist of guard’s at all perimeter doors, and into all secure areas. Also a security system on all outer doors that is monitored 24 hours a day by a security company. There will also be motion sensors at all available accessible areas. There will be barbed wire around all access to first and second floor areas around perimeter fence. There will also be badges for person ale according to security level as well as guest. Also security cameras in all accessible areas with 360 degree rotation as well as nightvision.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It 210 Week 8 Checkpoint

    • 358 Words
    • 2 Pages

    | |sure that you can only turn the device on if |user who can open and close the door|opened or closed, it must inform the |…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By enabling password protection on all workstations and implementing a three try timeout/lockout on an un-successful entered password, you can protect your company from unauthorized users trying to gain access by password hacking.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A LAN, or local area network, is a group of computers ranging from small to large within a single office or building. Security and access control has to be robust to secure data, applications, and confidential records. Unauthorized access to the network is a massive security risk for the infrastructure. One way to reduce the risk of access is to implement access doors with key cards to only allow authorized personnel. So if there was a breach in security its only limited to select personnel.…

    • 347 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Sun Micr

    • 301 Words
    • 2 Pages

    Sun Microsystems is a leading supplier of computer related products, including servers, workstations, storage devices, and network switches. In the letter to stockholders as part of the 2001 annual report, President and CEO Scott G. McNealy offered the following remarks: Fiscal 2001 was clearly a mixed bag for Sun, the industry, and the economy as a whole. Still, we finished with revenue growth of 16 percent—and that’s significant. We believe it’s a good indication that Sun continued to pull away from the pack and gain market share. For that, we owe a debt of gratitude to our employees worldwide, who aggressively brought costs down—even as they continued to bring exciting new products to market. The statement would not appear to be telling you enough. For example, McNealy says the year was a mixed bag with revenue growth of 16 percent. But what about earnings? You can delve further by examining the income statement in Exhibit 1. Also, for additional analysis of other factors, consolidated balance sheet(s) are presented in Exhibit 2. 1. Referring to Exhibit 1, compute the annual percentage change in net income per common share-diluted (2nd numerical line from the bottom) for 1998–1999, 1999–2000, and 2000–2001. 2. Also in Exhibit 1, compute net income/net revenue (sales) for each of the four years. Begin with 1998. 3. What is the major reason for the change in the answer for question 2 between 2000 and 2001? To answer this question for each of the two years, take the ratio of the major income statement accounts (which follow Exhibit 1 on the next page) to net revenues (sales). (a) Cost of sales (b) Research and development (c) Selling, general and administrative expense (d) Provision for income tax…

    • 301 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Various authentication methods are used and range from the simple to complex. The security level provided will vary depending on the utilized technique and deployment method. The most dominant method involves authentication with a password and username. However, this is also one of the most insecure methods. We can describe these devices and systems depending on the three factors:…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Mike

    • 1217 Words
    • 5 Pages

    For your Seminar 2 Treatment Plan Portfolio you will build on your work from last week by completing the following sections of your portfolio. Your instructor will then review and return your assignment with feedback comments to let you know where you are on track, how you have done, as well as make suggestions that may need to be incorporated in order to successfully move onto the next part of the Treatment Plan Portfolio project.…

    • 1217 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Term paper

    • 1329 Words
    • 6 Pages

    A physical model and steps of building the security system will be discussed as well as its set up and mode of operation. System testing showed a quick and efficient operation of the system, where in case of smoke or fire detection, light and siren are triggered and fire department is called, and in case of break-in police is called as well as siren is triggered.…

    • 1329 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    All the external doors can be opened from inside the building to allow persons to exit at any time, however the doors are alarmed. This alerts staff by the use of a paging device, carried by all support staff. This enables safety and security of all persons within the building.…

    • 602 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Bananas

    • 344 Words
    • 2 Pages

    2. The data stored in locked drawers, rooms, or areas where access is controlled by a guard, cipher lock, or a card reader is a key area where cryptography is needed as access to these areas must be restricted to any unauthorized personnel. Any secured or guarded restricted area is required to have physical access control measures to allot for protection and to prevent any unauthorized access by anyone not holding the proper credentials to be in the secured area.…

    • 344 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The main door into the building has a security code lock that only staff knows. I am not in a position to give this number to anyone! This also includes the children of the school as they may tell others or adults or use it themselves. When using the code I make sure it is covered up when the possibility of others being able to see it. I then make sure that the door is securely locked behind me.…

    • 1672 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Emr

    • 5291 Words
    • 22 Pages

    Nelson, Rosemarie. "EMR Selection and Implementation." The Patient-Centered Gastroenterology Practice. GME Series in Practice Management. Nov. 2007 <http://www.patientcenteredpractice.com/_files/pdfs/gastroenterology/id_12b.pdf>.…

    • 5291 Words
    • 22 Pages
    Powerful Essays
  • Good Essays

    Mr Mike

    • 1205 Words
    • 5 Pages

    “ Throughout our history ,we [Americans] have been willing to trade freedom for safety during wartime”(St Luis Post Dispatch Editorial,11 October 2001).This essay will argue that a responsible government has to protect its citizens and this protection will include the use of censorship but it should not resemble an authoritarian country otherwise freedom of speech and free exercise of religion will be lost. An examination will be made about the positive aspects of censorship and why censorship is so vital to our culture,there will also be an examination about the negative impacts of censorship and how some governments try to use it to manipulate its citizens and lastly there will be emphasis to how censorship should and can be used in a democratic society.…

    • 1205 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Macr

    • 391 Words
    • 2 Pages

    Option 1: All cash deal financed by issuing 20-year 10% coupon bonds taxable in nature…

    • 391 Words
    • 2 Pages
    Satisfactory Essays