Preview

Network Based Door Lock Utilizing Radio Frequency Identification Card for Multimedia Rooms

Good Essays
Open Document
Open Document
8537 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Based Door Lock Utilizing Radio Frequency Identification Card for Multimedia Rooms
CHAPTER 1
THE PROBLEM AND A REVIEW OF RELATED LITERATURE

Doors are used to separate interior spaces of the house for privacy, convenience, security, and safety reasons. Not only houses but also offices, shops, stores and schools have used doors to secure passages from the exterior for reasons of safety and for climate control. All doors had locks which have numerous uses. Be it general or specialized. Generally, door locks are important for safekeeping [1].
There are lots of different brands of door locks, and a reputable one is crucial for the privacy or security required like Dexter, Skulthai, Schlage, Chubb and Yale, but the researchers envisioned to make a network based door lock utilizing radio frequency identification device. This would be specifically used for the multimedia rooms in St. Paul University Surigao.
Multimedia room is typically used for presentation of reports or class discussion. It uses projector or television, computer and other device for presentation. This room is very helpful especially in class presentations to make it very clear and more understandable. It could help visualize presentations during the delivery of report by combining images, texts, audios and even videos.
Radio Frequency Identification (RFID) however, is a technology that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency (RF) portion of the electromagnetic spectrum to uniquely identify an object, animal, or person. RFID has been increasingly used in industry as an alternative to the bar code. One of the advantages of RFID is, it does not require direct contact or line-of-sight scanning. An RFID system consists of three components: an antenna, transceiver and a transponder (the tag). The antenna and transceiver were often combined into one which would be the RFID reader. The higher the frequency range, the more expensive the system would be.
With the number of keys in all rooms in St. Paul University Surigao, there is

You May Also Find These Documents Helpful

  • Best Essays

    Proposal Just Relax Inc

    • 1722 Words
    • 7 Pages

    Öztayşi, B., Baysan, S., & Akpinar, F. (2009). Radio frequency identification (RFID) in hospitality. Technovation, 29(9), 618-624. doi:10.1016/j.technovation.2009.05.014.…

    • 1722 Words
    • 7 Pages
    Best Essays
  • Satisfactory Essays

    I have viewed a few websites about Radio Frequency Identification (RFID) tags. It is a very tiny technology and often the size of a grain of rice but now have been shrunk to half the size of a grain of sand! RFID tags are intelligent bar codes that can store up information of either merchandises, pets or farm animals and many more depending on what people want to chip the RFID tags into. These RFID tags also act as a very powerful tracking device, which farmers and owners of pets chipped them into their herbivores and pets. Because of the capability to determine the distance of the tag from the reader position, lost pets and farm animals, as well as RFID tagged items can be easily tracked down. However, the use of RFID tags are arising privacy concerns among the human community.…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    RFID Chips

    • 3547 Words
    • 15 Pages

    Radio-frequency identification (RFID) chips are small radio-frequency electromagnetic fields that can be used in a product, animal, and humans to track location, transfer data, and to identify the object. These chips are as small as a grain of rice and can store over 2,000 bytes of data. Some chips are powered by and read at short ranges via magnetic fields (electromagnetic induction). Certain chips use a local power source like a battery and some others that don’t use a local battery get the energy from interrogating electromagnetic fields and then act as a passive transponder to emit microwaves. RFID chips have been around for a very long time, but a lot of people don’t know what they are used for and what they are used in.…

    • 3547 Words
    • 15 Pages
    Better Essays
  • Good Essays

    Case Project

    • 650 Words
    • 3 Pages

    Recommending the use of fingerprint scanners is not plausible because they are not a hundred percent accurate. Why even use a standard biometric device at a main entrance to a building. The best method of securing an entrance to a building is the old fashion way. By using manpower to man the entry control points to the building to check personnel to ensure they have access to the building.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Install top quality residential grade door locks on all external doors. It doesn’t take much for an intruder who is armed with a thin bladed knife or screwdriver to easily pry open any cheap lock without much effort. However, the special features that come with the more expensive residential grade security lock makes it much more difficult for an intruder harder to break in. 3.…

    • 561 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    TABLE OF Contents Summary Radio Frequency Identification - Introduction RFID had to begin somewhere What is RFIT? RFID and its Current and Planned Uses RFID Chips used on students? Retail Stores go Smart with RFID RFID & Bar Codes Injections into Humans 1. Medical Records Use 2. Building access and security 3. Possible Future Applications Potential problems 4. Potential problems Conclusion - RFID, as an emerging technology, for the Consumer in the Future Appendix Bibliography 2 3 3 3 4 4 4 5 5 5 6 6 7 8 9 10…

    • 3088 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Hotel Security

    • 405 Words
    • 2 Pages

    One new trend in hotel security is the interest in biometric locking systems. It’s design to recognize the individual by finger printing. This will allow the quest to gain entry into the hotel, as well as their individual rooms simply by their fingers. The use of magna strips are used now. This technique slims down the chances of intruder entry into the guest individual rooms. Once the room has been checked out, the combination used with the card, is reset. Most travelers leave valuables in their room to avoid taking belongings with them. There are some hotel rooms equip with safes to store their valuable. These resources give patrons the security of protecting their belongings and not endure the burden of lugging these things along and the potential of getting stolen while they are outside of the hotel.…

    • 405 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Imagine going to the supermarket, picking your favorite products and just exiting the store without waiting in line for the next available cashier. Sounds good? Well, this and much more will be possible soon with radio frequency identification (RFID) technology. Like everything, this technology has its pros and cons. As you will see, this unique technology will be more beneficial than detrimental to our society.…

    • 622 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Due to recent university campus violence it has become necessary for the before mention organization to develop an access control systems (ACS) to ensure student safety. As a member the security team I‘m the project manager for the ACS. This essay will look at the five phases and applicable subsets in the building of the ACS for resident facilities. The five phases that this essay will be addressing: Planning or identification of the scope of the project, Analysis- also known as whom, what, where and when, Design- also known as step by step, Implementation-installation and finally, Maintenance-monitoring of the system. The current system of cameras the photograph those who are entering and leaving the dorm will be integrated into the new ACS. A Gantt chart and diagram will accompany this essay.…

    • 1213 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    Wireless communication is very common and widely applicable technique in communication field. In these field new techniques invented that is called RFID technique, in which object having RFID tags on them are being accessed in radio frequency region. Cryptography (method involves the both process “encryption” and “decryption”) is widely used in network system’s security. It is also the ancient method of encoding the original messages for transmission. On the other side The RFID technology recently has gained enormous attention in various field like in database maintenances(in the library management system), media, industry and as well as in network security. In the Radio frequency identification (RFID) use of an object (typically referred to as RFID tag) applied to or incorporated into a product, animal, or person (user) for the purpose of identification and tracking using radio waves. Each member has its unique id or RFID tag. However security and privacy pose significant challenges on the system.…

    • 1385 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    “There is no place like home”, that is one of our favorite quotations right now. From the very start, home is really our comfort zone, a place where we can be worry free, a place where we can relax and a place that is far from harm. A house plays a big role in our lives, but what will happen if criminal such as burglar tries to take advantage while we are far away from our home? They might steal very important and valuable things that we have and things that we’ve produced from our hard work. To prevent those things from occurring, we are introducing this project, “Door Access using Numeric Keypad”. This project is proposed for the home-owners not to be worried whenever they are not in their homes. Most of the time whenever we go to some places and no one is left in our house, we are very worried if what will happen in it, and will came to a point that we will not enjoy some moments with our family outside our house because of thinking too much. That’s why we decided to pursue this project. Burglars are everywhere, but with the help of “Door Access using Numeric Keypad” burglars has less chance in intruding houses.…

    • 1551 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Rfid Secure Access

    • 6940 Words
    • 28 Pages

    RFID based Secured access system implemented on 8051 microcontroller . This is a very useful application of RFID (Radio-frequency identification) and is very commonly used in institutes, offices, homes and so on. An RFID system consists of a reader device and a transponder. A transponder or tag has a unique serial number which is identified by the reader. Here RFID has been interfaced with AT89C51 to provide secured access. The relevant messages are also displayed on a 16x2 LCD. RFID automated access for door controls to buildings, departments, rooms, secured closets (wiring, PBX, etc.) and cabinets is very cost effective and secure to use. Many people do not realize how easy it is to implement card access systems such as card access door or doors using RFID readers and RFID Cards or Keyfobs for Secured Access Control Management. You can even use smart readers for computer rooms and securing individual computers. In fact access based entrance and exits using access smart technology is rapidly becoming the way of the future for many businesses, government buildings, hospitals, museums and other establishments requiring secured but easy to control access solutions. Access based systems use either 125 kHz RFID or 13.56 MHz RFID readers, cards and keyfobs.…

    • 6940 Words
    • 28 Pages
    Powerful Essays
  • Good Essays

    People nowadays tend to go in and out of their houses for certain purposes, and sometimes leave their houses with no guardian. It is a perfect timing for burglars to barge into their houses and take all the things they wanted to take. Because of these happenings, the house owner will be alarmed seeing his house half empty. Because of these situations, the researchers thought of an idea of making a device that will make the owners relieved even they are outside their house.…

    • 1413 Words
    • 6 Pages
    Good Essays
  • Good Essays

    This era is known as the computer era. This is because of the extensive advancement in technology i.e. using of laptops, computers, tablets and last but not the least the CELLPHONES. As per the increased rate of advancement in technology is like a boon for us. These various equipments are not only required by children or workers but are also demanded in high rate by doctors. This is so, because of its capacity of record keeping and managing the same. The main success of the technology is the Internet. It is that globally developed system that connects networks which use standard internet protocol acting as a linkage between several devices worldwide. Therefore,…

    • 831 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Keys and Locks

    • 660 Words
    • 3 Pages

    Locks. They serve us a myriad of uses. They protect our most valuable possessions. They ensure our safety. They save our privacy. They behold the world's secrets. Guarding doors or gates or safes or chains or pricey possessions, they can be protecting and aggravating. Locks can be great or they can be horrid.…

    • 660 Words
    • 3 Pages
    Good Essays

Related Topics