automatic safe deposit box security system using

0 downloads 0 Views 2MB Size Report
To save a digital IO pin, interface keypad using only one channel ADC. The .... Arifianto, Deni, “Kamus Komponen Elektronika”, Kawan Pustaka, 2011. ... (http://geocities.com/transmisieeundip/minarni/pdf, diakses pada tanggal 7 Mei 2014). 5.
Journal of Advanced Research in Dynamical and Control Systems

Vol. 9. Sp– 16 / 2017

AUTOMATIC SAFE DEPOSIT BOX SECURITY SYSTEM USING ARDUINO UNO Yohannes Yahya1 , TW Wisjhnuadji2, Arunkumar N3 1, 2

Lecturer of bInformation Technology Faculty of Universitas Budi Luhur Jl. Ciledug Raya, Petukangan Utara, Jakarta Selatan-Indonesia

3

Assistant Professor, Department of EEE, Sastra University, Tanjore, India

Email ID: [email protected] [email protected] [email protected]

ABSTRACT Safe-deposit box is a medium that can be used to store one or more valuable objects. Safes have a function to protect valuables from theft or robbery. At the beginning of the discovery of safes, used only in the form of a safety lock. However, as the development of the times found some features that can be used on safes to secure objects in the safe. Eg fingerprint detector, or better known by the name of fingerprint, password and buzzer. Fingerprint is a feature where this feature using the authenticity of a person's fingerprint, in this case the owner safes. Password is a password that can be input via a keypad. Of course, this password is only known to the owner of a safe and can be changed periodically. While the buzzer is a marker of when the safe was forced open by thieves or robbers.Safes used in this final project is controlled by mikrontroler named Arduino Uno. The program used is the basic program of the Arduino Uno. Keywords: Arduino Uno, Fingerprint, Buzzer, Password

1. INTRODUCTION Safe-deposit box is a storage medium that is normally used to store precious objects belonging to a person or group. Safes can be placed anywhere: at home, at work, at school and elsewhere. In particular, a safe functioned to protect valuables from theft or robbery. Safes must have a sophisticated security system to prevent theft. One method used for securing the safe by using the keypad to enter a password, fingerprint and buzzer. Both of these can be combined in such a way so as to protect the valuables contained in safes.

JARDCS

Special Issue On Intellectual Computation Systems

806

Journal of Advanced Research in Dynamical and Control Systems

Vol. 9. Sp– 16 / 2017

Keypad and fingerprint is the access into the safe deposit box where only the owner or user can activate it. The owner can choose a password that he wants to get into the safe access without being noticed by others. While the fingerprint has its own characteristics. Only the owner who has the authenticity of the original fingerprint on the fingerprint. That makes it difficult for others who want to open the safe. Other than that, in the safe can also be placed buzzer that serves as a marker if the safe was forced open by someone else. This further strengthens the security system safe, the owner of the precious objects will feel safe and comfortable leaving their valuable things.

2. METHODS Method development system of automatic of Safe Deposit box are as follows: a. Literatures What is meant by a literature study / reference is the development of literature by studying various books relating to this thesis. b. Design What is meant by the design of the study is to conduct research by designing tools, tool or practice test tool discussed in this thesis. c. Discussion This method is the author did for reference materials that are theory and techniques and how the tool works on the whole, discussions were made to the supervisor and fellow students who have insight into the current material.

3. BASIC THEORY 3.1. Uno Arduino Arduino Uno is a microcontroller board based on the ATmega328. This board has 14 digital input / output pins (of which 6 pin can be used as PWM outputs), 6 analog inputs, 16MHz crystal oscillator, a USB connection, power jack reset button as shown in Table 1. Pin-pin contains everything needed to support the microcontroller, simply connect to your computer with a USB cable such as figure 2.2 or voltage source can be obtained from the AC-DC adapter or battery to use it.Below is a table Arduino Uno description: Table 1: Arduino Uno

JARDCS

Special Issue On Intellectual Computation Systems

807

Journal of Advanced Research in Dynamical and Control Systems

Vol. 9. Sp– 16 / 2017

Mikrokontroler

Atmega328

OperasiVoltage

5V

Input Voltage

7-12V

Input Voltage

6-20V (limits)

I/O

14pin(6pinPWM)

Arus

50mA

FlashMemory

32KB

Bootloader

SRAM 2KB

EEPROM

1KB

Kecepatan

16Mhz

3.2. Fingerprint Fingerprint is a feature that is used to detect a person's fingerprint. Fingerprint is a method that has now developed a machine with the help of software to populate the data the presence of a community, group or institution that uses it. The strength and weakness of a fingerprint is: a. The Strength of fingerprint Fingerprint has a price relatively cheaper when compared to other biometric systems. In addition, each person has a different fingerprint patterns making it difficult for others to break into systems using this fingerprint. b. Weakness of fingerprint Fingerprint can not recognize fingers wet. For users who frequently sweaty hands, will be little difficulty in using this sensor. Generally, by cleaning the finger, is sufficient to overcome this problem. When a wet finger scanned, then the water spots will disturb the pattern of the fingerprint can not be recognized by the fingerprint pattern. JARDCS

Special Issue On Intellectual Computation Systems

808

Journal of Advanced Research in Dynamical and Control Systems

Vol. 9. Sp– 16 / 2017

Figure 1: Fingerprint

3.3. Keypad Keypad interface includes a tool that is often and quite easy to use. Keypad is one means of input that is widely used in machine interface applications. The main function keypad is actually to save the use of input ports, for example in the 4x4 keypad can be used as an input as many as 16 keys and only use 8 ports. In this security system in a safe deposit box discount function keypad as insert to enter a password to open the safe door.

Figure 2: Keypad

3.4. Solenoid The working principle of the solenoid based on the conductor carrying the current into the coil so that the coil will create a magnetic field. This magnetic field is created so that the situation is always repel the magnetic field

. Figure 3: Solenoid

3.5. LCD (Liquid Crystal Display) LCD Key pad shield developed for Arduino compatible board, to provide interface is userfriendly allowing users to go through the menu, make a selection etc. It consists of 1602 characters white blue LCD backlight[1]. Key consists of five buttons-select, top, right, JARDCS

Special Issue On Intellectual Computation Systems

809

Journal of Advanced Research in Dynamical and Control Systems

Vol. 9. Sp– 16 / 2017

bottom and left. To save a digital IO pin, interface keypad using only one channel ADC. The key value is read through the five stages of the voltage divider[Arunkumar. Net al]

Figure 4: Liquid Crystal Display

3.6. Buzzer Buzzer function that notifies you if unexpected events such as the theft of the safes that provide clear warnings to be anticipated[3]. The main equipment in this system is the arduino controller that acts as the controller then provides output in the form of sound via the component output is set.

Figure 5: Buzzer

3.7. Relay Relay has 3 types of poles, the COMMON, NC (Normally Close) and NO (Normally Open). COMMON is a reference pole, NC is a pole in the early kadaan connected to COMMON and NO which is a pole that was originally open and will be connected to COMMON when the relay coil by electrical currents.

Figure 6: Relay

3.8. Limit Switch Limit switches have two conditions, namely conditions Normally Close and Normally Open. Normally Close on the condition that the lever of the limit switch has not been pressed JARDCS

Special Issue On Intellectual Computation Systems

810

Journal of Advanced Research in Dynamical and Control Systems

Vol. 9. Sp– 16 / 2017

(normal), then the contact will be connected to the COMMON NC contact. Instead normally open, namely the condition lever limit switch has been pressed (normal), then the contact will be connected to the COMMON NO contact.

Figure 7: Limit Switch

3.9.IDE Arduino Arduino IDE is a cross-platform application written in Java, and is derived from the IDE (Integrated Development Environment) for the programming language Processing and Wiring project. It is designed to introduce programming to artists and other newcomers unfamiliar with software development. This includes a code editor with features like syntax highlighting, brace matching, and automatic indentation, and is also able to compile and upload the program to the board with a single click[4].

Figure 8: Software Arduino

4. DESIGN AND CONSTRUCTION In the manufacture of a tool, it needed a design. The design is used to simplify the process of making these tools. In the process of designing a tool, there are several things to be considered, for example the form of a series, the type of components to be used, the price JARDCS

Special Issue On Intellectual Computation Systems

811

Journal of Advanced Research in Dynamical and Control Systems

Vol. 9. Sp– 16 / 2017

factor components and component [Prabhakaran.p and S.Saravanan] availability in the market so that the cost of making the tool can be reduced without reducing the quality of the device is made. The first thing that needs to be done in designing an instrument is making a block diagram. The designing process is usually carried out by each circuit block which refers to the theoretical basis and adjusted as required specifications. Of each block and then made a circuit in accordance with their respective functions, in this case also conducted calculation and component selection. With good design, it is expected to be made a tool that works optimally and efficiently. In addition, the design of each block will simplify the measurement process and also to avoid trouble tracking in case of damage as well as system errors from these tools. 4.1

System Block Diagram The process of the designed system diagram box as shown below .

Figure 9: Block Diagram

4.2. Diagram Block Details -Input a.Fingerprint Fingerprint is used as one of the facility's security safes. This fingerprint is used to scan the fingerprints of people who want to open the safe. Fingerprint is detected JARDCS

Special Issue On Intellectual Computation Systems

812

Journal of Advanced Research in Dynamical and Control Systems

Vol. 9. Sp– 16 / 2017

fingerprint authenticity yng owned by people who want to open the safe. Further, the fingerprint is matched with the fingerprints contained in the database. b.Keypad The keypad is used to enter a keyword or a password to open the safe. Password consists of 6-digit number that is random. Keypad matrix used is 4x4. -Process In the process of using an Arduino UNO ATmega328 microcontroller to perform the process in accordance with the commands that have been programmed. -Output a. LCD 2x16 As a medium for displaying the status of the process that is being done microcontroller and display the current condition of locked safes, open and when there is a thief. b. Buzzer Buzzer is used to provide information to the owners safe when the safe was forced open by thieves. Buzzer will continue to sound until an unspecified time. c. Solenoid Solenoid used to lock the safe door. Solenoid requires a voltage of 12 V from the regulator IC arduino. - Communication[Arunkumar, N]. a.Usb Downloader As a converter between the computer program and the microcontroller so that the tool can perform the task in accordance with the program. 4.3. Operation 1. In the face safes installed a keypad and fingerprint, while on the inside safes laid solenoid, buzzer, limit switches, and Arduino. 2. Keypad serves as a place to enter a password. 3. Fingerprint serves as a fingerprint detector. 4. Solenoid serves to lock the safe door. 5. Buzzer serves as a marker when the safe was forced open. JARDCS

Special Issue On Intellectual Computation Systems

813

Journal of Advanced Research in Dynamical and Control Systems

Vol. 9. Sp– 16 / 2017

6. Limit switch serves to push the door open safes moment. 7. Arduino serves as the central control and device controllers. 8. Untuk open the safe, the user must enter the password in the form of numbers as many as six digits. 9. Setelah it, the user pressed the fingerprints to a fingerprint sensor. 10. Apabila correct password and fingerprint does not match, it will appear on the LCD that shows the results, solenoids are off and the door remains locked safes. 11. Apabila wrong password and fingerprint appropriate, will appear in the LCD display which shows the results, solenoids are off and the door remains locked safes. 12. Apabila wrong password and fingerprint does not match, it will appear on the LCD that shows the results, solenoids are off and the door remains locked safes. 13. Apabila correct password and fingerprint appropriate, will appear in the LCD display which shows the results, the solenoid is switched on and the doors open safes. 14. Selanjutnya if forced open the safe door without entering a password and a fingerprint scan, then the buzzer will sound within an unspecified time. 4.4.Arduino Uno Circuit

JARDCS

Special Issue On Intellectual Computation Systems

814

Journal of Advanced Research in Dynamical and Control Systems

Vol. 9. Sp– 16 / 2017

Figure 10: Arduino Uno System

4.5 Keypad

Figure 11: Keypad

Keypad can receive more voltage than 20 volts but given to the keypad amounted 12volt, so it can be used with a single power supply with the provision that the keypad is given a current of 2A. Keypad is used in this device is a 4x4 keypad. However, I only use 4 columns and 3 rows of the keypad. This is because the place is not quite in arduino. The keypad is connected to pin 2, 3, 4, 6, 7, 8 and 9 on arduino.

6. RELAY DRIVER CIRCUIT Relay is a switch that is controlled electronically[1]. This means that the relay should receive the voltage to be able to perform its function. In this device, the relay role is to control the current into the solenoid. Relay is required to adjust the position of key safes contained in the solenoid. Scheme relay driver circuit can be seen in the image below

. Figure 12: Relay Drivers

JARDCS

Special Issue On Intellectual Computation Systems

815

Journal of Advanced Research in Dynamical and Control Systems

Vol. 9. Sp– 16 / 2017

7. Buzzer Buzzer is used to provide information to users, when detected thief. In this device used is 5volt buzzer.

Figure 13: Buzzer

The buzzer will sound if dihubungakan positive to positive and negative voltage source dihubungakan to ground. 8.

LCD Circuit

LCD (Liquid Crystal Display) is formed by a special type of liquid is placed between two plates of glass. there is a background field (backplane), which is a glass plate, the back, the inside of which is covered by a transparent electrode layer[1].

Figure 14: LCD

9. Solenoid Solenoid is equipment used to convert electrical signals or electric current into mechanical motion[1]. Solenoid coil and the core is made of iron that can be driven which serves as an actuator to unlock automatically on safes.

JARDCS

Special Issue On Intellectual Computation Systems

816

Journal of Advanced Research in Dynamical and Control Systems

Vol. 9. Sp– 16 / 2017

Figure 15: Solenoid

10. Flowchart In the process sequence illustrates the security system in a safe, to use a flowchart to clarify the process flow. Below will be described a few flowchart for each process.

Figure 16: Main Flowchart

5. TESTING AND RESULT 5.1. Table of System Test

JARDCS

Special Issue On Intellectual Computation Systems

817

Journal of Advanced Research in Dynamical and Control Systems

Vol. 9. Sp– 16 / 2017

5.2. System Unit Photo

Figure 17: System Unit

6. CONCLUSIONS AND FUTURE WORKS -Conclusions 1. As a central controller and controller, Arduino able to control the security system in a safe well, where by using arduino language as a software, the system can work automatically and can work as desired. 2. It can be proved that the fingerprint and password can be used to secure a safe through well designed system. 3. The security system in this safe password periodically require replacement for the level of security safes maintained properly. JARDCS

Special Issue On Intellectual Computation Systems

818

Journal of Advanced Research in Dynamical and Control Systems

Vol. 9. Sp– 16 / 2017

4. The level of responsiveness to the fingerprint system is dependent upon the accuracy of the fingerprint in the fingerprint reading. Fingerprint is also affected by moisture finger of the user. 5. From the overall system testing tool works well and can be run in accordance with a program that has been created. -Future Works 1. Because these systems rely on password, fingerprint and buzzer, to increase the security of these systems need to add more features. 2. This system requires the management of the user better.

REFERENCES 1. Arifianto, Deni, “Kamus Komponen Elektronika”, Kawan Pustaka, 2011.Malvino, Albert Paul, “ElektronikaKomputer Digital”, edisikedua, Erlangga, 1989. 2. Arduino Board Uno,(http://arduino.cc/en/Main/arduinoBoardUno/,diaksespadatanggal 14 Mei 2014) 3. Elkablog. 2007. Buzzer. (http://elektronika.blogspot.com, diakses 17 Mei 2014) 4. Minarni. 2004. Klasifikasi Sidik Jari Dengan Pemrosesan Awal Transformasi. (http://geocities.com/transmisieeundip/minarni/pdf, diakses pada tanggal 7 Mei 2014) 5. Prabhakaran.p and S.Saravanan,” Parameter Estimation And Classification Using Gaussianmixture Model”, International Journal of Innovations in Scientific and Engineering Research (IJISER),vol2,no.4,pp73-76,2017. 6. Arunkumar, N., Venkataraman, V., Thivyashree, Lavanya ‘A moving window approximate entropy based neural network for detecting the onset of epileptic seizures’ (2013) International Journal of Applied Engineering Research, 8 (15), pp. 1841-1847. 7. Arunkumar, N., Ramkumar, K., Hema, S., Nithya, A., Prakash, P., Kirthika, V. Fuzzy Lyapunov exponent based onset detection of the epileptic seizures (2013) 2013 IEEE Conference on Information and Communication Technologies, ICT 2013, art. no. 6558185, pp. 701-706.

JARDCS

Special Issue On Intellectual Computation Systems

819