ch 4 revised

Upload: harrisonic-serande

Post on 03-Jun-2018

231 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/12/2019 CH 4 Revised

    1/13

    CHAPTER 4

    DATA PRESENTATION: RESULTS AND DISCUSSION

    This chapter discusses data presentation and results of the study. The

    findings are discussed based on the order of the objectives.

    Objective 1: To design and implement an access control and monitoring

    system for Mindanao University of Science and technology.

    4.1 Hardware Design

    Figure 6 shows a solenoid lock. Once the solenoid is unlocked, the three

    arm turnstile can now be rotate freely for the subject to push. The subject will

    manually push the arm to grant access through the turnstile. As the subject

    passes through the turnstile, that is the time he will be logged. This will be done

    when the limit switch is triggered.

    Figure 7 shows the two limit switches mounted inside the turnstile. These

    switches will be triggered when the arm rotates. That is the time the subject will

    be logged and his profile will be displayed in the web. The first switch will be

    triggered when the subject enters and on the other hand, the second switch will

    be triggered as the subject exits.

  • 8/12/2019 CH 4 Revised

    2/13

    38

    Figure 6 Solenoid lock

    Figure 7 Limit switch

  • 8/12/2019 CH 4 Revised

    3/13

    39

    Figure 8 Turnstile Circuit Connection

    Figure 8 shows the assembly of the specified components of three arm

    turnstile and its connection with each other. It also illustrates how the electronic

    components are mounted on the circuit board. The connection begins with the

    RFID readers data output pin (TX) when the information is received from the tag

    such as the students identification number is transmitted to RX1 pin and/or RX2

    of the microcontroller. As soon as the Arduino Mega receives a tag code, it will

    automatically forward the tag code to the server through Ethernet port using

    Arduino Ethernet Shield and an RJ45 cable. Then the server will search the

    assigned tag code in the database and if there is a match, the server will send a

    string code 1 back to the microcontroller, commanding it to unlock the turnstile.

    Initially, digital pin 8 of the Arduino Mega is connected to the base of TIP120

  • 8/12/2019 CH 4 Revised

    4/13

    40

    Transistor and pin 6 and 7 are connected to the limit switches. If the output in pin

    8 is HIGH, the transistor will turn on and activates the solenoid therefore

    unlocking the turnstile gate. If the turnstile gate rotates clockwise (entrance) the

    limit switch will be triggered and pin 6 will have a HIGH input state, this action will

    automatically logged the time-in of the subject and at the same time to lock the

    turnstile gate if the turnstile get rotates counterclockwise (exit), pin 7 will be

    triggered, this action will automatically logged the timeout of the subject. On the

    instance that the limit switch is not turn on, the turnstile gate will automatically

    lock within 15 seconds. The same process is done if the subject leaves the

    premises.

    Figure 9 shows the circuit connection of the miniature boom barrier.

    Arduino Mega Microcontroller is the brain of the circuit. The connection begins

    with the readers data output pin (TX) transmit the RFID tag code or the

    identification tag code to RX1and/or RX2 of the microcontroller. As soon as the

    Arduino Mega receives a tag code, it will automatically forward the tag code to

    the server through Ethernet port using Arduino Ethernet Shield and an RJ45

    cable. Then the server will search the assigned tag code in the database and if

    there is a match, the server will send a string code 1 back to the microcontroller,

    commanding it to raise the boom barrier. Initially, data pin 8 of the Arduino Mega

    is connected to the PWM (control) of servo motor and digital pin 6 is connected

    to the limit switch. If there is a matching tag code in the database, the

    microcontrollers pin 8 generates a pulse (pulse width modulation), this will turn

    the miniature boom barrier to rise from 0 degrees to 90 degrees or simply it

  • 8/12/2019 CH 4 Revised

    5/13

    41

    opens the barrier gate. After the car enters the gate the switch will be turn on

    manually indicating that the car already enters the gate, this will make the

    miniature boom barrier to close. In real application, the switch will be replaced by

    a car magnetic sensor. This magnetic car sensor or car sensor will send a HIGH

    voltage signal to a microcontroller if it senses the presence of a car. It will send a

    LOW voltage signal to a microcontroller indicating that the car is no longer in its

    detection range, in this instance the microcontroller can command the boom

    barrier to close. This mechanism is an anti-bumping system, preventing a boom

    barrier to hit the car. In an event that the car owner swipes the RFID tag code but

    it didnt enter the gate, the boom barrier will be closed after 15 seconds. The

    same process is done when the car leaves the premises.

    Figure 9 Miniature Circuit Connection

  • 8/12/2019 CH 4 Revised

    6/13

    42

    4.2 Software Design

    YES

    NO NO

    YES

    YES YES

    Start

    Open Monitoring screen

    LOG IN LOG OUT

    SCAN RFID TAG SCAN RFID TAG

    Is it

    registered?

    Is it

    registered?

    Is it already

    in?

    Is it already

    out?

    A B

    NO NO

  • 8/12/2019 CH 4 Revised

    7/13

    43

    Figure 10 Software Algorithm

    Figure 10 show the software algorithm used in the study. First, the subject

    will swipe the RFID tag to the RFID reader in the entrance side of the turnstile or

    boom barrier. The RFID tag code will be sent to the database to verify if it is

    registered. If it is not registered, the system will not allow access to the university.

    If it is registered, the system program will verify if the subjects last state is

    currently in. If it is already in, the turnstile or boom will not be open. If it last state

    is out, the turnstile or the boom barrier will be open. With the use of limit switches

    and sensor, the system program will determine if the subject has passed the

    A B

    Unlock turnstile or

    Open Boom Barrier

    Unlock turnstile or

    Open Boom Barrier

    Is the

    subject in?

    Is the

    subject out?

    Has 15 sec

    passed?

    Log time-in Log timeout

    Lock turnstile or

    Close boom barrier

    YES

    NO

    YES

    NO

    NO

    YES

  • 8/12/2019 CH 4 Revised

    8/13

    44

    turnstile or boom barrier gate. If the subject entered the gate, automatic logging

    of time-in is executed. If the subject didnt enter the gate after swiping the RFID

    tag, the turnstile will be lock after 15 sec. The subject will swipe the tag again if

    he/she wishes to enter again. The same process happened if the subject will

    leave the campus.

    4.3 Graphical User Interface

    The researchers used SQL 2 database which contains the list of the

    registered students and employees. The database stores all the information

    needed in this study. By using Ruby on Rails, the researchers were unable to

    design a user friendly Graphical User Interface (GUI). The GUI displays the

    monitoring screen of the current subjects entering and leaving the university.

    Figure 11 shows the Access Control and Monitoring System Main

    interface. This is also the monitoring screen. It displays the name, course if

    student, or profession if a faculty, and the time it enters or leaves the premises.

    Figure 11 Home Screen

  • 8/12/2019 CH 4 Revised

    9/13

    45

    Figure 12 shows the logs of the people who entered and left the

    University with their corresponding date and time. This will appear by clicking

    Logs button.

    Figure 13 shows the list of the people who are still inside the university

    campus.

    Figure 12 Logs

    Figure 13 Remaining People Panel

  • 8/12/2019 CH 4 Revised

    10/13

    46

    Figure 14 shows the registration panel. It enables the user to register

    students, employee or guests individually.

    Figure 14 Registration

  • 8/12/2019 CH 4 Revised

    11/13

    47

    Objective 2: To evaluate the efficiency of the of the system design in

    handling registered and unregistered ID card.

    4.4 System Test

    Efficiency on Reading Registered Tags

    Table 1:Efficiency of First RFID reader in Detecting Tags

    Test 1 2 3 4 5 6 7 8 9 10

    Ave (%)

    Detected Tags 5 5 5 5 5 5 5 5 5 5 100%

    Unlocked Solenoid 5 5 4 5 5 5 4 5 5 5 96%

    Table 2: Efficiency of Second RFID reader in Detecting Tags

    Test 1 2 3 4 5 6 7 8 9 10

    Ave (%)

    Detected Tags 5 5 5 5 5 5 5 5 5 5 100%

    Unlocked Solenoid 5 5 5 5 5 5 5 5 5 5 100%

    Table 1 and 2 shows the efficiency of the two readers in terms of detecting

    registered tags. The first table is the efficiency of the reader in the entrance and

    the second table is the efficiency of the table in the exit. The table shows the

    number of registered tags detected by reader and the number of times that the

    solenoid is unlocked.

  • 8/12/2019 CH 4 Revised

    12/13

    48

    Efficiency on Limit Switch

    Table 3: Efficiency of First Limit Switch

    Test 1 2 3 4 5 6 7 8 9 10

    Ave (%)

    Triggered 5 5 5 5 5 5 5 5 5 5 100%

    Logged In Profile 5 5 5 5 5 5 5 5 5 5 100%

    Table 4: Efficiency of Second Limit Switch

    Test 1 2 3 4 5 6 7 8 9 10

    Ave (%)

    Triggered 5 5 5 5 5 5 5 5 5 5 100%

    Logged Out Profile 5 5 5 5 5 5 5 5 5 5 100%

    Table 3 and 4 shows the efficiency of the two limit switch. The first table is

    the efficiency of the limit switch in the entrance and the second table is the

    efficiency of the limit switch in the exit. The table shows the number of times that

    the switch is triggered after pushing the arm of the turnstile upon access of the

    subject and logged the profile.

  • 8/12/2019 CH 4 Revised

    13/13

    49

    Program Efficiency

    Table 5: Response Time of the Program

    Trial Access Time(seconds) Trial Access Time(seconds)

    1 IN 1.5 6 OUT 1.6

    2 IN 1.9 7 OUT 1.8

    3 IN 2.0 8 OUT 1.8

    4 IN 2.1 9 OUT 1.7

    5 IN 1.4 10 OUT 2.0

    Average Time 1.78 Average Time 1.78

    Total Average Time 1.78 seconds

    Table 5 shows the average time of the program to open solenoid lock after

    a registered student and employee ID card is swiped. Based on the above

    results, the delay of which the system can be accessed is due to mechanical

    flaw.