Preview

Automated Gate Barrier using RFID

Good Essays
Open Document
Open Document
753 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Automated Gate Barrier using RFID
Chapter 1
INTRODUCTION

Background of the Study
Technology is a quite broad term. It encompasses the entire human- made world. It refers specifically to the knowledge, processes and products of technological activity.
Computers are one of the most common sources of technology use to secure and monitor the in and out of the vehicles inside the subdivision.
Security is always an important issue to be taken care in any organization especially to a place like Subdivision. There are many people entering this premise and proper security system will ensure that this place is safe for everybody. Good security system will reduce unnecessary incidents such as theft, intruders and etc and due to this automatic identification is necessary. Automatic identification is the broad term given to a host of technologies that used machines to identify objects such as smart cards, voice recognition, optical recognition and RFID tags.
A proposed Automated Subdivision Barrier for Mulawin Heights using RFID with Road Mapping is a system that facilitates the security to ease their work using a RFID as an automated release of barrier. This system will also detect the vehicles that pass thru the subdivision.
The Mulawin Heights Subdivision is a residential subdivision developed on March 1999, situated at Brgy Tugatog Orani, Bataan. It is divided in two phase (phase 1 and 2). As of this time, Mulawin heights Subdivision use a manual security system, the guards logged the vehicles and people that pass thru, using a logbook and release the barrier manually thus, it takes time and effort for the guard on duty to open and close the barrier manually.
This proposed system aimed to develop a wireless system to detect the in and out of vehicles. The system was based on Radio Frequency Identification (RFID) technology and consists of a RFID tag. It detects the tag ID and if the tag ID is stored in database then the barrier will up and allow the vehicles to pass thru the subdivision.

You May Also Find These Documents Helpful

  • Better Essays

    Nt1310 Unit 1 Assignment 1

    • 7711 Words
    • 31 Pages

    The system stores all the necessary information about the user. A new user is first registered to the system and the corresponding information is burned in the RFID tag. This RFID tag will then be accessible through the system. When a registered user comes to the entry point and puts his/her tag into the reader, the system checks whether he/she is a registered user or an imposter. If the user is registered, then the tab information is matched with the user information stored in system. The door is opened after the successful authentication and is closed automatically after a specific time interval. The check-in information is also stored in the database with the corresponding date and time. A log is also generated by the system according to the check-in information. Finally, this check-in information is stored in a central server along with the basic information of the…

    • 7711 Words
    • 31 Pages
    Better Essays
  • Powerful Essays

    Term paper

    • 1329 Words
    • 6 Pages

    A physical model and steps of building the security system will be discussed as well as its set up and mode of operation. System testing showed a quick and efficient operation of the system, where in case of smoke or fire detection, light and siren are triggered and fire department is called, and in case of break-in police is called as well as siren is triggered.…

    • 1329 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    With this system in place throughout your building, it will allow your techs to be able to monitor the air condition units, the water flow throughout the building, the fire alarm system, the lighting throughout the building and your employees will be able to have keycards that will allow them to enter into the elevators, different floors and departments and to be able to come in and out of the parking garage, and it will give them access to enter the building as well. This programming will allow you to place a time when the doors and elevator will lock down, and they will have to use their keycard to enter and operate the elevators. The system will also lock down the parking garage, and they will only need their keycard to enter the garage but to exit the garage their vehicle will send a single to the sensor and allow the doors to open up. These sensors will be able to notice body movement when someone is close to the door leaving out of the building. With this system in place, anyone that works in the building will be assigned a keycard with an identification number on it along with their picture. These keycards will allow them access in and out of the building and on the floor of the departments within the building. Clients that you may have coming into the building for meetings will need to sign for a loaner card to be able to get access to the floors of the building. The advantages of having this system within your building is that everything is wireless and that it stores a limited amount of energy that there is no hassle with cable cords, and it can work efficiently under harsh conditions, and the development is up to a large scale. The radio transmission technology optimized for harsh industrial environment and monitoring the software that is designed to match your needs and blend into your IT infrastructure and it also allows your real time monitoring…

    • 1360 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Physical perimeter boundaries is a clear delineation between public property and restricted locations is often required to isolated project areas. The use of fences, wire entanglements, concrete bollards, beams, signs and cleared land ( for observation purposes) ensures that private property is clearly identified and access by all but the most determined intruder is prevented or deterred. This method will avoid the accidental intrusion and provides a psychological barrier against intrusion (Deutsch).…

    • 1927 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Retinal Image Analysis

    • 3516 Words
    • 15 Pages

    Our project presents a new design for an anti-theft protection System as an inexpensive solution to protect cars from theft and from non-authorized users.…

    • 3516 Words
    • 15 Pages
    Powerful Essays
  • Best Essays

    2 Axios Systems. (2007, March) Return on Investment: Fact or Fairy Tale? White Paper. Version 1.1.0…

    • 3560 Words
    • 15 Pages
    Best Essays
  • Best Essays

    Due to recent university campus violence it has become necessary for the before mention organization to develop an access control systems (ACS) to ensure student safety. As a member the security team I‘m the project manager for the ACS. This essay will look at the five phases and applicable subsets in the building of the ACS for resident facilities. The five phases that this essay will be addressing: Planning or identification of the scope of the project, Analysis- also known as whom, what, where and when, Design- also known as step by step, Implementation-installation and finally, Maintenance-monitoring of the system. The current system of cameras the photograph those who are entering and leaving the dorm will be integrated into the new ACS. A Gantt chart and diagram will accompany this essay.…

    • 1213 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    During the previous century and well into the twenty first century (dubbed the "Knowledge Era"), technology has evolved to the point where it is now synonymous to numerous terminologies. Technology can be termed as Objects similar to tools, machines, instruments, weapons; as Knowledge similar to technological know-how and innovation; as Activities similar to skills, methods, procedures; as a Process which begins with a need and ends with a solution and finally as a Socio-technical System which occurs through the manufacture and use of objects involving people and other objects in combination.…

    • 7925 Words
    • 32 Pages
    Powerful Essays
  • Better Essays

    Physical Security - Essay

    • 1334 Words
    • 4 Pages

    In the United States everyone is concerned about safety in their homes and in his or her workplace. Individuals go to great lengths to ensure that all their possessions that they own could not be stolen from them. According to the 1999 FBI Uniform Crime Reports, nationwide 408,217 robberies were committed with the estimated amount of losses being reported at $508 million in losses. Many measures can be put in place to prevent such losses. This paper will discuss physical security and other components such as building security, grounds security, access control systems, perimeter security, information systems, and technology security.…

    • 1334 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Suppose a company's security manager would like to have a system that precisely tells at every moment where the cars of the company are: in the garage or out on roads. The key issue of this task is that the registration of the movement of the vehicles should be done automatically by the system, otherwise it would require manpower.…

    • 1361 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    The proposed study entitled “Parking Monitoring System Using Swipe Machine” will mechanize the recent Parking dilemma of SM Pampanga by providing an automated system that will help supervise the Parking Area. Using the Swipe Card technology, it will solve several problems encountered in a parking area of a mall. The proposed study will be able to provide an automated parking monitoring system that will organize numbered slots and will easily be implemented.…

    • 5710 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    The aim of this project is to design and build a prototype of an automated parking system which will show the number of parking spaces left inside the parking lot. It will have a pre installed number of maximum cars that can be parked. An infra red sensor will count the entry and exit of each car and open the barricade for the entry and exit. The entry and exit system can how ever be chosen. A display on the monitor outside the parking lot will show how many cars can still be parking inside the parking lot. In this project, 9 parking spaces have been alloted with only one entry/exit door. The control is done using Arduino Board at 15 Mhz.…

    • 1068 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    However, individual monitoring of resources is possible by combining the RFID technology with GPS. Passive RFID tags consume less power and can prolong tracking time. Devices which combine Smartphone technology with satellite or GPS system are also available. In short, construction supervisors and site managers can easily track all the goods which are loaded onto a vehicle or entrusted to a driver.…

    • 779 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Journal Review Rfid

    • 2295 Words
    • 10 Pages

    The journal review is done based on a working paper done by researchers from Dogus University, Turkish Atomic Energy Authority Cekmece Nuclear Research and Training Center and Turkey Telekom; all from Istanbul, Turkey. The authors involved in this journal are Yeliz Ekincia, Ulker Ekincib and Ulas Guinaydine. The title of this article is “The Application of UHF Passive RLID Technology for the Effectiveness of Retail/Consumer Goods Supply Chain Management”. The journal consists of 6 pages contents including the references. This journal obtained via the Intel Library which was downloaded on February 25, 2010 at 07:54:12 EST from IEEE Xplore.…

    • 2295 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Receipt System

    • 2156 Words
    • 9 Pages

    * 5.[26 35] rfid security using mini des algorithm in deployment of bike renting s…86 viewsLike…

    • 2156 Words
    • 9 Pages
    Good Essays