Preview

Micr

Satisfactory Essays
Open Document
Open Document
587 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Micr
o
[pic]

FACULTY OF ENGINEERING AND TECHNOLOGY

DUO ASSIGNMENT 2010

MICROPROCESSOR AND MICROCONTROLLER
ECP 2216

|NAME |NUR AFIFAH BT HARIRI |INTAN MURSYAIDAH BT AJIS |
|ID |1091104797 |1081100308 |
|EMAIL |ifaizal_88@yahoo.com |bawank_pink@yahoo.com |
|MAJOR |TELECOMMUNICATION |BIO-INSTRUMENTATION |

INTRODUCTION

In real world , security is a major concern in our day-today life. Everyone wants to be as much secure as possible. An access control for doors forms a vital link in a security chain. The microcontroller based digital lock for doors is an access control system that allows only authorized persons to access a restricted area. The system is fully controlled by the 8 bit microcontroller AT89C2051 which has a 2Kbytes of ROM for the program memory. The password is stored in the EPROM so that we can change it at any time. The system has a Keypad by which the password can be entered through it. When the entered password equals with the password stored in the memory then the relay gets on and so that the door is opened. If we entered a wrong password for more than three times then the Alarm is switched on.

An electronic lock is a locking device which operates by means of electric current pass through it. The application for residential such as front doors on apartments and single-family houses.The correct code must be entered in order for the lock to deactivate. Such locks typically provide a keypad, and some feature an audible response to each press. Combination lengths are usually between 4 and 6 digits long.

Basically, electric locks use

You May Also Find These Documents Helpful

  • Good Essays

    Rapha provides exterior lockable doors and windows, in addition to the effective automated devise or system that alerts staff…

    • 699 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By enabling password protection on all workstations and implementing a three try timeout/lockout on an un-successful entered password, you can protect your company from unauthorized users trying to gain access by password hacking.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A LAN, or local area network, is a group of computers ranging from small to large within a single office or building. Security and access control has to be robust to secure data, applications, and confidential records. Unauthorized access to the network is a massive security risk for the infrastructure. One way to reduce the risk of access is to implement access doors with key cards to only allow authorized personnel. So if there was a breach in security its only limited to select personnel.…

    • 347 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Mike

    • 1217 Words
    • 5 Pages

    For your Seminar 2 Treatment Plan Portfolio you will build on your work from last week by completing the following sections of your portfolio. Your instructor will then review and return your assignment with feedback comments to let you know where you are on track, how you have done, as well as make suggestions that may need to be incorporated in order to successfully move onto the next part of the Treatment Plan Portfolio project.…

    • 1217 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Sun Micr

    • 301 Words
    • 2 Pages

    Sun Microsystems is a leading supplier of computer related products, including servers, workstations, storage devices, and network switches. In the letter to stockholders as part of the 2001 annual report, President and CEO Scott G. McNealy offered the following remarks: Fiscal 2001 was clearly a mixed bag for Sun, the industry, and the economy as a whole. Still, we finished with revenue growth of 16 percent—and that’s significant. We believe it’s a good indication that Sun continued to pull away from the pack and gain market share. For that, we owe a debt of gratitude to our employees worldwide, who aggressively brought costs down—even as they continued to bring exciting new products to market. The statement would not appear to be telling you enough. For example, McNealy says the year was a mixed bag with revenue growth of 16 percent. But what about earnings? You can delve further by examining the income statement in Exhibit 1. Also, for additional analysis of other factors, consolidated balance sheet(s) are presented in Exhibit 2. 1. Referring to Exhibit 1, compute the annual percentage change in net income per common share-diluted (2nd numerical line from the bottom) for 1998–1999, 1999–2000, and 2000–2001. 2. Also in Exhibit 1, compute net income/net revenue (sales) for each of the four years. Begin with 1998. 3. What is the major reason for the change in the answer for question 2 between 2000 and 2001? To answer this question for each of the two years, take the ratio of the major income statement accounts (which follow Exhibit 1 on the next page) to net revenues (sales). (a) Cost of sales (b) Research and development (c) Selling, general and administrative expense (d) Provision for income tax…

    • 301 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Various authentication methods are used and range from the simple to complex. The security level provided will vary depending on the utilized technique and deployment method. The most dominant method involves authentication with a password and username. However, this is also one of the most insecure methods. We can describe these devices and systems depending on the three factors:…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Term paper

    • 1329 Words
    • 6 Pages

    A physical model and steps of building the security system will be discussed as well as its set up and mode of operation. System testing showed a quick and efficient operation of the system, where in case of smoke or fire detection, light and siren are triggered and fire department is called, and in case of break-in police is called as well as siren is triggered.…

    • 1329 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    With this system in place throughout your building, it will allow your techs to be able to monitor the air condition units, the water flow throughout the building, the fire alarm system, the lighting throughout the building and your employees will be able to have keycards that will allow them to enter into the elevators, different floors and departments and to be able to come in and out of the parking garage, and it will give them access to enter the building as well. This programming will allow you to place a time when the doors and elevator will lock down, and they will have to use their keycard to enter and operate the elevators. The system will also lock down the parking garage, and they will only need their keycard to enter the garage but to exit the garage their vehicle will send a single to the sensor and allow the doors to open up. These sensors will be able to notice body movement when someone is close to the door leaving out of the building. With this system in place, anyone that works in the building will be assigned a keycard with an identification number on it along with their picture. These keycards will allow them access in and out of the building and on the floor of the departments within the building. Clients that you may have coming into the building for meetings will need to sign for a loaner card to be able to get access to the floors of the building. The advantages of having this system within your building is that everything is wireless and that it stores a limited amount of energy that there is no hassle with cable cords, and it can work efficiently under harsh conditions, and the development is up to a large scale. The radio transmission technology optimized for harsh industrial environment and monitoring the software that is designed to match your needs and blend into your IT infrastructure and it also allows your real time monitoring…

    • 1360 Words
    • 6 Pages
    Better Essays
  • Good Essays

    All the external doors can be opened from inside the building to allow persons to exit at any time, however the doors are alarmed. This alerts staff by the use of a paging device, carried by all support staff. This enables safety and security of all persons within the building.…

    • 602 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Bananas

    • 344 Words
    • 2 Pages

    2. The data stored in locked drawers, rooms, or areas where access is controlled by a guard, cipher lock, or a card reader is a key area where cryptography is needed as access to these areas must be restricted to any unauthorized personnel. Any secured or guarded restricted area is required to have physical access control measures to allot for protection and to prevent any unauthorized access by anyone not holding the proper credentials to be in the secured area.…

    • 344 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The main door into the building has a security code lock that only staff knows. I am not in a position to give this number to anyone! This also includes the children of the school as they may tell others or adults or use it themselves. When using the code I make sure it is covered up when the possibility of others being able to see it. I then make sure that the door is securely locked behind me.…

    • 1672 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Mr Mike

    • 1205 Words
    • 5 Pages

    “ Throughout our history ,we [Americans] have been willing to trade freedom for safety during wartime”(St Luis Post Dispatch Editorial,11 October 2001).This essay will argue that a responsible government has to protect its citizens and this protection will include the use of censorship but it should not resemble an authoritarian country otherwise freedom of speech and free exercise of religion will be lost. An examination will be made about the positive aspects of censorship and why censorship is so vital to our culture,there will also be an examination about the negative impacts of censorship and how some governments try to use it to manipulate its citizens and lastly there will be emphasis to how censorship should and can be used in a democratic society.…

    • 1205 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Emr

    • 5291 Words
    • 22 Pages

    Nelson, Rosemarie. "EMR Selection and Implementation." The Patient-Centered Gastroenterology Practice. GME Series in Practice Management. Nov. 2007 <http://www.patientcenteredpractice.com/_files/pdfs/gastroenterology/id_12b.pdf>.…

    • 5291 Words
    • 22 Pages
    Powerful Essays
  • Satisfactory Essays

    Macr

    • 391 Words
    • 2 Pages

    Option 1: All cash deal financed by issuing 20-year 10% coupon bonds taxable in nature…

    • 391 Words
    • 2 Pages
    Satisfactory Essays