Uploaded by mahdisharif2k

SAMPLE REPORT 1

advertisement
PROCEEDINGS OF CAPSTONE PROJECT 2021/2022
Title : UTM Automatic Security System
AHMAD FIRDAUS BIN RUMAIZI
LOKE RUN HANG
Universiti Teknologi Malaysia
runhangloke1999@graduate.utm.my
Universiti Teknologi Malaysia
ahmadfirdausrumaizi@graduate.utm.my
NOOR FARAH ARRISYA BINTI ZUL
SAHPRI
EDDY HAKEEM BIN MOHAMAD MOIN
Universiti Teknologi Malaysia
eddyhakeem@graduate.utm.my
Universiti Teknologi Malaysia
arrisya@graduate.utm.my
aims
Abstract: This paper is to improve the security system in UTM. A model framework was
developed to assess existing conditions. According to the status quo, there are security guards
at each gate of UTM. However, our aim is to increase safety by adding some security system
in each block as according to the survey to improve safety of the staff and students. It was an
automatic security system. It combined three types of security systems which are fingerprint
scanner, RFID scanner, and password inserted. With the combination of the three type
security system, it can distinguish between residents and visitors. The result shows how the
security system functions and how it can be applied in the block of the colleges. Economic
analysis shows the cost of the components used to create the prototype.
Keywords: RFID; Fingerprint; Password; Security
1. Introduction (Project or Innovation)
reference of
this
statement?
One of the most significant barriers to the deployment of many technologies, both
commercial and network-based, is a lack of security. Furthermore, as technology and topology
change at a rapid pace, the scope of management is rapidly outstripping human capabilities.To
automate management of networks with many firewalls in dynamic environments, network
management tools are required. It is becoming increasingly important to enable network
elements to adapt to change by reconfiguring as needed without the need for human
intervention.The challenge is for these network elements to understand the proper
reconfiguration so that appropriate security policies are followed, preventing unauthorised
users from gaining access. Many new applications that aid in the investigation of these issues
have emerged over the years, owing to the significant amount of research and development
directed toward increasing work efficiency and the protection of life and property. Years ago,
in the 1960s, there was no such thing as a security camera system with privacy protection in
residential areas. However, with the recent advancement of technology in security camera
systems with privacy protection, such as Closed-circuit television (CCTV), there is a shift to a
technologically based monitoring system.Traditionally, manual security systems such as
CCTV (closed circuit television camera), alarm, security lighting, security card, security code,
and security guard were used. These manual methods are more expensive and more easily
manipulated. In the case of a security code or card, it can be forgotten, hacked, or altered by
someone else
This project is concerned with the management of network element configurations in
order to ensure that stated policies are followed. Our project is based on three main systems
which are fingerprint security system, RFID scanner and keypad to enter the password. A
fingerprint, as the name implies, is a print or impression made by our finger as a result of the
1
PROCEEDINGS OF CAPSTONE PROJECT 2021/2022
patterns formed on the skin of our palms and fingers. It is fully formed around seven months
of foetal development, and finger ridge configurations do not change throughout an
individual's life. Each of our ten fingerprints is unique, as are the fingerprints of every other
person.Even identical twins have distinct fingerprints. As a result, they are ideal for personal
identification. These marks become more visible with age, but the pattern and structures
present in those fine lines remain unchanged.For a long time, they have been used for not only
identification but also in the field of security as criminal and forensic investigation due to
their permanence and unique nature. Every fingerprint has ridges and furrows, with the ridges
being thick lines and the furrows being the space between two ridges. However, we cannot
distinguish the fingerprints of two people based on ridges and furrows because there are some
similarities between the fingerprints of different people.We will show an example of this
wireless fingerprint-based security system in a residential college to prevent an unauthorised
person from entering because an unauthorised person can easily enter by manipulating the
security guard or any other manual security system. A person can enter the residential college
by scanning their finger on the fingerprint sensor module at the main entry point. If their
fingerprints matched those in the database created for residential college authorised
individuals, they will be allowed to enter; otherwise, they will be denied.
RFID application and standardisation are increasing, but because the technology is still
relatively new, many aspects of it are not well understood. RFID technology advancements
continue to produce larger memory capacities, wider reading ranges, and faster processing.
Though RFID technology is superior to bar code, it is highly unlikely that it will eventually
replace barcode, even with the inevitable reduction in raw materials coupled with economies
of scale because the integrated circuit in an RF tag will never be as cheap as a barcode
label.We can appreciate the nature and potential of radio frequency identification by
extending the benefits of wireless communications to data communication to and from
portable low-cost data carriers (RFID). RFID is an area of automatic identification that is now
being viewed as a radical means of improving data handling processes, complementing other
data capture technologies such as bar coding in many ways. RFID tags are contactless cards,
also known as Proximity Integrated Circuit Cards (PICC). Tags can be powered either
actively or passively. Active tags have an on-board power source, such as a battery, whereas
passive tags must be powered inductively by an RF signal from the reader.The distance from
which a reader can interrogate tags is limited by the tag's power. As a result, active tags can be
read from further away than passive tags. In the absence of a reader, active tags may also
record sensor readings or perform calculations. Passive tags are inactive unless they are in the
presence of a reader. RFID readers, also known as Proximity Coupling Devices (PCDs) read
data from RFID tags at a specific frequency using RFID antennas. The reader is essentially an
electronic device that generates and accepts radio signals. Depending on the capacity of the
tag, the antennas contain an attached reader, which translates the tag's radio signals through
the antenna. Anti-collision schemes are built into the readers, and a single reader can operate
on multiple frequencies.
Enter a password using the keypad, also our main system in this project. Keypads are
one of the most common security lock systems used to grant or deny access to a building or
property. The majority of lock keypads are numeric. They require users to enter the correct
combinations in order to gain access.When the entered password is correct, the door is
opened, allowing a concerned person to gain access to a secure location. After a certain
number of times, the door would close. If another person enters an incorrect password, the
door will not open, denying the person access.
Introduction is too long. Facts about RFID,
fingerprint and passwords should be moved to
technical content and add figures
2
PROCEEDINGS OF CAPSTONE PROJECT 2021/2022
2. Objectives
Everything that we want to do in our life always has an objective behind it. The
same goes to Engineering. In the Engineering field, every project that is planned to be
completed requires a specific objective that needs to be achieved. Without an objective, it will
cause disturbance towards the process of completing the project. As for our Capstone Project,
we have been given a theme for our project which is Automatic Security System. In order to
easily complete our project, we did a survey to know very well our user’s needs regarding
security systems. From the survey, we are able to identify our team’s objective which is :
● To build a product fulfilling the end users’ needs
However, the objective that we identified for our project is not clear enough to define our
project. Regarding to this issue, we are able to discuss and identify another objective that
supports to our main objective which is :
● To apply three types of the combination of the security system
including RFID scanner, Fingerprint scanner and Display with Keypad.
3. Survey Analysis
The survey is done through the google form. There are 13 questionnaires.
1. There are 32 responses in the survey
Figure 3.1 The number of respondents.
2. What is your age?
About 21 respondents are 22 years old and 1 respondent is 24 years old.
3. Where usually see the security guard?
Almost 90.6% of respondents saw the security guard in the residential area.
3
PROCEEDINGS OF CAPSTONE PROJECT 2021/2022
Figure 3.2 The percentage of respondents meet security guards.
4.
In your opinion, can the security system guarantee your safety?
50% of respondents are unsure while 34.4% of respondents think it can ensure their
safety.
5. Can Automatic Security System replace the security guard in Malaysia?
25% of respondents feel that it cannot replace the security guard while 37.5% of
respondents think that it can or maybe can replace the security guard.
6. In your opinion, what is the problem faced by the Automatic Security System?
About 81.3% of respondents agree that the cost of an automatic security system is
expensive such as hardware and it’s maintenance.
7. In your opinion, is the security guard in UTM able to ensure your safety?
About half of the respondents, 53.1%, agree that the security system in UTM cannot
ensure their safety.
Figure 3.3 The percentage of the respondents
8. In your opinion, can an Automatic Security System be used in UTM?
More than half of the respondents, 78.1% think that Automatic Security System can be
used in UTM while 12.5% think that Automatic Security System cannot be used in
UTM.
4
PROCEEDINGS OF CAPSTONE PROJECT 2021/2022
9. In your opinion, where is the best place to put an Automatic Security System in UTM?
More than half of the respondents, 84.4%, choose Residential College.
Figure 3.4 The percentage of choosing place
10. Why did you choose this place?
This question is based on the previous question and the reason given by 87.5% of
respondents is the place has many staff and students.
11. What are the problems faced by this place?
In this question, the reason given by the respondents, about 71.9%, is the place has too
many cars and strangers.
12. Can you give suggestions on how to improve the security system in that place?
All the respondents had given out their suggestions. We get the ideas from these
suggestions.
13. In your opinion, can an Automatic Security System solve the problem in this place?
About 56.3% of the respondents think that with the Automatic Security System, the
problems will be solved.
Figure 3.5 The percentage of the respondents
5
PROCEEDINGS OF CAPSTONE PROJECT 2021/2022
4. Design statement
The problem that we can concluded are:
I.
Not safe with the current security system.
II.
Automatic Security System put in college residential area.
III.
There are too many cars and strangers in the college residential area.
Hence, with the problems concluded, the idea of the project came out such as below.
Figure 4.1 Design of the project
The idea came from the suggestions given by the respondents. As the current security
system cannot ensure safety as there are many strangers around the residential area, hence we
come out with the security door where visitors cannot enter the block at will.
Our idea is to create a security system at the door of the block. It has a door with sign in
and sign out. At first, at the sign in part, there are two types which are for visitors and
residents.
At first, our idea for visitors is to use the technology of QR code and password while the
residents need to use a card to scan the RFID scanner to go into the block. The QR code is for
filling in the details of the visitors. With the QR code, we can ensure the identity of the
visitors.
After the suggestions of the panel during the prototype, there has been a little bit of
change of the idea. With the technology of fingerprint, the residents can walk into the building
by just scanning their finger with the fingerprint scanner. For the visitor, they need to scan the
QR code to fill in the details. After that, the card for the RFID scanner will be given by the
office. They also need to enter the password which will be given after they fill in the detail
form.
5. Methodology
In the research paper “Smart Door Lock Using Fingerprint Sensor” (2019), it used two
Atmega328p as a microcontroller. This is because each Atmega328p has 28 pins. In this
research paper, they are making a fingerprint scanner. The fingerprint scanner is connected
with the door latch. If the fingerprint is matched with the database saved, it will unlock or
lock the door. If the fingerprint is wrong, the buzzer will beep and show “Try again” in the
LCD display. They also have an additional system which is when the fingerprint is wrong 5
6
PROCEEDINGS OF CAPSTONE PROJECT 2021/2022
times, the alarm will ring and show “Panic Mode” on the LCD screen. From this research
paper, we get the idea of the fingerprint scanner. We set the fingerprint scanner to unlock the
door. However, in the project, we are not using the Atmega328p, while we used Arduino Uno
as a microcontroller. We also set the buzzer ring when the wrong fingerprint is scanned.
In a research paper, “A Digital Security System with Door Lock System Using RFID
Technology” (2010) which was done by Gyanendra, he used the RFID technology as a door
lock. In his research, a new user is first registered with the system and the corresponding
information is burned in an RFID tag. This RFID tag will be accessible through the system.
When a registered user comes to the entry point, he will put the tag into the reader. The
system will check whether it is a registered user or imposter. If the user is registered, then the
tab information is matched with the user information stored in the system. The door is open to
entry of the user after successful authentication. The check-in information is also stored in the
database with date and time. A log is also generated by the system according to check-in
information. From this research paper, we get an idea of RFID systems. We are connecting the
RFID system with the QR code and password. In our project, at first, the visitor will scan the
RFID with the card. After the system checking, the LCD display will show “Enter Password”.
When the wrong card is scanned, the buzzer will sound. In this project, we also connect the
RFID system with the Arduino Uno.
In the poster created by Urvashi.P, Fatema.R, Samir.G (2019), the title is”Password
Based Door Lock System Using Arduino”, it has explained about the working steps of the
password. They also used Arduino Uno as a microcontroller. The inputs are keyboard, power
supply, and LCD display. The output is a servo motor. They also show the diagram of the
connection. From this poster, we get some ideas on the connection of the components. First,
we verify the connection of the components. Then, we tried to do some coding and also
modified some connections. This is because, in this poster, their input is just typing the
password. However, in our project, we need to connect the RFID connection with the
password connection.
Finally, we come out with the final flow chart. the flow charts of sign in and sign out as
below.
Figure 5.1 Flow Chart for Entering
7
PROCEEDINGS OF CAPSTONE PROJECT 2021/2022
Figure 5.2 Flow Chart for Exiting
6. Product Development
In Engineering, projects that require engineers to construct a product is a common
routine. Most of the products or devices that people used were made by the engineers
such as residential houses, vehicles and electronic devices. The journey in constructing
the final product or outcome requires a lot of planning and idea generation in order to
finish it according to the timeline required. Without all of these, it will make the final
product become less functional and cause a lot of problems to occur. The same goes to
our Capstone project. Before we started with our project, discussion has been made
between us for ideas on how the project will look in the end. A lot of ideas were
generated from each of us related to the project such as the usage of solar panels as the
power supply and many more. Even though there were a lot of ideas being discussed,
we were able to agree on one idea that was voiced out by one of us in which to
implement two separate Automatic Security Systems to our product where it will be
used by two different categories of group of people which are students or residents and
also visitors. As for the concept of the idea, we planned to implement the security
system onto a residential block in UTM due to the safety issue voiced out by the UTM.
Residents of a specific residential block will be implemented with a Fingerprint scanner
where each student needs to register their respective fingerprint into the security system
for the residential part. After that, the system will keep the memory of the resident’s
fingerprint into the Arduino’s memory so that every time the resident of that specific
block wants to enter their block, they just need to scan their registered fingerprint on the
Fingerprint scanner to open up the door of their blocks. It is indicated by two different
LEDs where the green one means the password is correct and the door will be
automatically opened and if you type the wrong password, the red LED will light up as
an indicator that you typed the wrong password. Different concepts are applied for the
visitor’s. For the visitors, they are required to scan the given QR code where it will lead
them to a form where they need to fill up the required details needed by the form. After
that, they will be given a combination of passwords to be typed in. Next is that they
need to scan the RFID card on the RFID scanner and then they need to type in the
password given to them. As for the indicator, the same concept applies to this about the
8
PROCEEDINGS OF CAPSTONE PROJECT 2021/2022
Red and Green LED as an indicator. From this concept development, the process of
product development for our Capstone project has been agreed between us to proceed.
For the product development, we started the construction of our product by
combining the small components such as Arduino Uno, LEDs and scanners. As for the
visitor’s part, a form was created with a generated QR code to be put on the visitor’s
section where it requires visitor’s details in it. For the RFID scanner, all of the pins on
the scanner were connected directly to an Arduino Uno and 2 LEDs through a
breadboard. For the Display and Keypad, the pins of the Keypad were connected to an
Arduino Uno and from the Arduino Uno it connects to the Display and 2 LEDs from the
output through a breadboard. When moving on to the resident’s section, the Fingerprint
scanner was connected to an Arduino Uno and the output of it was connected to the
LEDs through a breadboard. As for the people from the inside who want to get out of
the block, another simple system is introduced where a Push Button was soldered with
wires on both pins and then it was connected to an Arduino Uno. After that, the output
pin was connected to a Buzzer through a breadboard. The concept of it was that when
someone wants to go out of the block, the button will be pressed and the buzzer will
produce a sound as an indicator that the door will be opened. After the components
combined, the construction of the block model proceeded. For the model of the block,
the idea behind it is that the block will be divided into 2 parts which is the resident’s
security system and also visitor’s security system. For the walls and the doors, we used
woods that were cut into few parts to form the shape of the wall and doors. In order to
combine them together, hot glue guns were used to combine them together on another
board beneath it as a support to the model.
Figure 6.1 Final Design of Project
In order to make sure that our product works properly and smoothly, the functions
of the components are required to be known to ease the process of understanding the
interface of each component related to another component. As for the main processing
unit of our project which is Arduino Uno, each part of the Arduino has its own specific
function.
9
PROCEEDINGS OF CAPSTONE PROJECT 2021/2022
Figure 6.2 Arduino Uno R3
Referring to Figure 6.2, it's important to go through each part’s function such as
the microcontroller part where it uses ATmega328P microcontroller in which functions
as a command of electronic devices that have a connection to the Arduino. Other than
that, the USB port also is important for the Arduino because it acts as a communicator
between the Arduino Uno and a computer through the link of the USB port with a USB
cable. From this link, it is easier for the user to write the wanted coding or program on
the computer and control it by serial communication and the Arduino Uno can be
powered up when it is joined to a computer. As for the Power Jack, it can be joined to
an AC adapter in order to power up the Arduino Uno because without power the coding
inside the Arduino cannot be interpreted. Next is the Reset button where it functions as
restart of the program when the Arduino starts to output the result that is not the same as
what we expected. After that, the main part of the Arduino Uno R3 which is the pins or
digital input and output. For this part, it will be more understandable if it is explained in
the form of a table as in Figure 6.3 until Figure 6.6.
Table 6.3 Digital I/O - PWM
Table 6.4 Analog Input
10
PROCEEDINGS OF CAPSTONE PROJECT 2021/2022
Table 6.5 Communication
Table 6.6 Power
Another important component that was being used in our project is the Radio
Frequency Identification (RFID). In order to understand the function of the RFID, it's
important to know what RFID actually is. RFID can be defined as a transmission in
connecting a transmitter (tag) and a receiver (reader) where it is used for touchless
communication, identification and localisation of things. From the definition, it will be
easier for us to have a better understanding about the functionality of the RFID starting
from the transmitter. As for the transmitter in general, it functions to transmit the
required signal to be detected by the reader. Next is for the reader where it functions to
receive the transmitted signal by the transmitter in which it must be in a close range
between the transmitter and the reader. Other than that, our project has also included a
Fingerprint scanner as a part of the security system. As for the structure of the
11
PROCEEDINGS OF CAPSTONE PROJECT 2021/2022
Fingerprint scanner, it is built up with optical scanners and a light sensory system. If a
finger is placed on the glass plate, the optical scanner will capture the picture of the
thumb print where then it will brighten the ridges of the user’s fingertip and generate a
reverse image of the picture in order to drag attention on the valleys. After that, the
optical scanner will make a decision depending on the definition and pixel darkness of
the image captured and compare it with the image data that has been stored inside the
file of the scanner.
Figure 6.7 : RFID RC552
Figure 6.8 : Fingerprint Scanner
In order for us to have access to these components, the School of Electrical
Engineering has sponsored our Capstone project for a total of RM300.00. From the budget
that we obtained, we were able to buy components that is required for our project whether it is
for the hardware part or even the software part such as wood, LEDs, Display, Keypad,
Fingerprint scanner, RFID RC552, breadboard and also Arduino Uno R3. Even though the
budget given was quite huge, we still need to keep on track regarding the cash flow of our
project in order to avoid shortage of budget. In detail, we managed to buy 1 unit of Arduino
Uno R3, 1 unit of Keypad, 1 unit of Relay Module, 1 unit of RFID, 4 units of LED (small
units), 2 units of Buzzer, 1 unit of Fingerprint scanner and 1 unit of Display where it costs
RM48.00, RM 8.00, RM 4.50, RM 12.75, RM 0.40, RM 2.50, RM 58.00 and RM 9.45
respectively. Other than that, we also managed to buy 1 unit of Push Button, 3 packets of
wire, 1 unit of an I2C converter, 10 units of resistor, 3 units of breadboard, 1 unit board, 1 unit
of an adapter and 2 units of LED (big units) where it costs RM 3.00, RM 9.30, RM 5.50, RM
0.50, RM 54.00, RM 11.60, RM 14.15 and RM 3.60 respectively. When summing up all of
the costs that we used, a total of RM 245.35 was obtained for the usage of our Capstone from
the total budget which is RM 300.00 with a balance only around RM 54.65. From the total
costs that we used, we were able to deliver a Capstone project which suits the theme for our
group (P2G12) and that is Automated Security System.
This paragraph change to
table form
12
PROCEEDINGS OF CAPSTONE PROJECT 2021/2022
Table 6.9 : Overall budget
7. Problem
Every individual in this world has their own life journey that they need to face
whether it is easy or tough. While we are facing or going through that journey, we will
face a lot of difficulties along the way or another we call it a problem, same goes to
Engineering. Problems can be defined as an unwelcome matter or that needs to be
overcome. In Engineering, we will be facing a lot of technical problems especially when
it comes to projects such as our Capstone project. For our Capstone project, we were
assigned to create a model that has security features because the theme that we have to
follow is regarding the Automatic Security System. During our Capstone project, a lot
of problems that we had to face and overcome in order to successfully achieve our
targeted objective. The problems that we faced can be divided into 2 categories of
problems which are hardware and software problems. As for the hardware part, there
are a lot of problems that we encounter which includes the Arduino Mega that we used
was very buggy and unusable. We identified this problem when after we run the coding
that we wrote many times it still doesn’t produce any output as expected. However, we
were able to solve this problem by replacing the Arduino Mega with 2 Arduino Unos
but the problem doesn’t stop there. We also encounter another problem which is the
RFID is very buggy where it sometimes functions properly and sometimes it doesn’t.
Regardless of how long it took to diagnose the problem, there seems to be no result to
solve this problem. This is due to the RFID having a connection problem which took a
while to diagnose. However after de-soldered and re-soldering the pins, the RFID
connection issues were finally solved but more issues were yet to come. The Push
Button we used is somehow not suitable for the project. In order to overcome it, we
were required to use a different type of push button where the push button that we
needed to use is the 4 legs push button.
Figure 7.1 Sample of Fingerprint
13
PROCEEDINGS OF CAPSTONE PROJECT 2021/2022
In addition, our fingerprint scanner is also encountering problems in terms of its
limitations in which we are needed to always wipe the scanner regularly in order to ease the
next user to use. Somehow it disturbs the process of the project. However, we were able to fix
it by making sure every user's thumb is properly cleaned before using the scanner. The
problems that we encountered didn't stop until here. It continued as we were going through
our Capstone project journey. Another major problem that we faced during the completion of
our project is related to the LCD Display. For the LCD Display, after we soldered it with an
I2C converter, we ran into a few problems with it such as only the backlight lights up while
no data or word is displayed. Nevertheless, we managed to find a solution to it where we
needed to desolder and resolder again the pins of the LCD Display.
Figure 7.2 Sample of Hardware LCD Display
Other than that, there was a lack of power supply for all the components that we used
where it caused the components to not function properly because the Arduino that we
used requires power in order to make the other components work properly such as
fingerprint scanner and RFID scanner. Every problem will have its own solution which
is the same goes to this case where we were able to encounter the problem we faced by
supplying the components with an external power supply that supplies around 12V and
2A such as power bank.
In every engineering project, software is the most crucial part that has to be focused
on especially when it involves electronic components that require specific coding to
function properly. Software problems are the problems that will somehow delay the
process of any project that involves a software interface the same goes to our Capstone
project. In our project, we used a Fingerprint scanner as a part of the Automatic security
system. As for the coding of the scanner, searching for the correct code was tough and
quite a hassle since there are a lot of models for fingerprint scanners. Moreover,
implementing it for a test run has led to the complication of the project. However, after a
lot of trials we were able to implement the correct code and make sure it can work
properly. Another problem that we faced involves the coding of the RFID scanner. In
order to successfully run the RFID code, solving the problems related with the
connection issues was the solution to the RFID. Even though we managed to solve this
problem, the RFID code was still a challenge for us because somehow it didn't work as
intended even though we followed the basic examples given by the library. Despite all
of the trials that we did, the problem was finally fixed and the coding was able to run the
RFID successfully. Unfortunately, due to some reasons the RFID suddenly didn't work
at all even while we tried with a newly bought RFID scanner. The original issue that we
detected was it is not compatible with an OEM type of Arduino UNO and it is only
compatible to be used with a Genuine Arduino UNO. In the beginning, we thought that
14
PROCEEDINGS OF CAPSTONE PROJECT 2021/2022
replacing the Arduino with a more compatible Arduino Uno would somehow solve our
problem, however after a few tries, it gives the same result where it didn't work like the
others. As a conclusion to this problem, there was no solution for this problem. Library
issues were also a part of the problems detected, the need to find and use the correct
library is needed in order for the component to run. Last but not least, the major problem
that we faced for the software part was to combine all the coding of each specific
component in order for them to be able to work together swiftly without any problem or
defect to the whole process of the project. It was quite a challenge at first due to the
difference in coding requirements for each component, however we managed to
combine it all after doing some research on how to combine the codings together. In
addition to that, this part took the longest time to construct as each change needed to be
carefully tested and run because if any problem was detected, diagnoses are required for
the problem using trial and error and run where it took at least 2 weeks to solve this
issue.
8. Discussion
Efforts to develop more sophisticated automatic security systems are our main
priority. Since our first meeting, we propose developing and demonstrating methods to
automate security in UTM by making security configuration management dynamic and
responsive.The long-term goal of this project is to develop a practical infrastructure that
allows the network to become self-configuring, so that necessary network-wide
reconfiguration is initiated by changes within the system itself, rather than by
coordinated actions of teams of human operators. To allow us to achieve tangible results
in a reasonable amount of time, the current project focuses on some specific issues that
we believe are critical to the overall plan's success and for which there is a clear path to
generalisation. The specific problem we consider is all about the prototype working
properly: how do we quickly determine the problem and how to solve it before the
demo video for the presentation in front of our panels, and how do we provide a backup
plan as management aid to correctly manage change in the face of ever-increasing
complexity? We have our lecturer as our supervisor on our team who are guiding the
development toward a prototype that is both immediately usable by system
administrators and also serves as a solid foundation for future work.Our top priority has
been to close the "gap" between our main goals and the actual implementation of this
prototype. The lack of verifiable enforcement mechanisms for certain security
phenomena influenced many of our design decisions. A budget issue is an example of
this. Because we have a budget of no more than RM300, we are not permitted to use
many expensive components, which means that we are unable to use many functional
components for our project.
What we can and cannot control in this project must be considered in any practical
approach to prototype design. We must avoid assuming that our components have
complete control over our prototype. While many configurations may satisfy policy, not
all of these configurations may be implementable, even in an automated fashion. In
cases where the available control is insufficient to implement the given security policy,
we would like to know this as well, which is beyond the scope of most current
approaches. As part of our main goals, we intend to capture all aspects of our project
that are beyond the control of the prototype. This allows us to smoothly blend what we
can control with what we can't. Our strategy is to gradually expand the platform in each
of its major components. In the security policy space, we will discuss how we can use
our security system to get closer to UTM's higher-level security needs. In this project,
we intend to continue to improve the functionality of our prototype, and we conducted
extensive research in order to test some novel ideas. This project's long-term goal is to
15
PROCEEDINGS OF CAPSTONE PROJECT 2021/2022
create a security system from any crime issues so that the security management
infrastructure can be distributed. When the prototype is finished at the end of this
project's lifespan, we hope that the concept of our prototype can be generated in every
location, allowing us to create a safe environment free of unwanted incidents.
9. Conclusion
As a conclusion to our journey throughout this Capstone project, many new
things that we gained as a team including teamwork. When doing the Capstone project,
it is important to know that teamwork is the key success to any projects especially
involving Engineering projects because without it will be difficult for the project to be
finished according to the given time frame. Other than that, we also gain new
experiences in handling Engineering projects which includes on how to code the
Arduino, idea generation and also task management such as reports and minutes of
meeting. In addition to that, we managed to make new friends and connections not only
with other people but also among ourselves. We managed to get to know each other
better as a team which became the main strength of our team to pass through this
Capstone project journey.
From the perspective of the project itself, we started off our Capstone with
idea generation among all of us in the team referring to the theme that was given to us
which is Automated Security System. We created a google form survey focusing on the
UTM students where we include in it some questions regarding the security system in
UTM such as what is the safety level of security in UTM and many more. From the
survey that we conducted, we managed to extract the data collected and obtained the
required information that we need and also some suggestions of improvement towards
the security system of UTM. From the data that we obtained, almost 53.1% of the UTM
students agree that the available security guards in UTM cannot ensure their safety in
UTM. From that data, we held a discussion to think of ideas on how to improve the
security system in UTM. After a long discussion, we managed and agreed to make an
Automated Security System in which it includes systems such as Fingerprint scan,
RFID scan and also password-typed.
From the idea generated, we improvise it to make it even more safer where
we separated it into two different systems which are Residents and also Visitors.
Starting from this, we started to construct our project by completing each part separately
which started with the software part and followed by the hardware part. We bought all
the required equipment such as Fingerprint scanner, Display, Keypad, RFID scanner and
many other small components such LED and resistor by using the budget given by the
faculty itself. After that, our team’s main programmer Eddy Hakeem starts off by
writing the required coding for the main components of the project. After several trials,
we managed to code the components according to the idea that we wanted to construct.
Next is that we started off with the next step which is constructing the actual prototype
of our planning.
The actual prototype was constructed by using plain wood and a hot glue gun.
The components were put in place according to the structure planned. After some
cutting and building processes, we managed to complete our actual prototype exactly
the same as what we planned and also within the given time frame where we finished
the construction of the prototype before Week 14.
Please update this conclusion by
stating whether your product
operates as intended with a
reference to the pictures of
finished product.
16
PROCEEDINGS OF CAPSTONE PROJECT 2021/2022
10. Acknowledgement
First and foremost, we would like to thank Dr Zulkarnain for giving us this
opportunity to do this project which the theme is Automated Security System. From this
project, we learned that the security system is important and maybe someday, the
automatic security system will replace the security guard.
Second, we would like to thank our supervisor, Dr. Zuraimy. Dr Zuraimy had
given us a lot of knowledge on what an automated security system is and also given us
some ideas on how to do this project.
Last but not least, we would like to thank our parents and friends who give us
support so that we can finalise this project within the limited time frame.
Appendix for the block diagram and coding is
expected in this report. Please add
17
PROCEEDINGS OF CAPSTONE PROJECT 2021/2022
11. Reference
1. Piash. P, Md Abdullah, Hazrat.S, Md Kaviul (2019). “Smart Door Lock Using
Fingerprint Sensor”
2. Gyanendra. K (2010). “A Digital Security System With Door Lock System Using
RFID Technology”
3. Urvashi.P, Fatema.R, Samir.G (2019). ”Password Based Door Lock System Using
Arduino”
4. “Arduino Uno R3 Specifications/Functions”
https://spiceman.net/arduino-uno/
5. “Fingerprint Scanners: What They Are and How They Work”
https://www.tomsguide.com/us/fingerprint-scanners,news-17678.html
6. Jonas Scherf & M.A. Frauke Finus (2019). “What is RFID? - Definition &
Function in detail”
https://www.etmm-online.com/what-is-rfid--definition-function-in-detail-a-82463
2/
18
Download