ch 4 revised
TRANSCRIPT
-
8/12/2019 CH 4 Revised
1/13
CHAPTER 4
DATA PRESENTATION: RESULTS AND DISCUSSION
This chapter discusses data presentation and results of the study. The
findings are discussed based on the order of the objectives.
Objective 1: To design and implement an access control and monitoring
system for Mindanao University of Science and technology.
4.1 Hardware Design
Figure 6 shows a solenoid lock. Once the solenoid is unlocked, the three
arm turnstile can now be rotate freely for the subject to push. The subject will
manually push the arm to grant access through the turnstile. As the subject
passes through the turnstile, that is the time he will be logged. This will be done
when the limit switch is triggered.
Figure 7 shows the two limit switches mounted inside the turnstile. These
switches will be triggered when the arm rotates. That is the time the subject will
be logged and his profile will be displayed in the web. The first switch will be
triggered when the subject enters and on the other hand, the second switch will
be triggered as the subject exits.
-
8/12/2019 CH 4 Revised
2/13
38
Figure 6 Solenoid lock
Figure 7 Limit switch
-
8/12/2019 CH 4 Revised
3/13
39
Figure 8 Turnstile Circuit Connection
Figure 8 shows the assembly of the specified components of three arm
turnstile and its connection with each other. It also illustrates how the electronic
components are mounted on the circuit board. The connection begins with the
RFID readers data output pin (TX) when the information is received from the tag
such as the students identification number is transmitted to RX1 pin and/or RX2
of the microcontroller. As soon as the Arduino Mega receives a tag code, it will
automatically forward the tag code to the server through Ethernet port using
Arduino Ethernet Shield and an RJ45 cable. Then the server will search the
assigned tag code in the database and if there is a match, the server will send a
string code 1 back to the microcontroller, commanding it to unlock the turnstile.
Initially, digital pin 8 of the Arduino Mega is connected to the base of TIP120
-
8/12/2019 CH 4 Revised
4/13
40
Transistor and pin 6 and 7 are connected to the limit switches. If the output in pin
8 is HIGH, the transistor will turn on and activates the solenoid therefore
unlocking the turnstile gate. If the turnstile gate rotates clockwise (entrance) the
limit switch will be triggered and pin 6 will have a HIGH input state, this action will
automatically logged the time-in of the subject and at the same time to lock the
turnstile gate if the turnstile get rotates counterclockwise (exit), pin 7 will be
triggered, this action will automatically logged the timeout of the subject. On the
instance that the limit switch is not turn on, the turnstile gate will automatically
lock within 15 seconds. The same process is done if the subject leaves the
premises.
Figure 9 shows the circuit connection of the miniature boom barrier.
Arduino Mega Microcontroller is the brain of the circuit. The connection begins
with the readers data output pin (TX) transmit the RFID tag code or the
identification tag code to RX1and/or RX2 of the microcontroller. As soon as the
Arduino Mega receives a tag code, it will automatically forward the tag code to
the server through Ethernet port using Arduino Ethernet Shield and an RJ45
cable. Then the server will search the assigned tag code in the database and if
there is a match, the server will send a string code 1 back to the microcontroller,
commanding it to raise the boom barrier. Initially, data pin 8 of the Arduino Mega
is connected to the PWM (control) of servo motor and digital pin 6 is connected
to the limit switch. If there is a matching tag code in the database, the
microcontrollers pin 8 generates a pulse (pulse width modulation), this will turn
the miniature boom barrier to rise from 0 degrees to 90 degrees or simply it
-
8/12/2019 CH 4 Revised
5/13
41
opens the barrier gate. After the car enters the gate the switch will be turn on
manually indicating that the car already enters the gate, this will make the
miniature boom barrier to close. In real application, the switch will be replaced by
a car magnetic sensor. This magnetic car sensor or car sensor will send a HIGH
voltage signal to a microcontroller if it senses the presence of a car. It will send a
LOW voltage signal to a microcontroller indicating that the car is no longer in its
detection range, in this instance the microcontroller can command the boom
barrier to close. This mechanism is an anti-bumping system, preventing a boom
barrier to hit the car. In an event that the car owner swipes the RFID tag code but
it didnt enter the gate, the boom barrier will be closed after 15 seconds. The
same process is done when the car leaves the premises.
Figure 9 Miniature Circuit Connection
-
8/12/2019 CH 4 Revised
6/13
42
4.2 Software Design
YES
NO NO
YES
YES YES
Start
Open Monitoring screen
LOG IN LOG OUT
SCAN RFID TAG SCAN RFID TAG
Is it
registered?
Is it
registered?
Is it already
in?
Is it already
out?
A B
NO NO
-
8/12/2019 CH 4 Revised
7/13
43
Figure 10 Software Algorithm
Figure 10 show the software algorithm used in the study. First, the subject
will swipe the RFID tag to the RFID reader in the entrance side of the turnstile or
boom barrier. The RFID tag code will be sent to the database to verify if it is
registered. If it is not registered, the system will not allow access to the university.
If it is registered, the system program will verify if the subjects last state is
currently in. If it is already in, the turnstile or boom will not be open. If it last state
is out, the turnstile or the boom barrier will be open. With the use of limit switches
and sensor, the system program will determine if the subject has passed the
A B
Unlock turnstile or
Open Boom Barrier
Unlock turnstile or
Open Boom Barrier
Is the
subject in?
Is the
subject out?
Has 15 sec
passed?
Log time-in Log timeout
Lock turnstile or
Close boom barrier
YES
NO
YES
NO
NO
YES
-
8/12/2019 CH 4 Revised
8/13
44
turnstile or boom barrier gate. If the subject entered the gate, automatic logging
of time-in is executed. If the subject didnt enter the gate after swiping the RFID
tag, the turnstile will be lock after 15 sec. The subject will swipe the tag again if
he/she wishes to enter again. The same process happened if the subject will
leave the campus.
4.3 Graphical User Interface
The researchers used SQL 2 database which contains the list of the
registered students and employees. The database stores all the information
needed in this study. By using Ruby on Rails, the researchers were unable to
design a user friendly Graphical User Interface (GUI). The GUI displays the
monitoring screen of the current subjects entering and leaving the university.
Figure 11 shows the Access Control and Monitoring System Main
interface. This is also the monitoring screen. It displays the name, course if
student, or profession if a faculty, and the time it enters or leaves the premises.
Figure 11 Home Screen
-
8/12/2019 CH 4 Revised
9/13
45
Figure 12 shows the logs of the people who entered and left the
University with their corresponding date and time. This will appear by clicking
Logs button.
Figure 13 shows the list of the people who are still inside the university
campus.
Figure 12 Logs
Figure 13 Remaining People Panel
-
8/12/2019 CH 4 Revised
10/13
46
Figure 14 shows the registration panel. It enables the user to register
students, employee or guests individually.
Figure 14 Registration
-
8/12/2019 CH 4 Revised
11/13
47
Objective 2: To evaluate the efficiency of the of the system design in
handling registered and unregistered ID card.
4.4 System Test
Efficiency on Reading Registered Tags
Table 1:Efficiency of First RFID reader in Detecting Tags
Test 1 2 3 4 5 6 7 8 9 10
Ave (%)
Detected Tags 5 5 5 5 5 5 5 5 5 5 100%
Unlocked Solenoid 5 5 4 5 5 5 4 5 5 5 96%
Table 2: Efficiency of Second RFID reader in Detecting Tags
Test 1 2 3 4 5 6 7 8 9 10
Ave (%)
Detected Tags 5 5 5 5 5 5 5 5 5 5 100%
Unlocked Solenoid 5 5 5 5 5 5 5 5 5 5 100%
Table 1 and 2 shows the efficiency of the two readers in terms of detecting
registered tags. The first table is the efficiency of the reader in the entrance and
the second table is the efficiency of the table in the exit. The table shows the
number of registered tags detected by reader and the number of times that the
solenoid is unlocked.
-
8/12/2019 CH 4 Revised
12/13
48
Efficiency on Limit Switch
Table 3: Efficiency of First Limit Switch
Test 1 2 3 4 5 6 7 8 9 10
Ave (%)
Triggered 5 5 5 5 5 5 5 5 5 5 100%
Logged In Profile 5 5 5 5 5 5 5 5 5 5 100%
Table 4: Efficiency of Second Limit Switch
Test 1 2 3 4 5 6 7 8 9 10
Ave (%)
Triggered 5 5 5 5 5 5 5 5 5 5 100%
Logged Out Profile 5 5 5 5 5 5 5 5 5 5 100%
Table 3 and 4 shows the efficiency of the two limit switch. The first table is
the efficiency of the limit switch in the entrance and the second table is the
efficiency of the limit switch in the exit. The table shows the number of times that
the switch is triggered after pushing the arm of the turnstile upon access of the
subject and logged the profile.
-
8/12/2019 CH 4 Revised
13/13
49
Program Efficiency
Table 5: Response Time of the Program
Trial Access Time(seconds) Trial Access Time(seconds)
1 IN 1.5 6 OUT 1.6
2 IN 1.9 7 OUT 1.8
3 IN 2.0 8 OUT 1.8
4 IN 2.1 9 OUT 1.7
5 IN 1.4 10 OUT 2.0
Average Time 1.78 Average Time 1.78
Total Average Time 1.78 seconds
Table 5 shows the average time of the program to open solenoid lock after
a registered student and employee ID card is swiped. Based on the above
results, the delay of which the system can be accessed is due to mechanical
flaw.