SlideShare a Scribd company logo
1 of 9
Download to read offline
Knock detecting door lock.




                 Group members

                 D.G.U.I Wickramarathna 100590G

                 D.G.C.D Wijerathna     100596F

                 Y.M.S.N Wijayarathna   100597J

                 W.M.N.C Wijebandara    100598M
Abstract

The project idea was to build a knock detecting       In building knock detecting door lock we used
door lock which can identify the specific knocking    micro controllers, pattern detecting algorithms,
pattern and unlock the door if the pattern is         touch sensor circuit and password detect system.
correct. This door locking system provides much       At the first we use a Guitar Pick (microphone
security than systems which are currently using.      used in guitars) and detect the sound appears
When there are many users who use the door,           when knocking the door, but later we change it so
problems may occur because there is only one key      it detect pattern by touch sensing.
to open the door. But here in this door locking
system this kind of problems may not occur
because the users who know the knocking pattern
can open the door any time without a key.



Introduction

Background
                                                      Problem
Door lock is use in doors to lock the door, it is a
security strategy use for avoiding to open the        Key door lock is the most common door lock we
door. Only rightful person can open the door.         see in homes and many other buildings. Mostly
There are many type of door locks currently use       one key is use for one door so when many users
in the world. Key door lock is the most common        use door problems may occurs. And also
one among them. In high security systems it uses      security problems may occur if the keys can be
electronic door locks. Electronic door lock is        duplicated.If the key is lost door can’t be opened
locking device which operate with the means of        by the user and it can be found by someone else.
electricity. More often electronic door locks are     And also door opening should be very simple
connected to an access control.The advantages         and user doesn’t like to spend more time in front
of an electric lock connected to an access control    of the door opening the door. So face
system include: key control, where keys can be        recognition, eye detecting door lock also have
added and removed without re-keying the lock          some problems. Passcode door locks have
cylinder; fine access control, where time and         security problems in if someone can fetch the
place are factors; and transaction logging, where     password by looking user typing the password.
activity is recorded. Numerical codes,
passwords, passphrase, Security tokens,               Objective
biometrics, Finger prints, Face recognition etc.      We thought about the above mentioned problem
are some types of electronic locks.                   and try to find a solution and a way to improve
                                                      the security. So knock detecting door lock is the
                                                      idea we came up. Here door user can assign
                                                      specific knocking pattern to the door lock (can
                                                      be a music pattern of a song or a simple pattern)
                                                      so only the person who know the pattern and
                                                      who can knock that pattern in certain accuracy
                                                      can open the door. So only having one key
trouble may not occur with this door lock.             Research
    Because any user who use the door should know
    the knocking pattern and they can open the door        As mentioned in Introduction first we identified
    any time they want. Further development and            the need of a door locking system that reacts to
    higher security we thought about having a              knocking.
    password or face recognition. But it will take         In our research period first we studied about
    much money for the equipment so we decide
                                                           how to get sound of knocking. Getting noise free
    only to build the knock detecting part. And also       sound, how to recognize patterns using suitable
    we thought about farther development by                algorithms, connecting system with users mobile
    connecting the door lock with a mobile phone           phone via internet, Arduino Programming are
    via blue tooth. It increase the security and if user   the thing we researched in this period in purpose
    forgot the knock pattern only the specific user is     of coming up with a better solution for the
    able to connect the door lock.                         problem we identified.

                                                           Then we identified the most suitable way to
    Methods                                                reach our solution.

              march      April      May         June

              1 2 3 4 1 2 3 4 1 2 3 4 1 2 3 4

Identifyin                                                 Design
g the
Project                                                    The first design we came up with is to identify
Research                                                   correct knock by identifying sound made at the
                                                           knock. This is the design we came up to give
Making                                                     that kind of solution.
the project
Proposal
and cost
                                                            Microphone
estimation
Design
                                                                          Signal
Making                                                                   Amplifier
Prototype
Implement                                                                            Analog to
ation                                                                                 Digital
                                                                                     Converter
Testing
and Finish                                                                                         Signal
Project                                                                                          Processing
                                                                                                    Unit
Document
ation
                                                                                                              Door Lock
In this first design we used a guitar pick-             output will be send in to the door lock which
up(microphone used in guitars) (Figure 1) as the        will be opened only if the knock has accepted.
microphone. We used it because it can be
attached to wood, here to door so it only get the       There were few drawbacks of this design.
sound come along the timber without any noise.              1. The PIC we planned to use 16F877A
This microphone doesn’t accept any sound other                 has less performance than we expected.
than sound of knocking.
                                                            2. Pattern recognition algorithms are too
                                                               much complex.
                                                            3. Even though we use a Guitar
                                                               Microphone which reduces the noise,
                                                               noise still have a big impact on results.

                                                        Because of these issues we had to go to an
                                                        alternate solution to the problem.

                                                        To avoid these problems we do certain changes
                                                        in our design. We decided get pattern of the
                                                        knock by using touch sensing other than getting
                                                        sound input. This avoids problems occurred due
                                                        to noise.
             Figure 1 :Guitar pick-up
                                                        We replaced PIC with an Arduino Mega 2560
From microphone we get a current signal that is
                                                        development kit. Since it has more processing
proportional to the energy of the sound wave
                                                        power and memory, we could solve the
received by the microphone.
                                                        problems occurred due to law performance of
Then this signal is send to the signal amplifier.       PIC.

This circuit amplifies the weak signal from                        Touch-
                                                                  triggered
microphone so it can be used in processing.                         switch

Then the amplified signal is send into the                                      Signal
Analog to Digital Converter circuit. In that part                             Processing
                                                                                 Unit
analog signal is sampled at foscillator/64 rate. Then
average voltage of each sample is compared
                                                                                           Door Lock
with reference voltage and output 1 or 0 for each
sample. Then the output from ADC is a 1, 0 bit
pattern.                                                Implementation
This bit stream is send into the processing unit.       Touch triggering switch
In processing unit this bit pattern is compared
with the saved bit pattern, which is                    Touch-triggering switch is a circuit which gives
corresponding to the correct knock. If the              digital output, it returns +5V when touch is
difference between 2 bit patterns is less than pre-     present and 0V when no touch present. So the
defined percentage, the knock is accepted as            output of this part will be a digital signal
correct. Otherwise it is considered as wrong. An        depending on knock.
We identified three types of touch switches.         We identified that this type of switch is more
                                                     suitable for our device so we designed a switch
       Resistance touch switch                      using this type.
       Hum touch switch
       Capacitive touch switch                      So we used ne555 touch circuit which is a type
                                                     of Hum touch switch also have some deviation
Resistance touch switch (Figure 2) is the most       from it.
basic type of touch switch it is based on the fact
that human tissues,have a great amount of water      This circuit returns a digital signal
and salt, something that makes it conductive.        corresponding to the knock made. This signal is
                                                     send into the signal processing unit.




   Figure 2 :Resistance touch switch

This is not very flexible design and it needs two
electrodes, and not suitable for exposed to
environment very much because it can make a
conductivity between two electrodes with the
time.                                                Figure 4 : ne555 touch circuit

Hum touch switch(figure 3) is An Hum touch
sensor uses a high gain amplifier such as a
Darlington pair to amplify this parasitic voltage.
Here is a basic circuit with such a sensor:




Figure 3: Hum touch switch
Signal Processing Part




                                                     is given a priority value according to how many
                                                     saved patterns it matched with. If it is a correct
                                                     knock it is saved with its priority value. So when
                                                     number of times knocks has made is increased,
                                                     the accuracy of the algorithm will also increase.



                                                     Door lock

                                                     Electronic door locks use magnets, solenoids
Figure 4 : Circuit Schematic diagram                 and motors to actuate the lock by either
                                                     supplying or removing power. Operating the
                                                     lock can be as simple as using a switch, for
                                                     example an apartment intercom door release, or
In signal processing unit, digital signal            as complex as a biometric based access
corresponding to knock made at door is               control system.
compared with knock patterns which are saved.
                                                     In Magnetic Lock a large electro-magnet is
Signal processing is done by ATMEGA328               mounted on the door frame and a corresponding
micro controller. We used Arduino Uno circuit        armature is mounted on the door. When the
which ATMEGA328 is connected.                        magnet is powered and the door is closed, the
                                                     armature is held fast to the magnet. Mag locks
Programming
                                                     are simple to install and are very attack resistant.
Arduino board was programmed using C                 But the problem with this lock is this needs a
language.                                            large current and it cannot be supplied by a
                                                     battery. This current has to be given in main
In the program, first we save 3 sample knocks in     supply, and when there is a power cut this lock
processing unit. We have to knock 3 times while      will not work.
pressing a button, so 3 knocks will be saved.
What is saved here is the time gaps between two      In our design we used motor actuated door lock.
+5V pulses in the signal. It is a quality depends    In this door lock there is a motor which can
on the pattern of the knock. When somebody           rotate both ways. The lock is connected via a
knocks the door its pattern is compared with         lever to this motor. When motor is rotated to a
these saved patterns. If it is matched with any of   one side, door lock locks and when motor
the saved patterns it will be considered as a        rotated to other side it will unlock.
correct knock and signal is send to lock to open.
                                                     Here we used a servo motor for the door lock.
Even though in beginning there are only 3
samples, when times goes on number of samples
is increased up to 20. When door knock occur it
Bluetooth module

                                                       We used Blue tooth module in order to advance
                                                       the security of the door lock. Here a specific
                                                       person can unlock the door using his phone. This
                                                       facility can be provided as the interest of the
                                                       customer. If it is very high security door , door is
                                                       unlock when the both knock pattern is correct
                                                       and correct phone is near the door. And also it
                                                       can be provided as if the specific person forgot
                                                       the knock pattern he can unlock the door using
                                                       his phone.

                                                       Phone has a specific Bluetooth app and it sends
                                                       serial data which attach the MAC address of the
Figure 5: Servo motor
                                                       phone and receiving the data Bluetooth module
                                                       check that MAC address with saved MAC
                                                       address if both are the same door will be
Power Supply                                           unlocked.

Power is supplied to the system is by a 12V
power pack. And also here we have used a
backup power plan that will work under a power
cut using a 9V rechargeable battery.




                                                       Figure 7: Bluetooth module
                 Figure 6                              Results

                                                       Knock detecting door lock is an advance door
Here 12V supply and 9V supply has connected via 2      lock which can identify specific knock pattern
diodes. When 12V supply is present D2 will reverse     and figure out it is correct or not. If the knock
biased and no current will be taken from battery. D2   pattern is correct lock will be opened. Specific
will be forward biased only when 12V power supply      knock pattern is assigned by the user.
is unavailable and then current will be taken from
battery.                                               There is a metal plate in the door where we
                                                       should knock and only the finger should use to
                                                       knock because as earlier mentioned in the
                                                       methods when the finger touches the metal small
                                                       current is grounded through the body and it is
                                                       appears as a digital 1 voltage.
User can press and hold the assign button and       hand. If the knock is made by wood or any
knock the door in whatever pattern he likes and     insulator it won’t work properly.
it should be remembered very carefully by all
users who use the door. It is very hard to knock    Also user has to make knock on the circuit part,
in specific pattern 100% exactly twice. So we       if it is made on wrong place of the door it won’t
have to save same knock pattern 3 times. Those      recognize as a knock. There is an advantage of
are three sample patterns.. That knocking pattern   this also. Unauthorized person who is trying to
will be saved in the EEPROM. Saved pattern          open the door must know the correct place of the
will not be erased even the power is not in the     door to know with the correct knock pattern.
system. And we use the concept of learning          In the earlier design with knock detection by
algorithm. When the user knocks the door it is      sound, these problems were not present.
compare with the saved samples and calculate
the similarity percentage if it is more than 95%
user can open the door. And that knock pattern
will be saved as a sample pattern so when this
implement door lock pattern is adopt to the users
pattern changes. And these changes are not big
differences with the original samples but very
small changes which can’t be figure by ears.

Discussion

We thought about how to develop this door lock
with more features. For farther security here we
can assign more than one knock pattern so every
member who use the door has specific knock
pattern for each of them. And there may have a
main user. Each member should well remember
there knock pattern and they can open the door.
When someone opens the door automatically
SMS is sent to the main user’s mobile phone via
a GSM module informing which user opens the
door at the time. And also we can assign a
password for the user so he have to knock the
door correctly and if it is accepted SMS is sent
to particular user’s mobile phone requesting the
password , user have to give the correct
password to open the door. This will increase the
security level much high.

There are few limitations of this design too.

Touch triggered switch is working by leaking
some current through human body. So to proper
working, knock should be only made by human
Acknowledgment

First on foremost, we would like to thank Miss. Ashanthi Maxworth who guided us through doing this
project. Provided important advices, helped us in difficult periods and giving us necessary information.
And motivate us to do the project well.

And honorable thanks to Prof. (Mrs.) Indra Dayawansa for spend her valuable time forguide us to
improve the device and solving its problems. Provide important advices.

We also thank Mr. ArunaUpul Undergraduate at Department of Electronic and Telecommunication
Engineering for helping us with his knowledge to successfully finish our project.

Also an honorable mention goes to our families and friends for their understandings and supports on us in
completing this project. Without helps of the particular that mentioned above, we would face many
difficulties while doing thisAt last but not in least we would like to thank all who helped and motivated
us.



Reference

http://en.wikipedia.org/wiki/Touch_switch

http://www.arduino.cc/en/Main/ArduinoBoard
Mega2560

http://en.wikipedia.org/wiki/Servo_motor

More Related Content

What's hot

spectrum analyzers ppt
spectrum analyzers pptspectrum analyzers ppt
spectrum analyzers pptAvinash Jadhav
 
INFRARED SENSOR WORKING PRINCIPLE AND CIRCUIT
INFRARED SENSOR WORKING PRINCIPLE AND CIRCUITINFRARED SENSOR WORKING PRINCIPLE AND CIRCUIT
INFRARED SENSOR WORKING PRINCIPLE AND CIRCUITKaushal Shah
 
Traffic light controller
Traffic light controllerTraffic light controller
Traffic light controllernimmi_abes
 
Traffic light controller with verilog
Traffic light controller with verilogTraffic light controller with verilog
Traffic light controller with verilogChetan Dabral
 
Digital Electronics | Computer Science
Digital Electronics | Computer ScienceDigital Electronics | Computer Science
Digital Electronics | Computer ScienceTransweb Global Inc
 
Data acquisition & system control basic information
Data acquisition & system control basic information Data acquisition & system control basic information
Data acquisition & system control basic information patel andil
 
Automatic street light
Automatic street lightAutomatic street light
Automatic street lightAnu Antony
 
Voice Detection and Reverse Playback
Voice Detection and Reverse PlaybackVoice Detection and Reverse Playback
Voice Detection and Reverse Playbackjeevanprakash
 
Application of different types of dc generator and dc motor
Application of different types of dc generator and dc motorApplication of different types of dc generator and dc motor
Application of different types of dc generator and dc motorSmit Shah
 
discrete time signals and systems
 discrete time signals and systems  discrete time signals and systems
discrete time signals and systems Zlatan Ahmadovic
 
Density based trafiic control
Density based trafiic controlDensity based trafiic control
Density based trafiic controlnskprasad
 

What's hot (20)

spectrum analyzers ppt
spectrum analyzers pptspectrum analyzers ppt
spectrum analyzers ppt
 
Density based traffic signal system
Density based traffic signal systemDensity based traffic signal system
Density based traffic signal system
 
IOT report
IOT reportIOT report
IOT report
 
INFRARED SENSOR WORKING PRINCIPLE AND CIRCUIT
INFRARED SENSOR WORKING PRINCIPLE AND CIRCUITINFRARED SENSOR WORKING PRINCIPLE AND CIRCUIT
INFRARED SENSOR WORKING PRINCIPLE AND CIRCUIT
 
Traffic light controller
Traffic light controllerTraffic light controller
Traffic light controller
 
Alcohol detector
Alcohol detectorAlcohol detector
Alcohol detector
 
Traffic light controller with verilog
Traffic light controller with verilogTraffic light controller with verilog
Traffic light controller with verilog
 
Digital Electronics | Computer Science
Digital Electronics | Computer ScienceDigital Electronics | Computer Science
Digital Electronics | Computer Science
 
Data acquisition & system control basic information
Data acquisition & system control basic information Data acquisition & system control basic information
Data acquisition & system control basic information
 
Automatic street light
Automatic street lightAutomatic street light
Automatic street light
 
Ring counter
Ring counterRing counter
Ring counter
 
Voice Detection and Reverse Playback
Voice Detection and Reverse PlaybackVoice Detection and Reverse Playback
Voice Detection and Reverse Playback
 
Application of different types of dc generator and dc motor
Application of different types of dc generator and dc motorApplication of different types of dc generator and dc motor
Application of different types of dc generator and dc motor
 
discrete time signals and systems
 discrete time signals and systems  discrete time signals and systems
discrete time signals and systems
 
GATE TURN OFF THYRISTOR
GATE TURN OFF THYRISTORGATE TURN OFF THYRISTOR
GATE TURN OFF THYRISTOR
 
Density based trafiic control
Density based trafiic controlDensity based trafiic control
Density based trafiic control
 
Pll ppt
Pll pptPll ppt
Pll ppt
 
ppt
pptppt
ppt
 
TRIAC
TRIACTRIAC
TRIAC
 
Fm Radio jammer
Fm Radio jammerFm Radio jammer
Fm Radio jammer
 

Viewers also liked

Door knock alarm with timer
Door knock alarm with timerDoor knock alarm with timer
Door knock alarm with timerSANDEEP GHOSH
 
Presentation on knock door bell project by namit
Presentation on knock door bell project by namitPresentation on knock door bell project by namit
Presentation on knock door bell project by namitNamit Sood
 
Burglar alarm project
Burglar alarm projectBurglar alarm project
Burglar alarm projectAmar Ahir
 
Password based door locking system
Password based door locking systemPassword based door locking system
Password based door locking systemArjun Singh
 
Smart door project report shivnaresh likhar
Smart door project report shivnaresh likharSmart door project report shivnaresh likhar
Smart door project report shivnaresh likharShivnaresh Likhar
 
Password based wireless door opener security system
Password based wireless door opener security systemPassword based wireless door opener security system
Password based wireless door opener security systempragyajain53
 
Hacking your Doorbell
Hacking your DoorbellHacking your Doorbell
Hacking your DoorbellIT Weekend
 
Shiv smart door ppt
Shiv smart door pptShiv smart door ppt
Shiv smart door pptMahesh Patil
 
Income store at secret knock
Income store at secret knockIncome store at secret knock
Income store at secret knockKen Courtright
 
Smart door lock
Smart door lockSmart door lock
Smart door lockaswin5432
 
Vibration measurement
Vibration measurementVibration measurement
Vibration measurementMark Nelson
 
Smart digital door locking system
Smart digital door locking systemSmart digital door locking system
Smart digital door locking systemVISHAL NAGAR
 

Viewers also liked (20)

Door knock alarm with timer
Door knock alarm with timerDoor knock alarm with timer
Door knock alarm with timer
 
Presentation on knock door bell project by namit
Presentation on knock door bell project by namitPresentation on knock door bell project by namit
Presentation on knock door bell project by namit
 
smart door knocker
smart door knockersmart door knocker
smart door knocker
 
Burglar alarm project
Burglar alarm projectBurglar alarm project
Burglar alarm project
 
Password based door locking system
Password based door locking systemPassword based door locking system
Password based door locking system
 
Smart door project report shivnaresh likhar
Smart door project report shivnaresh likharSmart door project report shivnaresh likhar
Smart door project report shivnaresh likhar
 
Arduino_Project_Report
Arduino_Project_ReportArduino_Project_Report
Arduino_Project_Report
 
Password based wireless door opener security system
Password based wireless door opener security systemPassword based wireless door opener security system
Password based wireless door opener security system
 
Hacking your Doorbell
Hacking your DoorbellHacking your Doorbell
Hacking your Doorbell
 
Shiv smart door ppt
Shiv smart door pptShiv smart door ppt
Shiv smart door ppt
 
Income store at secret knock
Income store at secret knockIncome store at secret knock
Income store at secret knock
 
Vega kit list
Vega kit listVega kit list
Vega kit list
 
1 vibration basics0
1 vibration basics01 vibration basics0
1 vibration basics0
 
Smart door lock
Smart door lockSmart door lock
Smart door lock
 
Vibration measurement
Vibration measurementVibration measurement
Vibration measurement
 
Door bell for deaf
Door bell for deafDoor bell for deaf
Door bell for deaf
 
Smart digital door locking system
Smart digital door locking systemSmart digital door locking system
Smart digital door locking system
 
Laser security system
Laser security systemLaser security system
Laser security system
 
Password based door locksystem
Password  based door locksystemPassword  based door locksystem
Password based door locksystem
 
Security alarm
Security alarmSecurity alarm
Security alarm
 

Similar to Knock detecting door lock research paper

Knockdetectingdoorlockresearchpaper 130303064828-phpapp02
Knockdetectingdoorlockresearchpaper 130303064828-phpapp02Knockdetectingdoorlockresearchpaper 130303064828-phpapp02
Knockdetectingdoorlockresearchpaper 130303064828-phpapp02abiyoo haile
 
Voice Recognition Accelerometers
Voice Recognition AccelerometersVoice Recognition Accelerometers
Voice Recognition AccelerometersNathan Glatz
 
Smart solution for collision at doors using Arduino
Smart solution for collision at doors using ArduinoSmart solution for collision at doors using Arduino
Smart solution for collision at doors using ArduinoAmon Olimov
 
Silentsound documentation
Silentsound documentationSilentsound documentation
Silentsound documentationRaj Niranjan
 
A review of Noise Suppression Technology for Real-Time Speech Enhancement
A review of Noise Suppression Technology for Real-Time Speech EnhancementA review of Noise Suppression Technology for Real-Time Speech Enhancement
A review of Noise Suppression Technology for Real-Time Speech EnhancementIRJET Journal
 
Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxAyushJaiswal781174
 
Silent sound technology
Silent sound technologySilent sound technology
Silent sound technologyKishan Vemula
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingIJERA Editor
 
Paris Fan (Rokid): User Experience for AR glasses
Paris Fan (Rokid): User Experience for AR glassesParis Fan (Rokid): User Experience for AR glasses
Paris Fan (Rokid): User Experience for AR glassesAugmentedWorldExpo
 
Securing Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationSecuring Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationApurva Kini
 
Ambient computing at Lehigh University
Ambient computing at Lehigh UniversityAmbient computing at Lehigh University
Ambient computing at Lehigh UniversitySomesh Rahul
 
Silent sound technology NEW
Silent sound technology NEW Silent sound technology NEW
Silent sound technology NEW Neha Tyagi
 

Similar to Knock detecting door lock research paper (20)

Knockdetectingdoorlockresearchpaper 130303064828-phpapp02
Knockdetectingdoorlockresearchpaper 130303064828-phpapp02Knockdetectingdoorlockresearchpaper 130303064828-phpapp02
Knockdetectingdoorlockresearchpaper 130303064828-phpapp02
 
Silent Sound Technology
Silent Sound TechnologySilent Sound Technology
Silent Sound Technology
 
Voice Recognition Accelerometers
Voice Recognition AccelerometersVoice Recognition Accelerometers
Voice Recognition Accelerometers
 
Question 3
Question 3Question 3
Question 3
 
Question 3
Question 3Question 3
Question 3
 
Smart solution for collision at doors using Arduino
Smart solution for collision at doors using ArduinoSmart solution for collision at doors using Arduino
Smart solution for collision at doors using Arduino
 
Digital Code Lock
Digital Code LockDigital Code Lock
Digital Code Lock
 
Sketching in Code
Sketching in CodeSketching in Code
Sketching in Code
 
Silentsound documentation
Silentsound documentationSilentsound documentation
Silentsound documentation
 
Silent Sound Technology
Silent Sound TechnologySilent Sound Technology
Silent Sound Technology
 
A review of Noise Suppression Technology for Real-Time Speech Enhancement
A review of Noise Suppression Technology for Real-Time Speech EnhancementA review of Noise Suppression Technology for Real-Time Speech Enhancement
A review of Noise Suppression Technology for Real-Time Speech Enhancement
 
Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptx
 
Silent sound technology
Silent sound technologySilent sound technology
Silent sound technology
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
 
Paris Fan (Rokid): User Experience for AR glasses
Paris Fan (Rokid): User Experience for AR glassesParis Fan (Rokid): User Experience for AR glasses
Paris Fan (Rokid): User Experience for AR glasses
 
Securing Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationSecuring Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint Authentication
 
Ambient computing at Lehigh University
Ambient computing at Lehigh UniversityAmbient computing at Lehigh University
Ambient computing at Lehigh University
 
Evaluation 6
Evaluation 6 Evaluation 6
Evaluation 6
 
Silent sound technology NEW
Silent sound technology NEW Silent sound technology NEW
Silent sound technology NEW
 
nikki ppt.pptx
nikki ppt.pptxnikki ppt.pptx
nikki ppt.pptx
 

More from Chamila Wijayarathna

Why Johnny Can't Store Passwords Securely? A Usability Evaluation of Bouncyca...
Why Johnny Can't Store Passwords Securely? A Usability Evaluation of Bouncyca...Why Johnny Can't Store Passwords Securely? A Usability Evaluation of Bouncyca...
Why Johnny Can't Store Passwords Securely? A Usability Evaluation of Bouncyca...Chamila Wijayarathna
 
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...Chamila Wijayarathna
 
SinMin - Sinhala Corpus Project - Thesis
SinMin - Sinhala Corpus Project - ThesisSinMin - Sinhala Corpus Project - Thesis
SinMin - Sinhala Corpus Project - ThesisChamila Wijayarathna
 
Implementing a Corpus for Sinhala Language
Implementing a Corpus for Sinhala LanguageImplementing a Corpus for Sinhala Language
Implementing a Corpus for Sinhala LanguageChamila Wijayarathna
 
Sinmin Literature Review Presentation
Sinmin Literature Review PresentationSinmin Literature Review Presentation
Sinmin Literature Review PresentationChamila Wijayarathna
 
Xbotix 2014 Rules undergraduate category
Xbotix 2014 Rules   undergraduate categoryXbotix 2014 Rules   undergraduate category
Xbotix 2014 Rules undergraduate categoryChamila Wijayarathna
 
Higgs Boson Machine Learning Challenge Report
Higgs Boson Machine Learning Challenge ReportHiggs Boson Machine Learning Challenge Report
Higgs Boson Machine Learning Challenge ReportChamila Wijayarathna
 
Helen Keller, The Story of My Life
Helen Keller, The Story of My LifeHelen Keller, The Story of My Life
Helen Keller, The Story of My LifeChamila Wijayarathna
 
Shirsha Yaathra - Head Movement controlled Wheelchair - Research Paper
Shirsha Yaathra - Head Movement controlled Wheelchair - Research PaperShirsha Yaathra - Head Movement controlled Wheelchair - Research Paper
Shirsha Yaathra - Head Movement controlled Wheelchair - Research PaperChamila Wijayarathna
 
Products, Process Development Firms in Sri Lanka and their focus on Sustaina...
Products, Process  Development Firms in Sri Lanka and their focus on Sustaina...Products, Process  Development Firms in Sri Lanka and their focus on Sustaina...
Products, Process Development Firms in Sri Lanka and their focus on Sustaina...Chamila Wijayarathna
 

More from Chamila Wijayarathna (20)

Why Johnny Can't Store Passwords Securely? A Usability Evaluation of Bouncyca...
Why Johnny Can't Store Passwords Securely? A Usability Evaluation of Bouncyca...Why Johnny Can't Store Passwords Securely? A Usability Evaluation of Bouncyca...
Why Johnny Can't Store Passwords Securely? A Usability Evaluation of Bouncyca...
 
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
 
SinMin - Sinhala Corpus Project - Thesis
SinMin - Sinhala Corpus Project - ThesisSinMin - Sinhala Corpus Project - Thesis
SinMin - Sinhala Corpus Project - Thesis
 
GS0C - "How to Start" Guide
GS0C - "How to Start" GuideGS0C - "How to Start" Guide
GS0C - "How to Start" Guide
 
Sinmin final presentation
Sinmin final presentation Sinmin final presentation
Sinmin final presentation
 
Implementing a Corpus for Sinhala Language
Implementing a Corpus for Sinhala LanguageImplementing a Corpus for Sinhala Language
Implementing a Corpus for Sinhala Language
 
Sinmin Literature Review Presentation
Sinmin Literature Review PresentationSinmin Literature Review Presentation
Sinmin Literature Review Presentation
 
Xbotix 2014 Rules undergraduate category
Xbotix 2014 Rules   undergraduate categoryXbotix 2014 Rules   undergraduate category
Xbotix 2014 Rules undergraduate category
 
Kaggle KDD Cup Report
Kaggle KDD Cup ReportKaggle KDD Cup Report
Kaggle KDD Cup Report
 
Higgs Boson Machine Learning Challenge Report
Higgs Boson Machine Learning Challenge ReportHiggs Boson Machine Learning Challenge Report
Higgs Boson Machine Learning Challenge Report
 
Programs With Common Sense
Programs With Common SensePrograms With Common Sense
Programs With Common Sense
 
IEEE Xtreme Final results 2012
IEEE Xtreme Final results 2012IEEE Xtreme Final results 2012
IEEE Xtreme Final results 2012
 
Helen Keller, The Story of My Life
Helen Keller, The Story of My LifeHelen Keller, The Story of My Life
Helen Keller, The Story of My Life
 
Shirsha Yaathra - Head Movement controlled Wheelchair - Research Paper
Shirsha Yaathra - Head Movement controlled Wheelchair - Research PaperShirsha Yaathra - Head Movement controlled Wheelchair - Research Paper
Shirsha Yaathra - Head Movement controlled Wheelchair - Research Paper
 
Ieee xtreme 5.0 results
Ieee xtreme 5.0 resultsIeee xtreme 5.0 results
Ieee xtreme 5.0 results
 
Memory technologies
Memory technologiesMemory technologies
Memory technologies
 
History of Computer
History of ComputerHistory of Computer
History of Computer
 
Products, Process Development Firms in Sri Lanka and their focus on Sustaina...
Products, Process  Development Firms in Sri Lanka and their focus on Sustaina...Products, Process  Development Firms in Sri Lanka and their focus on Sustaina...
Products, Process Development Firms in Sri Lanka and their focus on Sustaina...
 
Path Following Robot
Path Following RobotPath Following Robot
Path Following Robot
 
Path following robot
Path following robotPath following robot
Path following robot
 

Recently uploaded

Laying the Data Foundations for Artificial Intelligence!
Laying the Data Foundations for Artificial Intelligence!Laying the Data Foundations for Artificial Intelligence!
Laying the Data Foundations for Artificial Intelligence!Memoori
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Which standard is best for your content?
Which standard is best for your content?Which standard is best for your content?
Which standard is best for your content?Rustici Software
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Deliver Latency Free Customer Experience
Deliver Latency Free Customer ExperienceDeliver Latency Free Customer Experience
Deliver Latency Free Customer ExperienceOpsTree solutions
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Dynamical Context introduction word sensibility orientation
Dynamical Context introduction word sensibility orientationDynamical Context introduction word sensibility orientation
Dynamical Context introduction word sensibility orientationBuild Intuit
 

Recently uploaded (20)

Laying the Data Foundations for Artificial Intelligence!
Laying the Data Foundations for Artificial Intelligence!Laying the Data Foundations for Artificial Intelligence!
Laying the Data Foundations for Artificial Intelligence!
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Which standard is best for your content?
Which standard is best for your content?Which standard is best for your content?
Which standard is best for your content?
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Deliver Latency Free Customer Experience
Deliver Latency Free Customer ExperienceDeliver Latency Free Customer Experience
Deliver Latency Free Customer Experience
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Dynamical Context introduction word sensibility orientation
Dynamical Context introduction word sensibility orientationDynamical Context introduction word sensibility orientation
Dynamical Context introduction word sensibility orientation
 

Knock detecting door lock research paper

  • 1. Knock detecting door lock. Group members D.G.U.I Wickramarathna 100590G D.G.C.D Wijerathna 100596F Y.M.S.N Wijayarathna 100597J W.M.N.C Wijebandara 100598M
  • 2. Abstract The project idea was to build a knock detecting In building knock detecting door lock we used door lock which can identify the specific knocking micro controllers, pattern detecting algorithms, pattern and unlock the door if the pattern is touch sensor circuit and password detect system. correct. This door locking system provides much At the first we use a Guitar Pick (microphone security than systems which are currently using. used in guitars) and detect the sound appears When there are many users who use the door, when knocking the door, but later we change it so problems may occur because there is only one key it detect pattern by touch sensing. to open the door. But here in this door locking system this kind of problems may not occur because the users who know the knocking pattern can open the door any time without a key. Introduction Background Problem Door lock is use in doors to lock the door, it is a security strategy use for avoiding to open the Key door lock is the most common door lock we door. Only rightful person can open the door. see in homes and many other buildings. Mostly There are many type of door locks currently use one key is use for one door so when many users in the world. Key door lock is the most common use door problems may occurs. And also one among them. In high security systems it uses security problems may occur if the keys can be electronic door locks. Electronic door lock is duplicated.If the key is lost door can’t be opened locking device which operate with the means of by the user and it can be found by someone else. electricity. More often electronic door locks are And also door opening should be very simple connected to an access control.The advantages and user doesn’t like to spend more time in front of an electric lock connected to an access control of the door opening the door. So face system include: key control, where keys can be recognition, eye detecting door lock also have added and removed without re-keying the lock some problems. Passcode door locks have cylinder; fine access control, where time and security problems in if someone can fetch the place are factors; and transaction logging, where password by looking user typing the password. activity is recorded. Numerical codes, passwords, passphrase, Security tokens, Objective biometrics, Finger prints, Face recognition etc. We thought about the above mentioned problem are some types of electronic locks. and try to find a solution and a way to improve the security. So knock detecting door lock is the idea we came up. Here door user can assign specific knocking pattern to the door lock (can be a music pattern of a song or a simple pattern) so only the person who know the pattern and who can knock that pattern in certain accuracy can open the door. So only having one key
  • 3. trouble may not occur with this door lock. Research Because any user who use the door should know the knocking pattern and they can open the door As mentioned in Introduction first we identified any time they want. Further development and the need of a door locking system that reacts to higher security we thought about having a knocking. password or face recognition. But it will take In our research period first we studied about much money for the equipment so we decide how to get sound of knocking. Getting noise free only to build the knock detecting part. And also sound, how to recognize patterns using suitable we thought about farther development by algorithms, connecting system with users mobile connecting the door lock with a mobile phone phone via internet, Arduino Programming are via blue tooth. It increase the security and if user the thing we researched in this period in purpose forgot the knock pattern only the specific user is of coming up with a better solution for the able to connect the door lock. problem we identified. Then we identified the most suitable way to Methods reach our solution. march April May June 1 2 3 4 1 2 3 4 1 2 3 4 1 2 3 4 Identifyin Design g the Project The first design we came up with is to identify Research correct knock by identifying sound made at the knock. This is the design we came up to give Making that kind of solution. the project Proposal and cost Microphone estimation Design Signal Making Amplifier Prototype Implement Analog to ation Digital Converter Testing and Finish Signal Project Processing Unit Document ation Door Lock
  • 4. In this first design we used a guitar pick- output will be send in to the door lock which up(microphone used in guitars) (Figure 1) as the will be opened only if the knock has accepted. microphone. We used it because it can be attached to wood, here to door so it only get the There were few drawbacks of this design. sound come along the timber without any noise. 1. The PIC we planned to use 16F877A This microphone doesn’t accept any sound other has less performance than we expected. than sound of knocking. 2. Pattern recognition algorithms are too much complex. 3. Even though we use a Guitar Microphone which reduces the noise, noise still have a big impact on results. Because of these issues we had to go to an alternate solution to the problem. To avoid these problems we do certain changes in our design. We decided get pattern of the knock by using touch sensing other than getting sound input. This avoids problems occurred due to noise. Figure 1 :Guitar pick-up We replaced PIC with an Arduino Mega 2560 From microphone we get a current signal that is development kit. Since it has more processing proportional to the energy of the sound wave power and memory, we could solve the received by the microphone. problems occurred due to law performance of Then this signal is send to the signal amplifier. PIC. This circuit amplifies the weak signal from Touch- triggered microphone so it can be used in processing. switch Then the amplified signal is send into the Signal Analog to Digital Converter circuit. In that part Processing Unit analog signal is sampled at foscillator/64 rate. Then average voltage of each sample is compared Door Lock with reference voltage and output 1 or 0 for each sample. Then the output from ADC is a 1, 0 bit pattern. Implementation This bit stream is send into the processing unit. Touch triggering switch In processing unit this bit pattern is compared with the saved bit pattern, which is Touch-triggering switch is a circuit which gives corresponding to the correct knock. If the digital output, it returns +5V when touch is difference between 2 bit patterns is less than pre- present and 0V when no touch present. So the defined percentage, the knock is accepted as output of this part will be a digital signal correct. Otherwise it is considered as wrong. An depending on knock.
  • 5. We identified three types of touch switches. We identified that this type of switch is more suitable for our device so we designed a switch  Resistance touch switch using this type.  Hum touch switch  Capacitive touch switch So we used ne555 touch circuit which is a type of Hum touch switch also have some deviation Resistance touch switch (Figure 2) is the most from it. basic type of touch switch it is based on the fact that human tissues,have a great amount of water This circuit returns a digital signal and salt, something that makes it conductive. corresponding to the knock made. This signal is send into the signal processing unit. Figure 2 :Resistance touch switch This is not very flexible design and it needs two electrodes, and not suitable for exposed to environment very much because it can make a conductivity between two electrodes with the time. Figure 4 : ne555 touch circuit Hum touch switch(figure 3) is An Hum touch sensor uses a high gain amplifier such as a Darlington pair to amplify this parasitic voltage. Here is a basic circuit with such a sensor: Figure 3: Hum touch switch
  • 6. Signal Processing Part is given a priority value according to how many saved patterns it matched with. If it is a correct knock it is saved with its priority value. So when number of times knocks has made is increased, the accuracy of the algorithm will also increase. Door lock Electronic door locks use magnets, solenoids Figure 4 : Circuit Schematic diagram and motors to actuate the lock by either supplying or removing power. Operating the lock can be as simple as using a switch, for example an apartment intercom door release, or In signal processing unit, digital signal as complex as a biometric based access corresponding to knock made at door is control system. compared with knock patterns which are saved. In Magnetic Lock a large electro-magnet is Signal processing is done by ATMEGA328 mounted on the door frame and a corresponding micro controller. We used Arduino Uno circuit armature is mounted on the door. When the which ATMEGA328 is connected. magnet is powered and the door is closed, the armature is held fast to the magnet. Mag locks Programming are simple to install and are very attack resistant. Arduino board was programmed using C But the problem with this lock is this needs a language. large current and it cannot be supplied by a battery. This current has to be given in main In the program, first we save 3 sample knocks in supply, and when there is a power cut this lock processing unit. We have to knock 3 times while will not work. pressing a button, so 3 knocks will be saved. What is saved here is the time gaps between two In our design we used motor actuated door lock. +5V pulses in the signal. It is a quality depends In this door lock there is a motor which can on the pattern of the knock. When somebody rotate both ways. The lock is connected via a knocks the door its pattern is compared with lever to this motor. When motor is rotated to a these saved patterns. If it is matched with any of one side, door lock locks and when motor the saved patterns it will be considered as a rotated to other side it will unlock. correct knock and signal is send to lock to open. Here we used a servo motor for the door lock. Even though in beginning there are only 3 samples, when times goes on number of samples is increased up to 20. When door knock occur it
  • 7. Bluetooth module We used Blue tooth module in order to advance the security of the door lock. Here a specific person can unlock the door using his phone. This facility can be provided as the interest of the customer. If it is very high security door , door is unlock when the both knock pattern is correct and correct phone is near the door. And also it can be provided as if the specific person forgot the knock pattern he can unlock the door using his phone. Phone has a specific Bluetooth app and it sends serial data which attach the MAC address of the Figure 5: Servo motor phone and receiving the data Bluetooth module check that MAC address with saved MAC address if both are the same door will be Power Supply unlocked. Power is supplied to the system is by a 12V power pack. And also here we have used a backup power plan that will work under a power cut using a 9V rechargeable battery. Figure 7: Bluetooth module Figure 6 Results Knock detecting door lock is an advance door Here 12V supply and 9V supply has connected via 2 lock which can identify specific knock pattern diodes. When 12V supply is present D2 will reverse and figure out it is correct or not. If the knock biased and no current will be taken from battery. D2 pattern is correct lock will be opened. Specific will be forward biased only when 12V power supply knock pattern is assigned by the user. is unavailable and then current will be taken from battery. There is a metal plate in the door where we should knock and only the finger should use to knock because as earlier mentioned in the methods when the finger touches the metal small current is grounded through the body and it is appears as a digital 1 voltage.
  • 8. User can press and hold the assign button and hand. If the knock is made by wood or any knock the door in whatever pattern he likes and insulator it won’t work properly. it should be remembered very carefully by all users who use the door. It is very hard to knock Also user has to make knock on the circuit part, in specific pattern 100% exactly twice. So we if it is made on wrong place of the door it won’t have to save same knock pattern 3 times. Those recognize as a knock. There is an advantage of are three sample patterns.. That knocking pattern this also. Unauthorized person who is trying to will be saved in the EEPROM. Saved pattern open the door must know the correct place of the will not be erased even the power is not in the door to know with the correct knock pattern. system. And we use the concept of learning In the earlier design with knock detection by algorithm. When the user knocks the door it is sound, these problems were not present. compare with the saved samples and calculate the similarity percentage if it is more than 95% user can open the door. And that knock pattern will be saved as a sample pattern so when this implement door lock pattern is adopt to the users pattern changes. And these changes are not big differences with the original samples but very small changes which can’t be figure by ears. Discussion We thought about how to develop this door lock with more features. For farther security here we can assign more than one knock pattern so every member who use the door has specific knock pattern for each of them. And there may have a main user. Each member should well remember there knock pattern and they can open the door. When someone opens the door automatically SMS is sent to the main user’s mobile phone via a GSM module informing which user opens the door at the time. And also we can assign a password for the user so he have to knock the door correctly and if it is accepted SMS is sent to particular user’s mobile phone requesting the password , user have to give the correct password to open the door. This will increase the security level much high. There are few limitations of this design too. Touch triggered switch is working by leaking some current through human body. So to proper working, knock should be only made by human
  • 9. Acknowledgment First on foremost, we would like to thank Miss. Ashanthi Maxworth who guided us through doing this project. Provided important advices, helped us in difficult periods and giving us necessary information. And motivate us to do the project well. And honorable thanks to Prof. (Mrs.) Indra Dayawansa for spend her valuable time forguide us to improve the device and solving its problems. Provide important advices. We also thank Mr. ArunaUpul Undergraduate at Department of Electronic and Telecommunication Engineering for helping us with his knowledge to successfully finish our project. Also an honorable mention goes to our families and friends for their understandings and supports on us in completing this project. Without helps of the particular that mentioned above, we would face many difficulties while doing thisAt last but not in least we would like to thank all who helped and motivated us. Reference http://en.wikipedia.org/wiki/Touch_switch http://www.arduino.cc/en/Main/ArduinoBoard Mega2560 http://en.wikipedia.org/wiki/Servo_motor