SlideShare a Scribd company logo
A PRESENTATION ON


         ACCESS CONTROL
            SYSTEM
PREPARED BY:
Mody Devansh D. (06-ECG-03)
Kukadia Pritesh M. (06-ECG-22)

GROUP NO:8

INTERNAL GUIDE:
Mr. J.N. PATEL


                                        1/15
LIST OF CONTENTS
   Introduction of Project

   Block Diagram

   Circuit Diagram

   Component Details

   Working of circuit

   Flow chart

   Software details
                                    2/15
INTRODUCTION OF PROJECT
Now a days, a problem of security is very much important everywhere
  in the world. So, in large firms or companies, to make protect of
entering of unauthorized person or to secure their important section,
they generally use this type of security.

This project, AN ACCESS CONTROL SYSTEM provides a facility of
security. This type of security lock is generally attached at the main
entrance door of the firms. By using this type of security, only
authorized fellow can enter.

 It is quite easy in installation and use. Through this, one can allocate
more number of passwords to many fellows. It is easy to use as the
fellow don’t need to carry any type of id card or chip etc.


                                                                   3/15
BLOCK DIAGRAM AND DESCRIPTION



ELECTRICAL    LOAD
  LOADS      DRIVER




                              KEYPAD
                      8051



 ALARM       ALARM
             DRIVER



                                   4/15
     First of all a user enters a password by a hex
keypad.


 Micro controller checks password and then gives
according output.


   If the password is correct then it opens the door.


 If the password is wrong then it gives output to
the alarm.
                                                 5/15
CIRCUIT DIAGRAM AND DESCRIPTION


  LCD




                            6/15
 When the power supply is switched on, then the
whole circuit starts working.

 Then in LCD, the name of company is displayed
and the person is asked to enter the password.

The password is entered through a hex keypad.

The microcontroller compares that password with
the already saved database of employee's
information.

                                                 7/15
If it matches with any of the saved password, then
microcontroller gives output to the LCD.

Then in LCD, the name of employee, his
department, his employee number, etc are displayed.

Parallel, the microcontroller gives output to the DC
motor to open the door.

If the password doesn’t match with any password
three times, then microcontroller displays in LCD that
your password is wrong, and it gives output to the
buzzer.
                                                 8/15
COMPONENT DETAILS
SR                       NAME          SR                       NAME
NO.                                    NO.
1     MICRO CONTROLLER (AT89S52)       16    ON/OFF SWITCH

2     16×2 LCD                         17    LED
3     HEX KEYPAD                       18    PRESET(4k7)
4     MICROCONTROLLER COMPATIBLE PCB   19    1000uF/25V CAPACITOR
5     DC MOTOR                         20    0.1uF CAPACITOR
6     DC 2NO-NC RELAY(12V)             21    10uF CAPACITOR
7     DC RELAY(5V)                     22    33pF CAPACITOR
8     7805 IC                          23    5V BUZZER
9     BUG STRIP                        24    10Ω RESISTER
10    RESISTER ARRAY                   25    1KΩ RESISTER
11    CRYSTAL OSSCILATOR               26    10KΩ RESISTER
12    BRIDGE RECTIFIER                 27    CONNECTING WIRES
13    40 PIN CONNECTOR                 28    DC SOCKET
14    HEAT SINK                        29    SMALL GPB
15    10 PIN CONNECTOR CABLE
                                                                       9/15
MAIN PCB




           10/15
WHY HEX KEYPAD?
A general 3×2 matrix
keypad contains only
0-9 keys.

Whereas a hex keypad
contains 0-9 keys and also it
contains A,B,C,D,E,F keys.

So it provides more
number of combination of
Passwords to the firms.


                                11/15
POWER SUPPLY SECTION




A supply is given from 230v AC through a 12v adepter.

Then it is given to the bridge rectifier. The output of
rectifier is given to voltage regulator IC through filter
capacitors.                                        12/15
SOFTWARE DETAILS
KEIL µ VISION 3.0.3.
KEIL SOFTWARE IS USED TO PROVIDE YOU WITH SOFTWARE
DEVELOPMENT TOOLS FOR 8051 BASED MC. WITH THE KEIL TOOLS YOU
CAN GENERATE EMBEDDED APP FOR VIRTUALLY EVERY 8051
DERIVATIVE.




                                                       13/15
START


   READ
  KEYPAD




   CHECK
 PASSWORD
                 SWITCH ON
                   DEVICE



CHECK IF WRONG
PASSWORD WAS
 ENTERED THREE
     TIMES

                 SWITCH OFF
 SWITCH ON         ALARM
  ALARM

                              14/15
THANK YOU


            15/15

More Related Content

What's hot

FINAL CORRECT Report
FINAL CORRECT ReportFINAL CORRECT Report
FINAL CORRECT Report
RK Saini
 
IoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking SystemIoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking System
rahulmonikasharma
 
Bi directional visitor counter rewat
Bi directional visitor counter   rewatBi directional visitor counter   rewat
Bi directional visitor counter rewat
vishwesh sharma
 
T 000118--digital ic-tester
T 000118--digital ic-testerT 000118--digital ic-tester
T 000118--digital ic-tester
RohanRonak
 
Human presence detection based room light controller using pir2.pptx [repaired]
Human presence detection based room light controller using pir2.pptx [repaired]Human presence detection based room light controller using pir2.pptx [repaired]
Human presence detection based room light controller using pir2.pptx [repaired]
nikhilsinghia
 
RFID with INTERNET OF THINGS
RFID with INTERNET OF THINGSRFID with INTERNET OF THINGS
RFID with INTERNET OF THINGS
Bino Mathew Varghese
 
Passive infrared based human detection alive robot
Passive infrared based human detection alive robotPassive infrared based human detection alive robot
Passive infrared based human detection alive robot
Sidharth Mohapatra
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
Vishnupriya T H
 
Password based door locking system
Password based door locking systemPassword based door locking system
Password based door locking system
Arjun Singh
 
ATMEGA 328
ATMEGA 328ATMEGA 328
ATMEGA 328
ABHISHEK MAURYA
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptx
Pratik Gohel
 
Microcontroller based digital code lock report 2
Microcontroller based digital code lock report 2Microcontroller based digital code lock report 2
Microcontroller based digital code lock report 2
Lachamo Best
 
Radar Using Arduino
Radar Using ArduinoRadar Using Arduino
Radar Using Arduino
Golu Jain
 
Automatic Room Lights Controller Using Arduino & PIR Sensor
Automatic Room Lights Controller Using Arduino & PIR SensorAutomatic Room Lights Controller Using Arduino & PIR Sensor
Automatic Room Lights Controller Using Arduino & PIR Sensor
Ankit Chaudhary
 
Social io t-sito s-iot
Social io t-sito s-iotSocial io t-sito s-iot
Social io t-sito s-iot
Luigi Atzori
 
Electronic Notice Board Using Raspberry Pi and Android Phone
Electronic Notice Board Using Raspberry Pi and Android PhoneElectronic Notice Board Using Raspberry Pi and Android Phone
Electronic Notice Board Using Raspberry Pi and Android Phone
Brijender k
 
Rfid based access control system using microcontroller
Rfid based access control system using microcontrollerRfid based access control system using microcontroller
Rfid based access control system using microcontroller
rajkanakaraj007
 
Ffr seminar presentation
Ffr seminar presentationFfr seminar presentation
Ffr seminar presentation
Sumit Pandit
 
Mechanism of PIR sensor
Mechanism of PIR sensorMechanism of PIR sensor
Mechanism of PIR sensor
ShobhanSaha1
 
Iot projects 2021-2022
Iot projects 2021-2022Iot projects 2021-2022
Iot projects 2021-2022
MSR PROJECTS
 

What's hot (20)

FINAL CORRECT Report
FINAL CORRECT ReportFINAL CORRECT Report
FINAL CORRECT Report
 
IoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking SystemIoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking System
 
Bi directional visitor counter rewat
Bi directional visitor counter   rewatBi directional visitor counter   rewat
Bi directional visitor counter rewat
 
T 000118--digital ic-tester
T 000118--digital ic-testerT 000118--digital ic-tester
T 000118--digital ic-tester
 
Human presence detection based room light controller using pir2.pptx [repaired]
Human presence detection based room light controller using pir2.pptx [repaired]Human presence detection based room light controller using pir2.pptx [repaired]
Human presence detection based room light controller using pir2.pptx [repaired]
 
RFID with INTERNET OF THINGS
RFID with INTERNET OF THINGSRFID with INTERNET OF THINGS
RFID with INTERNET OF THINGS
 
Passive infrared based human detection alive robot
Passive infrared based human detection alive robotPassive infrared based human detection alive robot
Passive infrared based human detection alive robot
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
Password based door locking system
Password based door locking systemPassword based door locking system
Password based door locking system
 
ATMEGA 328
ATMEGA 328ATMEGA 328
ATMEGA 328
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptx
 
Microcontroller based digital code lock report 2
Microcontroller based digital code lock report 2Microcontroller based digital code lock report 2
Microcontroller based digital code lock report 2
 
Radar Using Arduino
Radar Using ArduinoRadar Using Arduino
Radar Using Arduino
 
Automatic Room Lights Controller Using Arduino & PIR Sensor
Automatic Room Lights Controller Using Arduino & PIR SensorAutomatic Room Lights Controller Using Arduino & PIR Sensor
Automatic Room Lights Controller Using Arduino & PIR Sensor
 
Social io t-sito s-iot
Social io t-sito s-iotSocial io t-sito s-iot
Social io t-sito s-iot
 
Electronic Notice Board Using Raspberry Pi and Android Phone
Electronic Notice Board Using Raspberry Pi and Android PhoneElectronic Notice Board Using Raspberry Pi and Android Phone
Electronic Notice Board Using Raspberry Pi and Android Phone
 
Rfid based access control system using microcontroller
Rfid based access control system using microcontrollerRfid based access control system using microcontroller
Rfid based access control system using microcontroller
 
Ffr seminar presentation
Ffr seminar presentationFfr seminar presentation
Ffr seminar presentation
 
Mechanism of PIR sensor
Mechanism of PIR sensorMechanism of PIR sensor
Mechanism of PIR sensor
 
Iot projects 2021-2022
Iot projects 2021-2022Iot projects 2021-2022
Iot projects 2021-2022
 

Viewers also liked

Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
Wajahat Rajab
 
Access control presentation
Access control presentationAccess control presentation
Access control presentation
Saqib Raza
 
Access Control: Principles and Practice
Access Control: Principles and PracticeAccess Control: Principles and Practice
Access Control: Principles and Practice
Nabeel Yoosuf
 
Access control security solutions
Access control security solutionsAccess control security solutions
Access control security solutions
Nick Rykhoff
 
VIRDI AC5000
VIRDI AC5000VIRDI AC5000
Access Control Strategies In Controlled Environments - presentation
Access Control Strategies In Controlled Environments - presentationAccess Control Strategies In Controlled Environments - presentation
Access Control Strategies In Controlled Environments - presentation
Joseph Dagama CPO, FSO, CAS
 
Media evaluation Crowd Control WDF
Media evaluation Crowd Control WDFMedia evaluation Crowd Control WDF
Media evaluation Crowd Control WDF
weicoams
 
Crowd management system
Crowd management systemCrowd management system
Crowd management system
Mumbaikar Le
 
Keypad Interfaced ZigBee Based Security System
Keypad Interfaced ZigBee Based Security SystemKeypad Interfaced ZigBee Based Security System
Keypad Interfaced ZigBee Based Security System
Ebadullah A
 
Surveillance Detection Certificate
Surveillance Detection CertificateSurveillance Detection Certificate
Surveillance Detection Certificate
Justin Bondietti, PPS, ATO
 
Crowd Crontol Training Manual
Crowd Crontol Training Manual Crowd Crontol Training Manual
Crowd Crontol Training Manual
Mukesh Dhankhar
 
Management plan for crowd control
Management plan for crowd controlManagement plan for crowd control
Management plan for crowd control
amritaghosh90
 
Crowd management
Crowd managementCrowd management
Crowd management
Miguel Diaz Medina
 
INTELLIGENT ROOM LIGHTING ON PERSON PRESENCE
INTELLIGENT ROOM LIGHTING ON PERSON PRESENCEINTELLIGENT ROOM LIGHTING ON PERSON PRESENCE
INTELLIGENT ROOM LIGHTING ON PERSON PRESENCE
Satish Kumar
 
Smart lighting solutions with motion sensors occupancy sensors pir sensors
Smart lighting solutions with motion sensors occupancy sensors pir sensorsSmart lighting solutions with motion sensors occupancy sensors pir sensors
Smart lighting solutions with motion sensors occupancy sensors pir sensors
Pammvi Group of Companies
 
Intelligent lighting ppt
Intelligent lighting pptIntelligent lighting ppt
Intelligent lighting ppt
Amrata Yadav
 
Intelligent Building Management Systems
Intelligent Building Management SystemsIntelligent Building Management Systems
Intelligent Building Management Systems
Khaled Ali
 
Crowd Management
Crowd ManagementCrowd Management
Crowd Management
Pat Cabangis
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
Alfred Ouyang
 
Automatic Light Control using LDR and PIR Sensor
Automatic Light Control using LDR and PIR SensorAutomatic Light Control using LDR and PIR Sensor
Automatic Light Control using LDR and PIR Sensor
Ziauddin Ridoy
 

Viewers also liked (20)

Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Access control presentation
Access control presentationAccess control presentation
Access control presentation
 
Access Control: Principles and Practice
Access Control: Principles and PracticeAccess Control: Principles and Practice
Access Control: Principles and Practice
 
Access control security solutions
Access control security solutionsAccess control security solutions
Access control security solutions
 
VIRDI AC5000
VIRDI AC5000VIRDI AC5000
VIRDI AC5000
 
Access Control Strategies In Controlled Environments - presentation
Access Control Strategies In Controlled Environments - presentationAccess Control Strategies In Controlled Environments - presentation
Access Control Strategies In Controlled Environments - presentation
 
Media evaluation Crowd Control WDF
Media evaluation Crowd Control WDFMedia evaluation Crowd Control WDF
Media evaluation Crowd Control WDF
 
Crowd management system
Crowd management systemCrowd management system
Crowd management system
 
Keypad Interfaced ZigBee Based Security System
Keypad Interfaced ZigBee Based Security SystemKeypad Interfaced ZigBee Based Security System
Keypad Interfaced ZigBee Based Security System
 
Surveillance Detection Certificate
Surveillance Detection CertificateSurveillance Detection Certificate
Surveillance Detection Certificate
 
Crowd Crontol Training Manual
Crowd Crontol Training Manual Crowd Crontol Training Manual
Crowd Crontol Training Manual
 
Management plan for crowd control
Management plan for crowd controlManagement plan for crowd control
Management plan for crowd control
 
Crowd management
Crowd managementCrowd management
Crowd management
 
INTELLIGENT ROOM LIGHTING ON PERSON PRESENCE
INTELLIGENT ROOM LIGHTING ON PERSON PRESENCEINTELLIGENT ROOM LIGHTING ON PERSON PRESENCE
INTELLIGENT ROOM LIGHTING ON PERSON PRESENCE
 
Smart lighting solutions with motion sensors occupancy sensors pir sensors
Smart lighting solutions with motion sensors occupancy sensors pir sensorsSmart lighting solutions with motion sensors occupancy sensors pir sensors
Smart lighting solutions with motion sensors occupancy sensors pir sensors
 
Intelligent lighting ppt
Intelligent lighting pptIntelligent lighting ppt
Intelligent lighting ppt
 
Intelligent Building Management Systems
Intelligent Building Management SystemsIntelligent Building Management Systems
Intelligent Building Management Systems
 
Crowd Management
Crowd ManagementCrowd Management
Crowd Management
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
Automatic Light Control using LDR and PIR Sensor
Automatic Light Control using LDR and PIR SensorAutomatic Light Control using LDR and PIR Sensor
Automatic Light Control using LDR and PIR Sensor
 

Similar to Presentation acs-03

Electronic code lock device
Electronic code lock deviceElectronic code lock device
Electronic code lock device
Amitoj Kaur
 
summer training report (2)
summer training report (2)summer training report (2)
summer training report (2)
Kavya Gupta
 
microcontroller and embedded system
microcontroller and embedded systemmicrocontroller and embedded system
microcontroller and embedded system
pradeep rana
 
Touchpad Monitored Car
Touchpad Monitored CarTouchpad Monitored Car
Touchpad Monitored Car
IOSR Journals
 
Touchpad Monitored Car
Touchpad Monitored Car Touchpad Monitored Car
Touchpad Monitored Car
IOSR Journals
 
Eye blink sensing
Eye blink sensingEye blink sensing
Eye blink sensing
Archana Rallapalli
 
Report (Electromagnetic Password Door Lock System)
Report (Electromagnetic Password Door Lock System)Report (Electromagnetic Password Door Lock System)
Report (Electromagnetic Password Door Lock System)
Siang Wei Lee
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
Susmit Sircar
 
IRJET- Static Analysis of the Roll Cage of All-Terrain Vehicle
IRJET- Static Analysis of the Roll Cage of All-Terrain VehicleIRJET- Static Analysis of the Roll Cage of All-Terrain Vehicle
IRJET- Static Analysis of the Roll Cage of All-Terrain Vehicle
IRJET Journal
 
Report on Embedded Based Home security system
Report on Embedded Based Home security systemReport on Embedded Based Home security system
Report on Embedded Based Home security system
NIT srinagar
 
Micro Controller 8051 of Speedo Meter using KEIL Code
Micro Controller 8051 of Speedo Meter using KEIL CodeMicro Controller 8051 of Speedo Meter using KEIL Code
Micro Controller 8051 of Speedo Meter using KEIL Code
Sunil Kumar R
 
Programmable Load Shedding for the utility department
Programmable Load Shedding for the utility departmentProgrammable Load Shedding for the utility department
Programmable Load Shedding for the utility department
Mukund Hundekar
 
Presentation1 modified
Presentation1 modifiedPresentation1 modified
Presentation1 modified
mangleshwar prajapat Monu.Brans
 
password based door locking system using 8051
password based door locking system using 8051password based door locking system using 8051
password based door locking system using 8051
Mangleshwar Prajapati
 
Keypad locking system using 8051
Keypad locking system using 8051Keypad locking system using 8051
Keypad locking system using 8051
manu anand
 
Cspass
CspassCspass
AUTOMATIC WIRELESS POWER GRID CONTROL
AUTOMATIC WIRELESS POWER GRID CONTROLAUTOMATIC WIRELESS POWER GRID CONTROL
AUTOMATIC WIRELESS POWER GRID CONTROL
shiv kapil
 
Microcontroladores: Interfaz del microcontrolador 8051 con LCD usando el simu...
Microcontroladores: Interfaz del microcontrolador 8051 con LCD usando el simu...Microcontroladores: Interfaz del microcontrolador 8051 con LCD usando el simu...
Microcontroladores: Interfaz del microcontrolador 8051 con LCD usando el simu...
SANTIAGO PABLO ALBERTO
 
Minor_project.ppt.pdf
Minor_project.ppt.pdfMinor_project.ppt.pdf
Minor_project.ppt.pdf
Uttamsharma576508
 
3.81 inch OLED 1080X1200 MIPI
3.81 inch OLED 1080X1200 MIPI3.81 inch OLED 1080X1200 MIPI
3.81 inch OLED 1080X1200 MIPI
Panox Display
 

Similar to Presentation acs-03 (20)

Electronic code lock device
Electronic code lock deviceElectronic code lock device
Electronic code lock device
 
summer training report (2)
summer training report (2)summer training report (2)
summer training report (2)
 
microcontroller and embedded system
microcontroller and embedded systemmicrocontroller and embedded system
microcontroller and embedded system
 
Touchpad Monitored Car
Touchpad Monitored CarTouchpad Monitored Car
Touchpad Monitored Car
 
Touchpad Monitored Car
Touchpad Monitored Car Touchpad Monitored Car
Touchpad Monitored Car
 
Eye blink sensing
Eye blink sensingEye blink sensing
Eye blink sensing
 
Report (Electromagnetic Password Door Lock System)
Report (Electromagnetic Password Door Lock System)Report (Electromagnetic Password Door Lock System)
Report (Electromagnetic Password Door Lock System)
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
IRJET- Static Analysis of the Roll Cage of All-Terrain Vehicle
IRJET- Static Analysis of the Roll Cage of All-Terrain VehicleIRJET- Static Analysis of the Roll Cage of All-Terrain Vehicle
IRJET- Static Analysis of the Roll Cage of All-Terrain Vehicle
 
Report on Embedded Based Home security system
Report on Embedded Based Home security systemReport on Embedded Based Home security system
Report on Embedded Based Home security system
 
Micro Controller 8051 of Speedo Meter using KEIL Code
Micro Controller 8051 of Speedo Meter using KEIL CodeMicro Controller 8051 of Speedo Meter using KEIL Code
Micro Controller 8051 of Speedo Meter using KEIL Code
 
Programmable Load Shedding for the utility department
Programmable Load Shedding for the utility departmentProgrammable Load Shedding for the utility department
Programmable Load Shedding for the utility department
 
Presentation1 modified
Presentation1 modifiedPresentation1 modified
Presentation1 modified
 
password based door locking system using 8051
password based door locking system using 8051password based door locking system using 8051
password based door locking system using 8051
 
Keypad locking system using 8051
Keypad locking system using 8051Keypad locking system using 8051
Keypad locking system using 8051
 
Cspass
CspassCspass
Cspass
 
AUTOMATIC WIRELESS POWER GRID CONTROL
AUTOMATIC WIRELESS POWER GRID CONTROLAUTOMATIC WIRELESS POWER GRID CONTROL
AUTOMATIC WIRELESS POWER GRID CONTROL
 
Microcontroladores: Interfaz del microcontrolador 8051 con LCD usando el simu...
Microcontroladores: Interfaz del microcontrolador 8051 con LCD usando el simu...Microcontroladores: Interfaz del microcontrolador 8051 con LCD usando el simu...
Microcontroladores: Interfaz del microcontrolador 8051 con LCD usando el simu...
 
Minor_project.ppt.pdf
Minor_project.ppt.pdfMinor_project.ppt.pdf
Minor_project.ppt.pdf
 
3.81 inch OLED 1080X1200 MIPI
3.81 inch OLED 1080X1200 MIPI3.81 inch OLED 1080X1200 MIPI
3.81 inch OLED 1080X1200 MIPI
 

Recently uploaded

Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 

Recently uploaded (20)

Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 

Presentation acs-03

  • 1. A PRESENTATION ON ACCESS CONTROL SYSTEM PREPARED BY: Mody Devansh D. (06-ECG-03) Kukadia Pritesh M. (06-ECG-22) GROUP NO:8 INTERNAL GUIDE: Mr. J.N. PATEL 1/15
  • 2. LIST OF CONTENTS  Introduction of Project  Block Diagram  Circuit Diagram  Component Details  Working of circuit  Flow chart  Software details 2/15
  • 3. INTRODUCTION OF PROJECT Now a days, a problem of security is very much important everywhere in the world. So, in large firms or companies, to make protect of entering of unauthorized person or to secure their important section, they generally use this type of security. This project, AN ACCESS CONTROL SYSTEM provides a facility of security. This type of security lock is generally attached at the main entrance door of the firms. By using this type of security, only authorized fellow can enter.  It is quite easy in installation and use. Through this, one can allocate more number of passwords to many fellows. It is easy to use as the fellow don’t need to carry any type of id card or chip etc. 3/15
  • 4. BLOCK DIAGRAM AND DESCRIPTION ELECTRICAL LOAD LOADS DRIVER KEYPAD 8051 ALARM ALARM DRIVER 4/15
  • 5. First of all a user enters a password by a hex keypad.  Micro controller checks password and then gives according output.  If the password is correct then it opens the door.  If the password is wrong then it gives output to the alarm. 5/15
  • 6. CIRCUIT DIAGRAM AND DESCRIPTION LCD 6/15
  • 7.  When the power supply is switched on, then the whole circuit starts working.  Then in LCD, the name of company is displayed and the person is asked to enter the password. The password is entered through a hex keypad. The microcontroller compares that password with the already saved database of employee's information. 7/15
  • 8. If it matches with any of the saved password, then microcontroller gives output to the LCD. Then in LCD, the name of employee, his department, his employee number, etc are displayed. Parallel, the microcontroller gives output to the DC motor to open the door. If the password doesn’t match with any password three times, then microcontroller displays in LCD that your password is wrong, and it gives output to the buzzer. 8/15
  • 9. COMPONENT DETAILS SR NAME SR NAME NO. NO. 1 MICRO CONTROLLER (AT89S52) 16 ON/OFF SWITCH 2 16×2 LCD 17 LED 3 HEX KEYPAD 18 PRESET(4k7) 4 MICROCONTROLLER COMPATIBLE PCB 19 1000uF/25V CAPACITOR 5 DC MOTOR 20 0.1uF CAPACITOR 6 DC 2NO-NC RELAY(12V) 21 10uF CAPACITOR 7 DC RELAY(5V) 22 33pF CAPACITOR 8 7805 IC 23 5V BUZZER 9 BUG STRIP 24 10Ω RESISTER 10 RESISTER ARRAY 25 1KΩ RESISTER 11 CRYSTAL OSSCILATOR 26 10KΩ RESISTER 12 BRIDGE RECTIFIER 27 CONNECTING WIRES 13 40 PIN CONNECTOR 28 DC SOCKET 14 HEAT SINK 29 SMALL GPB 15 10 PIN CONNECTOR CABLE 9/15
  • 10. MAIN PCB 10/15
  • 11. WHY HEX KEYPAD? A general 3×2 matrix keypad contains only 0-9 keys. Whereas a hex keypad contains 0-9 keys and also it contains A,B,C,D,E,F keys. So it provides more number of combination of Passwords to the firms. 11/15
  • 12. POWER SUPPLY SECTION A supply is given from 230v AC through a 12v adepter. Then it is given to the bridge rectifier. The output of rectifier is given to voltage regulator IC through filter capacitors. 12/15
  • 13. SOFTWARE DETAILS KEIL µ VISION 3.0.3. KEIL SOFTWARE IS USED TO PROVIDE YOU WITH SOFTWARE DEVELOPMENT TOOLS FOR 8051 BASED MC. WITH THE KEIL TOOLS YOU CAN GENERATE EMBEDDED APP FOR VIRTUALLY EVERY 8051 DERIVATIVE. 13/15
  • 14. START READ KEYPAD CHECK PASSWORD SWITCH ON DEVICE CHECK IF WRONG PASSWORD WAS ENTERED THREE TIMES SWITCH OFF SWITCH ON ALARM ALARM 14/15
  • 15. THANK YOU 15/15