SlideShare a Scribd company logo
1 of 7
Download to read offline
Indonesian Journal of Electrical Engineering and Computer Science
Vol. 21, No. 1, January 2021, pp. 37~43
ISSN: 2502-4752, DOI: 10.11591/ijeecs.v21.i1.pp37-43  37
Journal homepage: http://ijeecs.iaescore.com
Real time model of a lock gate system upon fingerprint with
microcontroller
Maath Jasem Mahammad, Yousif Al Mashhadany, Abdulkader Mohammad Eyada
Department of Electrical /College of Engineering, University of Anbar, Iraq
Article Info ABSTRACT
Article history:
Received Apr 16, 2020
Revised Jun 14, 2020
Accepted Jul 18, 2020
Safety is one of the most important things that we are keen to provide all
aspects of our lives. Keyless lock gate with fingerprint access has many
advantages over traditional systems such as passwords. Therefore, fingerprint
identification represents the main part, which require that system is cheap,
practical, easy to use and allows fast and securely. This paper discusses the
design and implementation with real time model of a practical lock gate
system for the achievement of high security by using fingerprint purification
to control the mechanism of opening doors in banks, warehouses,
laboratories and places of interest. In this paper, the microcontroller
technology in the Ardonio board was used with an optical sensor to take the
fingerprint, convert it into digital data, and insert it into a definition window
to unify all input data and store it for use when compared to the system
experience. After obtaining the result of the comparison, the appropriate
commands are prepared for operating the servo of the lock mechanism for
the doors used. In the testing of the system, the results are very accurate. The
system also has other advantages such as small size and low power required
for operation and ease of use.
Keywords:
Authentication
Enrolled
Fingerprint model
Lock gate system
Microcontroller
This is an open access article under the CC BY-SA license.
Corresponding Author:
Maath Jasem Mahammad
Department of Electrical
College of Engineering
University of Anbar, Iraq
Email: maath.mahammad@uoanbar.edu.iq
1. INTRODUCTION
The design of security lockgate using the fingerprint technology was built using a microcontroller,
which reads from fingerprint scanner as a process of verifying the fingerprint image to open a protected door
[1-4]. Fingerprint identification is one of the most reliable ways to verify a person’s identity. A fingerprint is
papillary patterns on the skin that are unique to each person, and unchanged throughout his live [5]. The
fingers have a stream like the pattern of the ridges and valleys. Papillary edges on the finger, called rubbing
edges, which help the hand to hold objects, increment grating and improve the material detecting of surface
structure [6-9]. At present, the most popular method of biometric identification is fingerprint recognition.
These systems are cheap, practical, wide use and have in future good development due to their adaptability
[10].
In this paper we have tried to implement lock gate system by using a fingerprint scaner interfaced
with Arduino microcontroller [11-13]. Any fingerprint scanner has two functions: get an image of a
fingerprint, called verification and check its pattern for matching with other patterns in the database, called
identification [14]. When verify, the system compares the input fingerprint with the “enrolled” fingerprint of
a specific user to determine if they belong to the same finger. During identification, the system compares the
 ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 37 - 43
38
fingerprint of the input fingerprint with the fingerprints of all registered users in the database to determine if
the person is already known under a duplicate or under a false name [15-17].
A model of a fingerprint detection system is designed to work mainly on three principles: a stage of
acquisition an image, stage of extraction and pattern matching. Stage imaging is the most important part; it
involves obtaining an image using the fingerprint of the user interface [18-20].
User fingerprint system interface is a fingerprint scanner, through which images are acquired and
stored in the database [21]. The extraction stage comprises extracting minutiae points in a fingerprint. This
includes the removal of an important detail of fingerprints, and then sends it to store in the database [22]. The
task of the matching stage, to compare and check pattern prints fingers the modes of operation of the system
are mainly in two ways [23, 24]:
a) Enrolment/Registration mode: at this stage, called enrolment, the system measures the biometric
characteristics of the user. Based on this measurement, it generates a template that is stored with any
other relevant user information in protected memory or a database. After the registration phase, the user
becomes available in the system so that it can be correctly identified at the second stage of the
recognition process, at the authentication stage.
b) Authentication mode: at the authentication stage, the user's biometric characteristics are measured again
and compared with the previously saved template. If they are similar enough, it is assumed that a
previously registered is present.
c) As a result of the biometric authentication process, the system accepts or rejects the user, thereby
improving the reliability and security of application against phishing attacks [25-27].
2. DESIGN AND IMPLEMNTATION
In this section, we describe the implementations of complete hardware/software proposed system.
The hardware design combines the microcontroller/Arduino with the fingerprint module, LCD display, and
interfaces. The software routines for system are implemented under the open-source Arduino software.
2.1. Main part system
The components required to design the system are: arduino uno, finger print module, four push
button, two LEDs, power supply, plastic box, servo motor and 16x2 LCD.
2.2. The board of arduino
The microcontroller used in this work is Arduino/Genuino Uno, it has a USB connection and power
jack with quartz crystal (16MHz), six analog inputs and 14 digital inputs pins. The Arduino board equipped
with internal RTC (real time clock). A real-time clock is a clock keeps the current time and that can be used
in order to program actions at a certain time. As the board is powered, the RTC is reset and starts from a
standard date.
2.3. Fingerprint optical module
The main part of the scanner as shown in Figure 1, is a CCD device consisting of light-sensitive
diodes called photosites. These sensors produce an electrical signal as much as the response to photons of
light. Usually the electrical signal is generated by a small piece known as pixels relative to the light that hit
the spot. The working mechanism of the scanner is to create an analog-to-digital axis by processing the
analog electrical signal to create a digital representation of the image. Fingerprinting by placing the finger in
a specific location on the glass plate. The CCD camera then takes a picture by using its own light source, the
light-emitting diode matrix, to illuminate the tops of the fingers. An upside-down image is generated with
dark areas representing the reflection of the finger waves and lighter areas representing the less reflective
areas of the light. The scanner takes a number of times for the same model to have a good database. Before
starting the comparison bin When you take a new image for the purpose of the test, the processor makes sure
that the image under examination has high accuracy by creating a perpendicular line on the hills with
successive parts of very dark pixels and pixels very light. Then, if the image is clear and known, the
processor moves to the comparison role by calculating all the pixels between the two fingers to a certain
extent, which represents the degree of tolerance adopted in comparison. The decision is determined positively
or negatively. The PIN definition of fingerprint module shown in Table 1.
Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752 
Real time model of a lock gate system upon fingerprint with microcontroller (Maath Jasem Mahammad)
39
Figure 1. Fingerprint optical module
Table 1. The PIN definition of fingerprint module
No Name of pin Description
1 Power supply (+ve) The main positive sources of power
2 Module (Tx)
The output of circuit used with
impedance around 10K Ohm.
3 Module (Rx) The input voltage with 7V
4 Power supply (-ve)
The negative terminal of source
power
2.4. Lock door system
Here we attached a servo motor as shown in Figure 2, to act as a lock door gate. There are many
types of Servo these depend upon the shapes and sizes. The electrical connection of the model which used in
this work has there wires, the wires used for positive voltage, ground and last used in position setting.
The combination of DC motor, position control system, and gears are represents a servo motor. The
control electronics apply the adjustment of position of the shaft in the DC, this process is done by duty ratio
of the PWM signal.
Figure 2. Servo motor
2.5. Circuit explanation
The schematic circuit diagram of lock gate system contains fingerprint module with Arduino
microcontroller which controls whole the process of the project, push button, and LCD as shown in Figure 3.
Arduino controls the complete processes. The connection of the practical model of Arduino in this work can
be description by explain the connection of mean point with pins of board, where D14(ENROL), D15(DEL),
D16(UP) and D17(DOWN) while the Yellow LED will connect to D6 of the board as a digital pin, and the
this with respect resistance 1K Ohm and Green LED is connected to D6. In this connection
Rx and Tx which represent the Finger Print Module’s directly connected at Digital pin D2 and D3 of
Arduino. The Finger Print Module’s need 5V as power supply will taken from Arduino board and Servo
motor is also connected to PWM pin D5 of Arduino. A 16x2 LCD has RS, EN, D4, D5, D6, and D7 represent
the configured in 4-bit mode and the connection at Digital pin D13, D12, D11, D10, D9, and D8 of Arduino.
2.6. The flow chart of the software developed
The flow charts of the program written in our fingerprint detection system can be divided into three
mainly parts as shown in Figure 4:
a) Check serial connection between the fingerprint module and arduino board
b) The Enrolment/Registration stage
c) The Authentication/Verifying stag
According to the program flow charts, the software that drives the microcontroller was done using
open-source Arduino software. The coding was segmented into various modules; first, the module that
interface the fingerprint scanner with Arduino board and also drives the LCD screen; next is the module that
controls the fingerprint scanner, which instructs the scanner to register users and allows to compare the
entered finger print with pre-stored fingerprints.
 ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 37 - 43
40
Figure 3. The schematic circuit diagram of lock gate system system
(a) (b)
(c)
Figure 4. The flowchart of fingerprint detection system (a) check serial connection,
(b) enrolment, (c) authentication
Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752 
Real time model of a lock gate system upon fingerprint with microcontroller (Maath Jasem Mahammad)
41
3. TESTS, RESULTS AND DISCUSSION
At the beginning of the system, a statement appears on the LCD asking to press the two Up/Down keys
to begin the matching process and verify the ID, as in Figure 5(a). When pressing the Up/Down key, the
fingerprint sensor will be ready to take a picture of the finger and match it with the stored fingerprint. In this
case the sensitive fingerprint has five attempts to take the picture if there is no finger to return to the beginning.
After the fingerprint sensor takes the fingerprint image and processes it then matches it with the
fingerprint templates stored in its database, if the fingerprint is pre-stored, the matching process will succeed
and the servomotor moves 180 degree, and a sentence on the LCD shows "Open Gate Allowed" as shown in
Figure 5(b). If the fingerprint is not stored, the matching process will be displayed and a sentence on the LCD
will appear "Finger not found". Figure 5(c) shows the process of storing the fingerprint using the Enroll
button, selecting the storage location from 0 to 25 locations. Figure 5(d) shows state of deleting fingerprint
and Select the fingerprint location to delete.
(a) (b)
(c) (d)
Figure 5. Lock gate system (a) starting system (b) match (c) enrolling (d) deleting
A Lock Gate Systems based Fingerprint with microcontroller are comfortable locking systems that
open with just the touch of authorized user’s finger; can increased use in current time, as having features:
a) High capacity of the fingerprint library, with ability of change the capacity of used Flash EEPROM
b) Acceptable security level
c) The system can use to verify persons as well as to store attendance time and date
4. CONCLUSION
In the industrial fields, the security aspects are sought in a very large and high degree of importance.
Therefore, there are many theoretical and practical researches in this aspect. The most important things
obtained in this research are the high accuracy with the high speed of implementation of the requirements
such as control of lock performance and regularly. Accurate and high resolution detection of foreign
fingerprints with the possibility to program dozens of fingerprints in the same model.
Through the practical experience of the designer system can be considered as an industrial model
and for several applications such as control of the entry of reservoirs in banks, laboratories and important
meeting rooms. The accuracy and feasibility of using the optical sensor have been proven to provide the
required fingerprint data with a high degree of accuracy. There is a possibility to develop this system through
several things, such as expanding the work to take a picture of the human eye instead of a fingerprint or a
picture of the human face to facilitate the process of entry and exit from the gates.
 ISSN: 2502-4752
Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 37 - 43
42
REFERENCES
[1] F.Tennyson, "Design and Implementation of a Fingerprint Lock System", IOSR Journal of Engineering (IOSRJEN)
vol.7, no 4, pp. 13-19. 2017.
[2] Adeolu Afolabi, Oke Alice, "On Securing a Door with Finger Print Biometric Technique", Transact ions on
Machine Learning and Arti f icial Intel l igence", vol. 2, no. 2, pp. 86-96, 2014.
[3] M. Mostafizur R. Komol, A. K. Podder, M. N. Ali, S. M. Ansary, "RFID and Finger Print Based Dual Security
System: A Robust Secured Control to Access Through Door Lock Operation", American Journal of Embedded
Systems and Applications, vol.6, no.1, pp. 15-22, 2018.
[4] V.Nandagopal, V.Maheswari, C.Kannan, "Vehicle Starting System Using Finger Print", International Journal of
Pure and Applied Mathematics", vol. 119, no. 18, pp. 1753-1760, 2018.
[5] D. R Samuel, E. Dickson, A. B. Aaron, "Design and Implementation of A Microcontroller Based Automatic Door
And Vistors", International Journal of Scientific Research And Education, vol. 2, pp 532-552, 2014.
[6] R.Sai Charan Reddy, P.Vamsi Krishna, M.Krishna Chaitanya, M.Neeharika, K Prabhakara Rao, "Security System
Based on Knock-Pattern Using Arduino and GSM Communication", International Journal of Engineering and
Techniques, vol. 4, pp. 154-157, 2018.
[7] N. Prince, N. Ezeilo, "Design and Implementation of Microcontroller Based Security Door System (Using Mobile
Phone & Computer Set)", Journal of Automation and Control Engineering", vol.1, no. 1, pp. 65-69, 2013.
[8] M. Amanullah, "Microcontroller Based Reprogrammable Digital Door Lock Security System by Using Keypad &
GSM/CDMA Technology", IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE), vol. 4, no. 6,
pp 38-42, 2013.
[9] O. Shoewu, O. Olatinwo, "Design and Implementation of a Microcontroller Based Automatic Gate", African
Journal of Computing & ICT", vol. 6, no. 1, pp 21-32, 2013.
[10] U. James, D. E. Bassey, A. Etim, "Design and Construction of Door Locking Security System using GSM",
International Journal of Engineering And Computer Science, vol. 2, no. 7, pp 2235-2257, 2013.
[11] Persis, A. Priya, "Design and Implementation of Intelligent Authentication System Based on Fingerprint, TAGA
JOURNAL", vol. 14, pp 1978-1983, 2018.
[12] J. Han, “Fingerprint Authentication Schemes for Mobile Devices,” International Journal of Electrical and
Computer Engineering (IJECE)", vol. 5, no. 3, pp. 579-585, 2015.
[13] H. Sun, "Design of Embedded Automated Fingerprint Identification System Based on DSP", Advanced
Engineering Forum, vol. 1, pp. 97-101, 2011.
[14] S. Kumar, D. Rasaily, M. Mukhia, A. Ashraf, "Biometric Attendance System using Microcontroller", International
Journal of Engineering Trends and Technology (IJETT), vol. 32, no. 6, pp. 306-308, 2016.
[15] M. García, F. E. Hoyos, J. E. Candelo, " Portable and efficient fingerprint authentication system based on a
microcontroller," International Journal of Electrical and Computer Engineering (IJECE),vol. 9, no. 4,
pp. 2346-2353, 2019.
[16] J.Wan, L. Zhang, "Design of embedded fingerprint identification system based on TMS320C5515", Computer
Science and Device System (CSSS), International Conference on 2011.
[17] K. Yadar, S. Singh, S. Pujari, P. Mishra, "Fingerprint Based Attendance System Using Microcontroller and
LabView", International Journal of Advanced Research in Electrical,Electronics and Instrumentation Engineering,
vol. 4, pp. 5111-5121, 2015.
[18] Y. I. Al-Mashhadany, “ANFIS-Inverse-Controlled PUMA 560 Workspace Robot with Spherical Wrist”, Elsevier
Procedia Engineering journal, pp. 700-709, 2012.
[19] Annapurna Mishra, Satchidananda Dehuri, "Real-time online fingerprint image classification using adaptive hybrid
techniques," International Journal of Electrical and Computer Engineering (IJECE) vol. 9, no. 5, pp. 4372-4381,
2019.
[20] Subba Reddy Borra, G. Jagadeeswar Reddy, E.Sreenivasa Reddy, "An Efficient Fingerprint Identification using
Neural Network and BAT Algorithm," International Journal of Electrical and Computer Engineering (IJECE),
vol. 8, no. 2, pp. 1194-1213, April 2018.
[21] Y. I. Al-Mashhadany, “Inverse Kinematics Problem (IKP) of 6-DOF Manipulator By Locally Recurrent Neural
Networks (LRNNs)”, International Conference on Management and Service Science (MASS 2010), pp. 24-26, Aug,
2010.
[22] S. Shinde and V. Bendre, “An Embedded Fingerprint Authentication System," International Conference on
Computing Communication Control and Automation, pp. 205-208, 2015.
[23] M. Fons, F. Fons, E. Cantó., "Design of an Embedded Fingerprint Matcher System”, IEEE International"
Symposium on Consumer Electronics, 2006.
[24] O. A. Akinola, A. Abayomi-Alli & R. A. Adeniyi, "Development of a Microcontroller Based Fingerprint
Examination Access Control System", African Journal of Computing & ICT Reference Format Afr J. of Comp &
ICTs, vol. 8, no. 2, pp. 145-152, 2015.
[25] Y. I. Al-Mashhadany, “Modeling and Simulation of Adaptive Neuro-Fuzzy Controller for Chopper-Fed DC Motor
Drive”, IEEE Applied Power Electronics Colloquium, Malaysia, pp. 110-115, 18-19 April 2011.
[26] Khin San Myint, Chan Mya Mya Nyein," Fingerprint Based Attendance System Using Arduino", International
Journal of Scientific and Research Publications, vol. 8, no. 7, pp. 422-426, 2018.
[27] M. Martin, K. Štefan, F. Ľubor, “Biometrics Authentication of Fingerprint with Using Fingerprint Reader and
Microcontroller Arduino”, TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 16,
no. 2, pp. 755-765, 2018.
Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752 
Real time model of a lock gate system upon fingerprint with microcontroller (Maath Jasem Mahammad)
43
BIOGRAPHIES OF AUTHORS
Dr. Maath Jasem Mahammad obtained B.SC. of Electrical Engineering in 1993 from Al-
Mustansuria University, Baghdad-Iraq, M.SC. Electro-technical complex and systems of
mining-enterprises in 2002 from Irkutsk State Technology University, Russia, Ph.D in 2009
System Analysis, Control and Information Processing (Information and Technical Systems)
Kuban State University of Technology, Krasnodar-Russia. He is currently a lecturer at the
Department of Electrical Engineering, University of Anbar, Iraq. His research interests include
control and automation systems.
Assist. Prof. Dr. Yousif Ismail Mohammed Al-Mashhadany is a lecturer in Electrical
Engineering Department – College of Engineering (Control Engineering). Senior member
IEEE, He received the B.Sc. (1995), M.Sc. (1999), and Ph.D (2010) in Department of
Electrical and Electronic Engineering from the Rashid School of Engineering and Science /
University of Technology in Baghdad/Iraq. He complete postdoctoral fellow research in
electrical engineering - control department at the University of Malaya in Malaysia
(UMPEDAC) in 2012. He works since 2004, a lecturer in the Department of Electrical
Engineering / Engineering College / University of Anbar. He has many publishing that
included three books, two chapters, thirty seven Journals paper most of them (Clarivate,
Scopus and international journal), and thirty two conferences paper.
Abdukader Mohammed Eyada obtained bachelor degree of Electrical Engineering in 2018
from University of Anbar, Iraq. His work interests in field of secuerity and smart home.

More Related Content

Similar to Real time model of a lock gate system upon fingerprint with microcontroller

IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET Journal
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMIRJET Journal
 
Sensor Fault Detection in IoT System Using Machine Learning
Sensor Fault Detection in IoT System Using Machine LearningSensor Fault Detection in IoT System Using Machine Learning
Sensor Fault Detection in IoT System Using Machine LearningIRJET Journal
 
Covid Norms Checker with IOT Based Health Monitoring
Covid Norms Checker with IOT Based Health MonitoringCovid Norms Checker with IOT Based Health Monitoring
Covid Norms Checker with IOT Based Health MonitoringIRJET Journal
 
Energy Conservation Bidirectional visitor counter
Energy Conservation Bidirectional visitor counterEnergy Conservation Bidirectional visitor counter
Energy Conservation Bidirectional visitor counterIRJET Journal
 
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREFINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREMichael George
 
A Digital Pen with a Trajectory Recognition Algorithm
A Digital Pen with a Trajectory Recognition AlgorithmA Digital Pen with a Trajectory Recognition Algorithm
A Digital Pen with a Trajectory Recognition AlgorithmIOSR Journals
 
A Digital Pen with a Trajectory Recognition Algorithm
A Digital Pen with a Trajectory Recognition AlgorithmA Digital Pen with a Trajectory Recognition Algorithm
A Digital Pen with a Trajectory Recognition AlgorithmIOSR Journals
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMIRJET Journal
 
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionAttendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionIRJET Journal
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET Journal
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
 
IRJET- A Amenably Projected VR System of Wall Mounted Buttons
IRJET- A Amenably Projected VR System of Wall Mounted ButtonsIRJET- A Amenably Projected VR System of Wall Mounted Buttons
IRJET- A Amenably Projected VR System of Wall Mounted ButtonsIRJET Journal
 
Fingerprint based electronic voting system
Fingerprint based electronic voting systemFingerprint based electronic voting system
Fingerprint based electronic voting systemPvrtechnologies Nellore
 
DATA ACQUISITION AND ALERT SYSTEM USING BLYNK PLATFORM
DATA ACQUISITION AND ALERT SYSTEM USING BLYNK PLATFORMDATA ACQUISITION AND ALERT SYSTEM USING BLYNK PLATFORM
DATA ACQUISITION AND ALERT SYSTEM USING BLYNK PLATFORMIRJET Journal
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 

Similar to Real time model of a lock gate system upon fingerprint with microcontroller (20)

IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
 
Sensor Fault Detection in IoT System Using Machine Learning
Sensor Fault Detection in IoT System Using Machine LearningSensor Fault Detection in IoT System Using Machine Learning
Sensor Fault Detection in IoT System Using Machine Learning
 
Covid Norms Checker with IOT Based Health Monitoring
Covid Norms Checker with IOT Based Health MonitoringCovid Norms Checker with IOT Based Health Monitoring
Covid Norms Checker with IOT Based Health Monitoring
 
Energy Conservation Bidirectional visitor counter
Energy Conservation Bidirectional visitor counterEnergy Conservation Bidirectional visitor counter
Energy Conservation Bidirectional visitor counter
 
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREFINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
 
A Digital Pen with a Trajectory Recognition Algorithm
A Digital Pen with a Trajectory Recognition AlgorithmA Digital Pen with a Trajectory Recognition Algorithm
A Digital Pen with a Trajectory Recognition Algorithm
 
A Digital Pen with a Trajectory Recognition Algorithm
A Digital Pen with a Trajectory Recognition AlgorithmA Digital Pen with a Trajectory Recognition Algorithm
A Digital Pen with a Trajectory Recognition Algorithm
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEM
 
Irjet v7 i3284
Irjet v7 i3284Irjet v7 i3284
Irjet v7 i3284
 
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionAttendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
IRJET- A Amenably Projected VR System of Wall Mounted Buttons
IRJET- A Amenably Projected VR System of Wall Mounted ButtonsIRJET- A Amenably Projected VR System of Wall Mounted Buttons
IRJET- A Amenably Projected VR System of Wall Mounted Buttons
 
Fingerprint based electronic voting system
Fingerprint based electronic voting systemFingerprint based electronic voting system
Fingerprint based electronic voting system
 
DATA ACQUISITION AND ALERT SYSTEM USING BLYNK PLATFORM
DATA ACQUISITION AND ALERT SYSTEM USING BLYNK PLATFORMDATA ACQUISITION AND ALERT SYSTEM USING BLYNK PLATFORM
DATA ACQUISITION AND ALERT SYSTEM USING BLYNK PLATFORM
 
An internet of things-based touchless parking system using ESP32-CAM
An internet of things-based touchless parking system using  ESP32-CAMAn internet of things-based touchless parking system using  ESP32-CAM
An internet of things-based touchless parking system using ESP32-CAM
 
Z4501149153
Z4501149153Z4501149153
Z4501149153
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 

More from nooriasukmaningtyas

A deep learning approach based on stochastic gradient descent and least absol...
A deep learning approach based on stochastic gradient descent and least absol...A deep learning approach based on stochastic gradient descent and least absol...
A deep learning approach based on stochastic gradient descent and least absol...nooriasukmaningtyas
 
Automated breast cancer detection system from breast mammogram using deep neu...
Automated breast cancer detection system from breast mammogram using deep neu...Automated breast cancer detection system from breast mammogram using deep neu...
Automated breast cancer detection system from breast mammogram using deep neu...nooriasukmaningtyas
 
Max stable set problem to found the initial centroids in clustering problem
Max stable set problem to found the initial centroids in clustering problemMax stable set problem to found the initial centroids in clustering problem
Max stable set problem to found the initial centroids in clustering problemnooriasukmaningtyas
 
Intelligent aquaculture system for pisciculture simulation using deep learnin...
Intelligent aquaculture system for pisciculture simulation using deep learnin...Intelligent aquaculture system for pisciculture simulation using deep learnin...
Intelligent aquaculture system for pisciculture simulation using deep learnin...nooriasukmaningtyas
 
Effective task scheduling algorithm in cloud computing with quality of servic...
Effective task scheduling algorithm in cloud computing with quality of servic...Effective task scheduling algorithm in cloud computing with quality of servic...
Effective task scheduling algorithm in cloud computing with quality of servic...nooriasukmaningtyas
 
Fixed point theorem between cone metric space and quasi-cone metric space
Fixed point theorem between cone metric space and quasi-cone metric spaceFixed point theorem between cone metric space and quasi-cone metric space
Fixed point theorem between cone metric space and quasi-cone metric spacenooriasukmaningtyas
 
Design of an environmental management information system for the Universidad ...
Design of an environmental management information system for the Universidad ...Design of an environmental management information system for the Universidad ...
Design of an environmental management information system for the Universidad ...nooriasukmaningtyas
 
K-NN supervised learning algorithm in the predictive analysis of the quality ...
K-NN supervised learning algorithm in the predictive analysis of the quality ...K-NN supervised learning algorithm in the predictive analysis of the quality ...
K-NN supervised learning algorithm in the predictive analysis of the quality ...nooriasukmaningtyas
 
Systematic literature review on university website quality
Systematic literature review on university website qualitySystematic literature review on university website quality
Systematic literature review on university website qualitynooriasukmaningtyas
 
An intelligent irrigation system based on internet of things (IoT) to minimiz...
An intelligent irrigation system based on internet of things (IoT) to minimiz...An intelligent irrigation system based on internet of things (IoT) to minimiz...
An intelligent irrigation system based on internet of things (IoT) to minimiz...nooriasukmaningtyas
 
Enhancement of observability using Kubernetes operator
Enhancement of observability using Kubernetes operatorEnhancement of observability using Kubernetes operator
Enhancement of observability using Kubernetes operatornooriasukmaningtyas
 
Customer churn analysis using XGBoosted decision trees
Customer churn analysis using XGBoosted decision treesCustomer churn analysis using XGBoosted decision trees
Customer churn analysis using XGBoosted decision treesnooriasukmaningtyas
 
Smart solution for reducing COVID-19 risk using internet of things
Smart solution for reducing COVID-19 risk using internet of thingsSmart solution for reducing COVID-19 risk using internet of things
Smart solution for reducing COVID-19 risk using internet of thingsnooriasukmaningtyas
 
Development of computer-based learning system for learning behavior analytics
Development of computer-based learning system for learning behavior analyticsDevelopment of computer-based learning system for learning behavior analytics
Development of computer-based learning system for learning behavior analyticsnooriasukmaningtyas
 
Efficiency of hybrid algorithm for COVID-19 online screening test based on it...
Efficiency of hybrid algorithm for COVID-19 online screening test based on it...Efficiency of hybrid algorithm for COVID-19 online screening test based on it...
Efficiency of hybrid algorithm for COVID-19 online screening test based on it...nooriasukmaningtyas
 
Comparative study of low power wide area network based on internet of things ...
Comparative study of low power wide area network based on internet of things ...Comparative study of low power wide area network based on internet of things ...
Comparative study of low power wide area network based on internet of things ...nooriasukmaningtyas
 
Fog attenuation penalty analysis in terrestrial optical wireless communicatio...
Fog attenuation penalty analysis in terrestrial optical wireless communicatio...Fog attenuation penalty analysis in terrestrial optical wireless communicatio...
Fog attenuation penalty analysis in terrestrial optical wireless communicatio...nooriasukmaningtyas
 
An approach for slow distributed denial of service attack detection and allev...
An approach for slow distributed denial of service attack detection and allev...An approach for slow distributed denial of service attack detection and allev...
An approach for slow distributed denial of service attack detection and allev...nooriasukmaningtyas
 
Design and simulation double Ku-band Vivaldi antenna
Design and simulation double Ku-band Vivaldi antennaDesign and simulation double Ku-band Vivaldi antenna
Design and simulation double Ku-band Vivaldi antennanooriasukmaningtyas
 
Coverage enhancements of vehicles users using mobile stations at 5G cellular ...
Coverage enhancements of vehicles users using mobile stations at 5G cellular ...Coverage enhancements of vehicles users using mobile stations at 5G cellular ...
Coverage enhancements of vehicles users using mobile stations at 5G cellular ...nooriasukmaningtyas
 

More from nooriasukmaningtyas (20)

A deep learning approach based on stochastic gradient descent and least absol...
A deep learning approach based on stochastic gradient descent and least absol...A deep learning approach based on stochastic gradient descent and least absol...
A deep learning approach based on stochastic gradient descent and least absol...
 
Automated breast cancer detection system from breast mammogram using deep neu...
Automated breast cancer detection system from breast mammogram using deep neu...Automated breast cancer detection system from breast mammogram using deep neu...
Automated breast cancer detection system from breast mammogram using deep neu...
 
Max stable set problem to found the initial centroids in clustering problem
Max stable set problem to found the initial centroids in clustering problemMax stable set problem to found the initial centroids in clustering problem
Max stable set problem to found the initial centroids in clustering problem
 
Intelligent aquaculture system for pisciculture simulation using deep learnin...
Intelligent aquaculture system for pisciculture simulation using deep learnin...Intelligent aquaculture system for pisciculture simulation using deep learnin...
Intelligent aquaculture system for pisciculture simulation using deep learnin...
 
Effective task scheduling algorithm in cloud computing with quality of servic...
Effective task scheduling algorithm in cloud computing with quality of servic...Effective task scheduling algorithm in cloud computing with quality of servic...
Effective task scheduling algorithm in cloud computing with quality of servic...
 
Fixed point theorem between cone metric space and quasi-cone metric space
Fixed point theorem between cone metric space and quasi-cone metric spaceFixed point theorem between cone metric space and quasi-cone metric space
Fixed point theorem between cone metric space and quasi-cone metric space
 
Design of an environmental management information system for the Universidad ...
Design of an environmental management information system for the Universidad ...Design of an environmental management information system for the Universidad ...
Design of an environmental management information system for the Universidad ...
 
K-NN supervised learning algorithm in the predictive analysis of the quality ...
K-NN supervised learning algorithm in the predictive analysis of the quality ...K-NN supervised learning algorithm in the predictive analysis of the quality ...
K-NN supervised learning algorithm in the predictive analysis of the quality ...
 
Systematic literature review on university website quality
Systematic literature review on university website qualitySystematic literature review on university website quality
Systematic literature review on university website quality
 
An intelligent irrigation system based on internet of things (IoT) to minimiz...
An intelligent irrigation system based on internet of things (IoT) to minimiz...An intelligent irrigation system based on internet of things (IoT) to minimiz...
An intelligent irrigation system based on internet of things (IoT) to minimiz...
 
Enhancement of observability using Kubernetes operator
Enhancement of observability using Kubernetes operatorEnhancement of observability using Kubernetes operator
Enhancement of observability using Kubernetes operator
 
Customer churn analysis using XGBoosted decision trees
Customer churn analysis using XGBoosted decision treesCustomer churn analysis using XGBoosted decision trees
Customer churn analysis using XGBoosted decision trees
 
Smart solution for reducing COVID-19 risk using internet of things
Smart solution for reducing COVID-19 risk using internet of thingsSmart solution for reducing COVID-19 risk using internet of things
Smart solution for reducing COVID-19 risk using internet of things
 
Development of computer-based learning system for learning behavior analytics
Development of computer-based learning system for learning behavior analyticsDevelopment of computer-based learning system for learning behavior analytics
Development of computer-based learning system for learning behavior analytics
 
Efficiency of hybrid algorithm for COVID-19 online screening test based on it...
Efficiency of hybrid algorithm for COVID-19 online screening test based on it...Efficiency of hybrid algorithm for COVID-19 online screening test based on it...
Efficiency of hybrid algorithm for COVID-19 online screening test based on it...
 
Comparative study of low power wide area network based on internet of things ...
Comparative study of low power wide area network based on internet of things ...Comparative study of low power wide area network based on internet of things ...
Comparative study of low power wide area network based on internet of things ...
 
Fog attenuation penalty analysis in terrestrial optical wireless communicatio...
Fog attenuation penalty analysis in terrestrial optical wireless communicatio...Fog attenuation penalty analysis in terrestrial optical wireless communicatio...
Fog attenuation penalty analysis in terrestrial optical wireless communicatio...
 
An approach for slow distributed denial of service attack detection and allev...
An approach for slow distributed denial of service attack detection and allev...An approach for slow distributed denial of service attack detection and allev...
An approach for slow distributed denial of service attack detection and allev...
 
Design and simulation double Ku-band Vivaldi antenna
Design and simulation double Ku-band Vivaldi antennaDesign and simulation double Ku-band Vivaldi antenna
Design and simulation double Ku-band Vivaldi antenna
 
Coverage enhancements of vehicles users using mobile stations at 5G cellular ...
Coverage enhancements of vehicles users using mobile stations at 5G cellular ...Coverage enhancements of vehicles users using mobile stations at 5G cellular ...
Coverage enhancements of vehicles users using mobile stations at 5G cellular ...
 

Recently uploaded

Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 

Recently uploaded (20)

Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 

Real time model of a lock gate system upon fingerprint with microcontroller

  • 1. Indonesian Journal of Electrical Engineering and Computer Science Vol. 21, No. 1, January 2021, pp. 37~43 ISSN: 2502-4752, DOI: 10.11591/ijeecs.v21.i1.pp37-43  37 Journal homepage: http://ijeecs.iaescore.com Real time model of a lock gate system upon fingerprint with microcontroller Maath Jasem Mahammad, Yousif Al Mashhadany, Abdulkader Mohammad Eyada Department of Electrical /College of Engineering, University of Anbar, Iraq Article Info ABSTRACT Article history: Received Apr 16, 2020 Revised Jun 14, 2020 Accepted Jul 18, 2020 Safety is one of the most important things that we are keen to provide all aspects of our lives. Keyless lock gate with fingerprint access has many advantages over traditional systems such as passwords. Therefore, fingerprint identification represents the main part, which require that system is cheap, practical, easy to use and allows fast and securely. This paper discusses the design and implementation with real time model of a practical lock gate system for the achievement of high security by using fingerprint purification to control the mechanism of opening doors in banks, warehouses, laboratories and places of interest. In this paper, the microcontroller technology in the Ardonio board was used with an optical sensor to take the fingerprint, convert it into digital data, and insert it into a definition window to unify all input data and store it for use when compared to the system experience. After obtaining the result of the comparison, the appropriate commands are prepared for operating the servo of the lock mechanism for the doors used. In the testing of the system, the results are very accurate. The system also has other advantages such as small size and low power required for operation and ease of use. Keywords: Authentication Enrolled Fingerprint model Lock gate system Microcontroller This is an open access article under the CC BY-SA license. Corresponding Author: Maath Jasem Mahammad Department of Electrical College of Engineering University of Anbar, Iraq Email: maath.mahammad@uoanbar.edu.iq 1. INTRODUCTION The design of security lockgate using the fingerprint technology was built using a microcontroller, which reads from fingerprint scanner as a process of verifying the fingerprint image to open a protected door [1-4]. Fingerprint identification is one of the most reliable ways to verify a person’s identity. A fingerprint is papillary patterns on the skin that are unique to each person, and unchanged throughout his live [5]. The fingers have a stream like the pattern of the ridges and valleys. Papillary edges on the finger, called rubbing edges, which help the hand to hold objects, increment grating and improve the material detecting of surface structure [6-9]. At present, the most popular method of biometric identification is fingerprint recognition. These systems are cheap, practical, wide use and have in future good development due to their adaptability [10]. In this paper we have tried to implement lock gate system by using a fingerprint scaner interfaced with Arduino microcontroller [11-13]. Any fingerprint scanner has two functions: get an image of a fingerprint, called verification and check its pattern for matching with other patterns in the database, called identification [14]. When verify, the system compares the input fingerprint with the “enrolled” fingerprint of a specific user to determine if they belong to the same finger. During identification, the system compares the
  • 2.  ISSN: 2502-4752 Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 37 - 43 38 fingerprint of the input fingerprint with the fingerprints of all registered users in the database to determine if the person is already known under a duplicate or under a false name [15-17]. A model of a fingerprint detection system is designed to work mainly on three principles: a stage of acquisition an image, stage of extraction and pattern matching. Stage imaging is the most important part; it involves obtaining an image using the fingerprint of the user interface [18-20]. User fingerprint system interface is a fingerprint scanner, through which images are acquired and stored in the database [21]. The extraction stage comprises extracting minutiae points in a fingerprint. This includes the removal of an important detail of fingerprints, and then sends it to store in the database [22]. The task of the matching stage, to compare and check pattern prints fingers the modes of operation of the system are mainly in two ways [23, 24]: a) Enrolment/Registration mode: at this stage, called enrolment, the system measures the biometric characteristics of the user. Based on this measurement, it generates a template that is stored with any other relevant user information in protected memory or a database. After the registration phase, the user becomes available in the system so that it can be correctly identified at the second stage of the recognition process, at the authentication stage. b) Authentication mode: at the authentication stage, the user's biometric characteristics are measured again and compared with the previously saved template. If they are similar enough, it is assumed that a previously registered is present. c) As a result of the biometric authentication process, the system accepts or rejects the user, thereby improving the reliability and security of application against phishing attacks [25-27]. 2. DESIGN AND IMPLEMNTATION In this section, we describe the implementations of complete hardware/software proposed system. The hardware design combines the microcontroller/Arduino with the fingerprint module, LCD display, and interfaces. The software routines for system are implemented under the open-source Arduino software. 2.1. Main part system The components required to design the system are: arduino uno, finger print module, four push button, two LEDs, power supply, plastic box, servo motor and 16x2 LCD. 2.2. The board of arduino The microcontroller used in this work is Arduino/Genuino Uno, it has a USB connection and power jack with quartz crystal (16MHz), six analog inputs and 14 digital inputs pins. The Arduino board equipped with internal RTC (real time clock). A real-time clock is a clock keeps the current time and that can be used in order to program actions at a certain time. As the board is powered, the RTC is reset and starts from a standard date. 2.3. Fingerprint optical module The main part of the scanner as shown in Figure 1, is a CCD device consisting of light-sensitive diodes called photosites. These sensors produce an electrical signal as much as the response to photons of light. Usually the electrical signal is generated by a small piece known as pixels relative to the light that hit the spot. The working mechanism of the scanner is to create an analog-to-digital axis by processing the analog electrical signal to create a digital representation of the image. Fingerprinting by placing the finger in a specific location on the glass plate. The CCD camera then takes a picture by using its own light source, the light-emitting diode matrix, to illuminate the tops of the fingers. An upside-down image is generated with dark areas representing the reflection of the finger waves and lighter areas representing the less reflective areas of the light. The scanner takes a number of times for the same model to have a good database. Before starting the comparison bin When you take a new image for the purpose of the test, the processor makes sure that the image under examination has high accuracy by creating a perpendicular line on the hills with successive parts of very dark pixels and pixels very light. Then, if the image is clear and known, the processor moves to the comparison role by calculating all the pixels between the two fingers to a certain extent, which represents the degree of tolerance adopted in comparison. The decision is determined positively or negatively. The PIN definition of fingerprint module shown in Table 1.
  • 3. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752  Real time model of a lock gate system upon fingerprint with microcontroller (Maath Jasem Mahammad) 39 Figure 1. Fingerprint optical module Table 1. The PIN definition of fingerprint module No Name of pin Description 1 Power supply (+ve) The main positive sources of power 2 Module (Tx) The output of circuit used with impedance around 10K Ohm. 3 Module (Rx) The input voltage with 7V 4 Power supply (-ve) The negative terminal of source power 2.4. Lock door system Here we attached a servo motor as shown in Figure 2, to act as a lock door gate. There are many types of Servo these depend upon the shapes and sizes. The electrical connection of the model which used in this work has there wires, the wires used for positive voltage, ground and last used in position setting. The combination of DC motor, position control system, and gears are represents a servo motor. The control electronics apply the adjustment of position of the shaft in the DC, this process is done by duty ratio of the PWM signal. Figure 2. Servo motor 2.5. Circuit explanation The schematic circuit diagram of lock gate system contains fingerprint module with Arduino microcontroller which controls whole the process of the project, push button, and LCD as shown in Figure 3. Arduino controls the complete processes. The connection of the practical model of Arduino in this work can be description by explain the connection of mean point with pins of board, where D14(ENROL), D15(DEL), D16(UP) and D17(DOWN) while the Yellow LED will connect to D6 of the board as a digital pin, and the this with respect resistance 1K Ohm and Green LED is connected to D6. In this connection Rx and Tx which represent the Finger Print Module’s directly connected at Digital pin D2 and D3 of Arduino. The Finger Print Module’s need 5V as power supply will taken from Arduino board and Servo motor is also connected to PWM pin D5 of Arduino. A 16x2 LCD has RS, EN, D4, D5, D6, and D7 represent the configured in 4-bit mode and the connection at Digital pin D13, D12, D11, D10, D9, and D8 of Arduino. 2.6. The flow chart of the software developed The flow charts of the program written in our fingerprint detection system can be divided into three mainly parts as shown in Figure 4: a) Check serial connection between the fingerprint module and arduino board b) The Enrolment/Registration stage c) The Authentication/Verifying stag According to the program flow charts, the software that drives the microcontroller was done using open-source Arduino software. The coding was segmented into various modules; first, the module that interface the fingerprint scanner with Arduino board and also drives the LCD screen; next is the module that controls the fingerprint scanner, which instructs the scanner to register users and allows to compare the entered finger print with pre-stored fingerprints.
  • 4.  ISSN: 2502-4752 Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 37 - 43 40 Figure 3. The schematic circuit diagram of lock gate system system (a) (b) (c) Figure 4. The flowchart of fingerprint detection system (a) check serial connection, (b) enrolment, (c) authentication
  • 5. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752  Real time model of a lock gate system upon fingerprint with microcontroller (Maath Jasem Mahammad) 41 3. TESTS, RESULTS AND DISCUSSION At the beginning of the system, a statement appears on the LCD asking to press the two Up/Down keys to begin the matching process and verify the ID, as in Figure 5(a). When pressing the Up/Down key, the fingerprint sensor will be ready to take a picture of the finger and match it with the stored fingerprint. In this case the sensitive fingerprint has five attempts to take the picture if there is no finger to return to the beginning. After the fingerprint sensor takes the fingerprint image and processes it then matches it with the fingerprint templates stored in its database, if the fingerprint is pre-stored, the matching process will succeed and the servomotor moves 180 degree, and a sentence on the LCD shows "Open Gate Allowed" as shown in Figure 5(b). If the fingerprint is not stored, the matching process will be displayed and a sentence on the LCD will appear "Finger not found". Figure 5(c) shows the process of storing the fingerprint using the Enroll button, selecting the storage location from 0 to 25 locations. Figure 5(d) shows state of deleting fingerprint and Select the fingerprint location to delete. (a) (b) (c) (d) Figure 5. Lock gate system (a) starting system (b) match (c) enrolling (d) deleting A Lock Gate Systems based Fingerprint with microcontroller are comfortable locking systems that open with just the touch of authorized user’s finger; can increased use in current time, as having features: a) High capacity of the fingerprint library, with ability of change the capacity of used Flash EEPROM b) Acceptable security level c) The system can use to verify persons as well as to store attendance time and date 4. CONCLUSION In the industrial fields, the security aspects are sought in a very large and high degree of importance. Therefore, there are many theoretical and practical researches in this aspect. The most important things obtained in this research are the high accuracy with the high speed of implementation of the requirements such as control of lock performance and regularly. Accurate and high resolution detection of foreign fingerprints with the possibility to program dozens of fingerprints in the same model. Through the practical experience of the designer system can be considered as an industrial model and for several applications such as control of the entry of reservoirs in banks, laboratories and important meeting rooms. The accuracy and feasibility of using the optical sensor have been proven to provide the required fingerprint data with a high degree of accuracy. There is a possibility to develop this system through several things, such as expanding the work to take a picture of the human eye instead of a fingerprint or a picture of the human face to facilitate the process of entry and exit from the gates.
  • 6.  ISSN: 2502-4752 Indonesian J Elec Eng & Comp Sci, Vol. 21, No. 1, January 2021 : 37 - 43 42 REFERENCES [1] F.Tennyson, "Design and Implementation of a Fingerprint Lock System", IOSR Journal of Engineering (IOSRJEN) vol.7, no 4, pp. 13-19. 2017. [2] Adeolu Afolabi, Oke Alice, "On Securing a Door with Finger Print Biometric Technique", Transact ions on Machine Learning and Arti f icial Intel l igence", vol. 2, no. 2, pp. 86-96, 2014. [3] M. Mostafizur R. Komol, A. K. Podder, M. N. Ali, S. M. Ansary, "RFID and Finger Print Based Dual Security System: A Robust Secured Control to Access Through Door Lock Operation", American Journal of Embedded Systems and Applications, vol.6, no.1, pp. 15-22, 2018. [4] V.Nandagopal, V.Maheswari, C.Kannan, "Vehicle Starting System Using Finger Print", International Journal of Pure and Applied Mathematics", vol. 119, no. 18, pp. 1753-1760, 2018. [5] D. R Samuel, E. Dickson, A. B. Aaron, "Design and Implementation of A Microcontroller Based Automatic Door And Vistors", International Journal of Scientific Research And Education, vol. 2, pp 532-552, 2014. [6] R.Sai Charan Reddy, P.Vamsi Krishna, M.Krishna Chaitanya, M.Neeharika, K Prabhakara Rao, "Security System Based on Knock-Pattern Using Arduino and GSM Communication", International Journal of Engineering and Techniques, vol. 4, pp. 154-157, 2018. [7] N. Prince, N. Ezeilo, "Design and Implementation of Microcontroller Based Security Door System (Using Mobile Phone & Computer Set)", Journal of Automation and Control Engineering", vol.1, no. 1, pp. 65-69, 2013. [8] M. Amanullah, "Microcontroller Based Reprogrammable Digital Door Lock Security System by Using Keypad & GSM/CDMA Technology", IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE), vol. 4, no. 6, pp 38-42, 2013. [9] O. Shoewu, O. Olatinwo, "Design and Implementation of a Microcontroller Based Automatic Gate", African Journal of Computing & ICT", vol. 6, no. 1, pp 21-32, 2013. [10] U. James, D. E. Bassey, A. Etim, "Design and Construction of Door Locking Security System using GSM", International Journal of Engineering And Computer Science, vol. 2, no. 7, pp 2235-2257, 2013. [11] Persis, A. Priya, "Design and Implementation of Intelligent Authentication System Based on Fingerprint, TAGA JOURNAL", vol. 14, pp 1978-1983, 2018. [12] J. Han, “Fingerprint Authentication Schemes for Mobile Devices,” International Journal of Electrical and Computer Engineering (IJECE)", vol. 5, no. 3, pp. 579-585, 2015. [13] H. Sun, "Design of Embedded Automated Fingerprint Identification System Based on DSP", Advanced Engineering Forum, vol. 1, pp. 97-101, 2011. [14] S. Kumar, D. Rasaily, M. Mukhia, A. Ashraf, "Biometric Attendance System using Microcontroller", International Journal of Engineering Trends and Technology (IJETT), vol. 32, no. 6, pp. 306-308, 2016. [15] M. García, F. E. Hoyos, J. E. Candelo, " Portable and efficient fingerprint authentication system based on a microcontroller," International Journal of Electrical and Computer Engineering (IJECE),vol. 9, no. 4, pp. 2346-2353, 2019. [16] J.Wan, L. Zhang, "Design of embedded fingerprint identification system based on TMS320C5515", Computer Science and Device System (CSSS), International Conference on 2011. [17] K. Yadar, S. Singh, S. Pujari, P. Mishra, "Fingerprint Based Attendance System Using Microcontroller and LabView", International Journal of Advanced Research in Electrical,Electronics and Instrumentation Engineering, vol. 4, pp. 5111-5121, 2015. [18] Y. I. Al-Mashhadany, “ANFIS-Inverse-Controlled PUMA 560 Workspace Robot with Spherical Wrist”, Elsevier Procedia Engineering journal, pp. 700-709, 2012. [19] Annapurna Mishra, Satchidananda Dehuri, "Real-time online fingerprint image classification using adaptive hybrid techniques," International Journal of Electrical and Computer Engineering (IJECE) vol. 9, no. 5, pp. 4372-4381, 2019. [20] Subba Reddy Borra, G. Jagadeeswar Reddy, E.Sreenivasa Reddy, "An Efficient Fingerprint Identification using Neural Network and BAT Algorithm," International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 2, pp. 1194-1213, April 2018. [21] Y. I. Al-Mashhadany, “Inverse Kinematics Problem (IKP) of 6-DOF Manipulator By Locally Recurrent Neural Networks (LRNNs)”, International Conference on Management and Service Science (MASS 2010), pp. 24-26, Aug, 2010. [22] S. Shinde and V. Bendre, “An Embedded Fingerprint Authentication System," International Conference on Computing Communication Control and Automation, pp. 205-208, 2015. [23] M. Fons, F. Fons, E. Cantó., "Design of an Embedded Fingerprint Matcher System”, IEEE International" Symposium on Consumer Electronics, 2006. [24] O. A. Akinola, A. Abayomi-Alli & R. A. Adeniyi, "Development of a Microcontroller Based Fingerprint Examination Access Control System", African Journal of Computing & ICT Reference Format Afr J. of Comp & ICTs, vol. 8, no. 2, pp. 145-152, 2015. [25] Y. I. Al-Mashhadany, “Modeling and Simulation of Adaptive Neuro-Fuzzy Controller for Chopper-Fed DC Motor Drive”, IEEE Applied Power Electronics Colloquium, Malaysia, pp. 110-115, 18-19 April 2011. [26] Khin San Myint, Chan Mya Mya Nyein," Fingerprint Based Attendance System Using Arduino", International Journal of Scientific and Research Publications, vol. 8, no. 7, pp. 422-426, 2018. [27] M. Martin, K. Štefan, F. Ľubor, “Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Microcontroller Arduino”, TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 16, no. 2, pp. 755-765, 2018.
  • 7. Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752  Real time model of a lock gate system upon fingerprint with microcontroller (Maath Jasem Mahammad) 43 BIOGRAPHIES OF AUTHORS Dr. Maath Jasem Mahammad obtained B.SC. of Electrical Engineering in 1993 from Al- Mustansuria University, Baghdad-Iraq, M.SC. Electro-technical complex and systems of mining-enterprises in 2002 from Irkutsk State Technology University, Russia, Ph.D in 2009 System Analysis, Control and Information Processing (Information and Technical Systems) Kuban State University of Technology, Krasnodar-Russia. He is currently a lecturer at the Department of Electrical Engineering, University of Anbar, Iraq. His research interests include control and automation systems. Assist. Prof. Dr. Yousif Ismail Mohammed Al-Mashhadany is a lecturer in Electrical Engineering Department – College of Engineering (Control Engineering). Senior member IEEE, He received the B.Sc. (1995), M.Sc. (1999), and Ph.D (2010) in Department of Electrical and Electronic Engineering from the Rashid School of Engineering and Science / University of Technology in Baghdad/Iraq. He complete postdoctoral fellow research in electrical engineering - control department at the University of Malaya in Malaysia (UMPEDAC) in 2012. He works since 2004, a lecturer in the Department of Electrical Engineering / Engineering College / University of Anbar. He has many publishing that included three books, two chapters, thirty seven Journals paper most of them (Clarivate, Scopus and international journal), and thirty two conferences paper. Abdukader Mohammed Eyada obtained bachelor degree of Electrical Engineering in 2018 from University of Anbar, Iraq. His work interests in field of secuerity and smart home.