Introduction
Introduction
i
people can enter restricted areas. Additionally, this system
offers a high degree of convenience because it eliminates
the need for staff members or employees to carry physical
keys or access cards, which lowers the possibility of theft
or loss. We will explore the design and implementation of
the Automated Door Lock System during this project, taking
into consideration elements like user-friendly interfaces,
software integration, and hardware components that are
specifically suited to the needs of the business office
setting. Our goal is to provide a safe, effective work
environment where everyone’s comfort and safety are given
top priority at the Philippine Countryville College business
office.
ii
STATEMENT OF THE PROBLEM
In a study conducted at Philippine Countryville College,
researchers identified specific issues with traditional
security measures, creates security risks and user
annoyances.
iii
OBJECTIVES
The general objectives of this project is to develop,
implements and evaluate an automated door lock system that
uses fingerprint recognition to manage access.
The following are specific objectives:
Enhancing security: Developing reliable and robust
access control system. The use of fingerprint
recognition ensure that only authorized individuals can
gain access, reducing the risk of unauthorized energy.
Convenience and User-Friendliness: To provide a
seamless and user-friendly experience for individuals
by eliminating the need for traditional keys, users can
simply use their fingerprint for quick and effortless
entry.
Access Control Customization: The system may include
features that allow for flexible access control
customization. By implementing this functionally,
administrators can easily customize and adjust access
permissions based on specific requirements. This allows
for efficient management of access privileges within
the organizations.
Accuracy and Reliability: To develop a system that
accurately identifies and verifies individuals based on
their unique fingerprints.
iv
SCOPE AND LIMITITION
Scope
v
Limitation
vi
CHAPTER II
REVIEW RELATED LITERATURE/SYSTEM
vii
The distinctiveness and consistency of fingerprint
patterns make them a great option for access control, as
demonstrated by research conducted in 2006 by Jain et al.
Delays can be avoided, guaranteeing prompt access to
restricted regions, by saving the fingerprints of authorized
users and comparing them during authentication. Fingerprints
are a unique way to identify yourself because of the flow-
like pattern of ridges on your fingertips that cannot be
altered. The fact that fingerprint scanners are so widely
used in portable electronics like laptops and mobile phones
is more evidence of their acceptance and dependability.
viii
for the phone and system to communicate. Given the growing
popularity of fingerprint ID on smartphones, this security
solution could become very popular and profitable in the
future.
SYNTHESIS
In this section discussed the similarities and differences
between existing smart door lock systems and the proposed
ix
Automated Door Lock System using fingerprint at Philippine
Countryville College Inc.
SIMILARITIES
Fingerprint recognition technology is widely used in both
existing smart door lock systems and the proposed system at
Philippine Countryville College Inc. These systems use the
uniqueness and dependability of fingerprint patterns to
improve security and address flaws seen in traditional lock
and key systems. Existing smart door lock systems make use
of technology such as RFID sensors, Bluetooth modules,
Android apps, and Arduino UNO to improve convenience and
security. The suggested system prioritizes user convenience
while taking into account constraints such as environmental
conditions and user variability, using current literature
methodologies and frameworks to guide its design and
implementation.
DIFFERENCES
The proposed system at Philippine Countryville College
Inc. is designed to cater to the unique environment and
requirements of the college, which differ from the
commercial settings discussed in the Johnson Security
Solutions (2019) case study. Factors such as student access
patterns, campus-specific security concerns, and compliance
with local regulations and institutional policies, including
Philippine data protection laws and educational sector
regulations, must be considered. Future trends and
advancements in biometric technology, as explored by Li and
Wang (2021), should also be taken into account to ensure the
system remains current and adaptable. The operational
context of the college, including peak access times, user
x
roles, and the dynamic nature of an educational institution,
should be considered during the system's design and
implementation.
xi