0% found this document useful (0 votes)
12 views50 pages

Black Book Format

The document is a project report on the College Voting Portal submitted by students for their diploma in Computer Engineering. It includes acknowledgments, an index of chapters, and detailed descriptions of the project, including system specifications, design modules, and hardware components used. The project aims to enhance security using RFID and keypad technology for a smart door lock system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views50 pages

Black Book Format

The document is a project report on the College Voting Portal submitted by students for their diploma in Computer Engineering. It includes acknowledgments, an index of chapters, and detailed descriptions of the project, including system specifications, design modules, and hardware components used. The project aims to enhance security using RFID and keypad technology for a smart door lock system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 50

MARATHWADA MITRA MANDAL’S POLYTECHNIC

THERGAON, PUNE 411033


Downloaded by Krishna Panchal
A
PROJECT REPORT
on
College Voting Portal

Submitted by

ANIRUDH SHETTY
SAMARTH BEDARE
DIVYESH VARADE

in partial fulfillment for the award

of

DIPLOMA

in

COMPUTER ENGINEERING

UNDER THE GUIDANCE OF

Mrs. VIKAS SOLANKE


FOR THE ACADEMIC
YEAR
2022- 2023.

Downloaded by Krishna Panchal


MAHARASHTRA STATE
BOARD OF TECHNICAL EDUCATION

CERTIFICATE

This is to certify that,


Mr. Anirudh Shetty Roll No. 200303
Mr. Samarth Narendra Bedare Roll No. 200305
Mr. Divyesh Trayambak Varade Roll No. 200316
of
Sixth Semester
of
Diploma in Computer Engineering
have completed
the Project entitled College Voting Portal satisfactorily for the academic year
2019 to 2020 as prescribed in the curriculum of MSBTE at Marathwada
Mitra Mandal’s Polytechnic, Thergaon, Pune 411033.
Place: Thergaon Enrolment No.: 2009890055
Date: Exam. Seat No.:

Project Guide Head of the Department

External Examiner Principal


M. M. Polytechnic,
Thergaon, Pune,
411033.
Seal of
Institutio
n

Downloaded by Krishna Panchal


ACKNOWLEDGEMENT

Perseverance, Inspiration & Motivation have always played a key role in the
success of any venture.
At this level of understanding it is difficult to understand the wide
spectrum of knowledge without proper guidance and advice, Hence we take
this o to express our sincere gratitude to our respected Project Guide Mr.
Vikas Solanke who as a guide evolved an interest in us to work and select
an entirely new idea for project work. He has been keenly co-operative and
helpful to us in sorting out all the difficulties.
We would also like to thank our Principal Mrs. Geeta Joshi, for their
continuous advice and support.
My deep sense of gratitude to Marathwada MitraMandal’s Polytechnic
for their timely advice and encouragement in our project development.
I would also thank my Institution and my faculty members without
whom this project would have been a distant reality.

ANIRUDH SHETTY
SAMARTH BEDARE
DIVYESH VARADE

Downloaded by Krishna Panchal


INDEX

CHAPTER NO. TITLE PAGE NO.

ABSTRACT

1 INTRODUCTION
1.1 Institutional Profile
1.2 Introduction to the system
1.3 Detailed description of project
1.4 Objective of proposed system
2 ANALYSIS
2.1 Project Management
2.2 System Design
3 REQUIRED ANALYSIS
3.1 Requirement analysis
3.2 Feasibility Study
3.3 Technical Feasibility
3.4 Operational Feasibility
3.5 Economic Feasibility
4 DESIGN PHASE
4.1 Activity Diagram
4.2 Use Case Diagram
4.3 Sequence Diagram
4.4 Deployment Diagram
5 CODING
5.1 Hardware Specification
5.2 Platform
5.3 Programming Language Used
5.4 Software Tools Used
5.5 Coding Style Followed

Downloaded by Krishna Panchal


6 TESTING
6.1 Formal Testing
6.2 Test Plan
6.3 Test Cases and Results
7 SNAPSHOTS
7.1 User Login Page
7.2 Admin Login Page
8 CONCLUSION
9 BIBILIOGRAPHY

Downloaded by Krishna Panchal


ABSTRACT

Security Deals with playing major role in today’s life. Here we have made use of RFID and
keypad technology. The RFID is initially provided the authorized address and the
password is set for the keypad module. If the person is authorized then the RFID passes
the access to the keypad to ensure the second security level and if the person is
unauthorized the RFID goes to the false/ fail state and indicates the unauthenticated
access by buzzer beep. This system can be implemented in places where security is major
requirement like house, bank, offices, etc. In every sector security plays major role and
the aim of this project is to provide the required level of security with low cost. The
implementation of this security system is limited to the automation of the door
automation in home automation. This system is controlled by Arduino At Mega 2560.
The microcontroller detects the output of the RFID, 3X4 Keypad. The response given by
the microcontroller will be controlled by the buzzer.

Downloaded by Krishna Panchal


CHAPTER 1
INTRODUCTION

Radio Frequency Identification (RFID) is an expensive technology which enables


wireless data transmission [1]. This technology is efficient and secure as compared to
others. A smart door lock system is also implemented using RFID reader and keypad for
the user to open the door automatically. When the user put the tag in contact with the
reader the system matches the tag with the initial address stored in the database. The
opening and closing of the door are controlled using keypad when the user provides the
correct password after RFID authentication [2]. In this project we will provide secure
access to the system using RFID technology and keypad. In some cases, the system will
not be best to provide security as, if the card is lost the user will not be able to open the
door and if the tag is with some unauthenticated user and he/ she knows the password as
well then it might pose a threat to the system [1]. Here a buzzer is provided in case of
any unauthorized access to the system to alert the person by giving a long beep. Here we
have used Arduino at mega 2560, Servomotor GE90, RC522 RFID reader, 3X4 Matrix
keypad [3]. The smart system contains password and RFID that authenticates the person
and then unlocks the door. A smart home refers to a special structured automation that
allows the user to remotely access their home and control the access using a single
command. An RFID tag is of a credit card size and can be read by the RFID reader. It has
a 32-bit ID and this ID is a unique number that cannot be changed.

Downloaded by Krishna Panchal


CHAPTER 2
REQUIREMENTS

2.1 REQUIREMENTANALYSIS

In Requirement analysis user requirements are gathered. Software Requirement


Specification (SRS) documents are prepared. Functional requirements are to be
considered. Hardware and software constraints are considered. This page is detailed
appraisal of existing system. This appraisal includes how the module work and what it
does. It also includes finding out in more detail about the system problems and what user
require from new system or any new change in the system. After this phase the analyst
should be familiar with both the details and operations of the module and what else is
required for the system. This output of this phase results the detailed model of the system.
This chapter defines the module functions and data. The phase also contains detailed set
of user requirement and these requirements are used to set objectives for new system.

Downloaded by Krishna Panchal


2.2 COMPONENT REQUIRED

1. Arduino AtMega 2560- The Arduino MEGA 2560 is designed for projects that
require more I/O lines, more sketch memory and more RAM. With 54 digital I/O
pins, 16 analog inputs and a larger space for your sketch it is the recommended
board for 3D printers and robotics projects [4].

Downloaded by Krishna Panchal


2. RFID Reader- The RFID-RC522 module is an RFID reader, which can read
RFID tags in close-range. In order to read an RFID tag, the reader and the tag must have
the same frequency. The RFID-RC522 module reads only High frequency tags at 13.56
MHz [4].

3. 3X4 Keypad- A 4×3 matrix keypad is interfaced to the microcontroller, which is a 12-
key keypad consisting of four rows and three columns [5].

Downloaded by Krishna Panchal


4. Jumper wires- The term "jumper wire" simply refers to a conducting wire that
establishes an electrical connection between two points in a circuit. You can use jumper
wires to modify a circuit or to diagnose problems in a circuit.

5. Servomotor- A servo motor is an electrical device which can push or rotate an object
with great precision. If you want to rotate and object at some specific angles or distance,
then you use servo motor. It is just made up of simple motor which run
through servo mechanism.

Downloaded by Krishna Panchal


6. Buzzer- A buzzer or beeper is an audio signalling device, which may be mechanical,
electromechanical, or piezoelectric (piezo for short). Typical uses of buzzers and beepers
include alarm devices, timers, and confirmation of user input such as a mouse click or
keystroke.

7. Breadboard- The Arduino has multiple power and ground pins that you can connect
to the power rails or other rows on a breadboard. Connecting the Ground (GND) pin from
an Arduino to a row on a mini breadboard.

Downloaded by Krishna Panchal


2.3 VARIOUS TYPES OF MODULE
2.3.1 RFID READER

RFID or Radio Frequency Identification system consists of two main components, a


transponder/tag attached to an object to be identified, and a Transceiver also known as
interrogator/Reader [4].

A Reader consists of a Radio Frequency module and an antenna which generates high
frequency electromagnetic field [6]. On the other hand, the tag is usually a passive
device, meaning it doesn’t contain a battery. Instead it contains a microchip that stores
and processes information, and an antenna to receive and transmit a signal.

To read the information encoded on a tag, it is placed in close proximity to the Reader
(does not need to be within direct line-of-sight of the reader) [7]. A Reader generates an
electromagnetic field which causes electrons to move through the tag’s antenna and
subsequently power the chip.

The powered chip inside the tag then responds by sending its stored information back to
the reader in the form of another radio signal. This is called backscatter [8]. The
backscatter, or change in the electromagnetic/RF wave, is detected and interpreted by the
reader which then sends the data out to a computer or microcontroller.

Downloaded by Krishna Panchal


2.3.2 KEYPAD

This DC 12V 4×3 Matrix 12 keys Membrane Switch Keypad is high-quality soft
touch feeling button keypad with 100 million life-stroke lifespans and good resistance to
environmental conditions [5].

This DC 12V 4×3 Key Matrix Membrane Switch Keypad is a high-quality product at
very low cost for your application needs.

This 12-button keypad provides a useful human interface component for microcontroller
projects. Convenient adhesive backing provides a simple way to mount the keypad in a
variety of applications.

The Keypad 4×3 features a total of 12 buttons in Matrix form. This is a membrane
keypad with no moving parts. A female 7-pin berg connector is required for interfacing it
with your microcontroller circuits [9].

Downloaded by Krishna Panchal


CHAPTER 3

SYSTEM SPECIFICATION

3.1 DESIGN MODULE

The Smart Door Lock system commonly uses RFID and Keypad technology for home
automation process. It provides two-way authentication via using RFID and Keypad. The
system will indicate the presence of unauthorized access to the door and alert the
authorized person.

3.2 HARDWARE

3.2.1 Arduino At Mega 2560:

The Mega 2560 is a microcontroller board based on the ATmega2560. It has 54 digital
input/output pins (of which 15 can be used as PWM outputs), 16 analog inputs, 4 UARTs

Downloaded by Krishna Panchal


(hardware serial ports), a 16 MHz crystal oscillator, a USB connection, a power jack, an
ICSP header, and a reset button [4]. It contains everything needed to support the
microcontroller; simply connect it to a computer with a USB cable or power it with a
AC- to-DC adapter or battery to get started [10]. The Mega 2560 board is compatible
with most shields designed for the Uno and the former boards Duemilanove or Diecimila.
The Mega 2560 is an update to the Arduino Mega, which it replaces. The Arduino Mega
2560 is programmed using the Arduino Software (IDE), our Integrated Development
Environment common to all our boards and running both online and offline.

3.3 ADVANTAGES

• Inexpensive- Arduino boards are relatively inexpensive compared to other


microcontroller platforms [2]. The least expensive version of the Arduino module
can be assembled by hand, and even the pre-assembled Arduino modules cost less
than $50.
• Open source and extensible hardware - The Arduino is based on Atmel's
ATMEGA8 and ATMEGA168 microcontrollers. The plans for the modules are
published under a Creative Commons license, so experienced circuit designers
can make their own version of the module, extending it and improving it. Even
relatively inexperienced users can build the breadboard version of the module in
order to understand how it works and save money [12].
• Open source and extensible software - The Arduino software is published as
open source tools, available for extension by experienced programmers. The
language can be expanded through C++ libraries, and people wanting to
understand the technical details can make the leap from Arduino to the AVR C
programming language on which it's based [14]. Similarly, you can add AVR-C
code directly into your Arduino programs if you want to.
• Cross-platform- The Arduino software runs on Windows, Macintosh OSX, and
Linux operating systems. Most microcontroller systems are limited to Windows
[3].

Downloaded by Krishna Panchal


• Simple, clear programming environment - The Arduino programming
environment is easy-to-use for beginners, yet flexible enough for advanced users
to take advantage of as well [14]. For teachers, it's conveniently based on the
Processing programming environment, so students learning to program in that
environment will be familiar with the look and feel of Arduino.
• Don’t need to external programmer (Burner)
• Programming ease [2].
• Big - lots of I/O for projects that need it
• Memory - if your code simply won't fit in the Uno, you've got much more room
here
• Same/Similar shape/layout - many shields made for the smaller boards will still
work
• Nicely organized - I/O grouped by function

Downloaded by Krishna Panchal


CHAPTER 4

SYSTEM MODELLING

4.1 Activity Diagram


An activity diagram visually presents a series of actions or flow of control in a system similar
to a flowchart or a data flow diagram. Activity diagrams are often used in business
process modeling. They can also describe the steps in a use case
diagram. Activities modeled can be sequential and concurrent.

Fig. 4.1 College Voting Portal Activity diagram

4.2 Use Case Diagram


A UML use case diagram is the primary form of system/software requirements for a
new software program underdeveloped. Use cases specify the expected behavior
(what), and not the exact method of making it happen (how). Use cases once specified

Downloaded by Krishna Panchal


can be denoted both textual and visual representation (i.e. use case diagram). A key
concept of use case modeling is that it helps us design a system from the end user's
perspective. It is an effective technique for communicating system behavior in the
user's terms by specifying all externally visible system behavior.

Fig. 4.2 College Voting Portal Use case diagram

4.3 Class Diagram


In software engineering, a class diagram in the Unified Modeling Language (UML) is a
type of static structure diagram that describes the structure of a system by showing the

Downloaded by Krishna Panchal


system's classes, their attributes, operations (or methods), and the relationships among
objects.

Fig. 4.3 Smart Door Lock System Class diagram

4.4 Sequence Diagram


UML Sequence Diagrams are interaction diagrams that detail how operations are
carried out. They capture the interaction between objects in the context of a

Downloaded by Krishna Panchal


collaboration. Sequence Diagrams are time focus and they show the order of the
interaction visually by using the vertical axis of the diagram to represent time what
messages are sent and when.

Downloaded by Krishna Panchal


Fig. 4.4 College Voting Portal Sequence diagram

4.5 State Diagram


Specifically, a state diagram describes the behavior of a single object in response to a
series of events in a system. Sometimes it's also known as a Harrell state chart or
a state machine diagram. This UML diagram models the dynamic flow of control
from state to state of a particular object within a system.

Downloaded by Krishna Panchal


Fig. 4.5 Smart Door Lock System State diagram

4.6 BLOCK DIAGRAM

A block diagram is a graphical representation of a system – it provides a functional view


of a system. Block diagrams give us a better understanding of a system’s functions and
help create interconnections within it. Block diagrams derive their name from the
rectangular elements found in this type of diagram. They are used to describe hardware

Downloaded by Krishna Panchal


and software systems as well as to represent processes. Block diagrams are described and
defined according to their function and structure as well as their relationship with other
blocks.

Fig. 4.6 Smart Door Lock System block diagram

4.7 FLOWCHART
A flow chart is a graphical or symbolic representation of a process. Each step in the
process is represented by a different symbol and contains a short description of the
process step. The flow chart symbols are linked together with arrows showing the process
flow direction.

Downloaded by Krishna Panchal


Fig. 4.7 Smart Door Lock Flowchart

CHAPTER 5

SOFTWARE AND PROGRAMMING

5.1 PROGRAM STRUCTURE

Downloaded by Krishna Panchal


Software Name: ARDUINO IDE

DESCRIPTION

The Arduino Integrated Development Environment (IDE) is the main text editing program
used for Arduino programming. It is where you’ll be typing up your code before
uploading it to the board you want to program. Arduino code is referred to as sketches.
Arduino programs can be divided in three main parts: Structure, Values (variables and
constants), and Functions. Software structure consist of two main functions −

• Setup( ) function

• Loop( ) function

1) Setup(): - The setup() function is called when a sketch starts. Use it to initialize the
variables, pin modes, start using libraries, etc. The setup function will only run once, after
each power up or reset of the Arduino board.

2) Loop(): - After creating a setup() function, which initializes and sets the initial values,
the loop() function does precisely what its name suggests, and loops consecutively,
allowing your program to change and respond. Use it to actively control the Arduino
board.

5.1.1 PROGRAM CODE

#include <MFRC522.h>
#include <Keypad.h>
#include <Servo.h>
#include <SPI.h>
#define SS_PIN 53

Downloaded by Krishna Panchal


#define RST_PIN 5

Servo sg90;
# define servoPin 9
# define buzzerPin 8
MFRC522 mfrc522(SS_PIN, RST_PIN);
char initial_password[3] = {'8', '6', '8'}; // Variable to store initial password
String tagUID = "37 5F 42 34"; // String to store UID of tag. Change it with your tag's
UID
char password[3]; // Variable to store users password
boolean RFIDMode = true; // boolean to change modes
char key_pressed = 0; // Variable to store incoming keys
uint8_t i = 0;

const byte rows = 4;


const byte columns = 3;

char hexaKeys[rows][columns] =
{
{'1', '2', '3'},
{'4', '5', '6'},
{'7', '8', '9'},
{'*', '0', '#'}
};
bool door = true;

byte row_pins[rows] = {1, 2, 3, 4}; //connect to the row pinouts of the keypad
byte column_pins[columns] = {12, 6, 7};

Keypad keypad_key = Keypad( makeKeymap(hexaKeys), row_pins, column_pins, rows,


columns);

Downloaded by Krishna Panchal


void setup() {
// Arduino Pin configuration
pinMode(buzzerPin, OUTPUT);
sg90.attach(servoPin); //Declare pin 10 for servo
sg90.write(0); // Set initial position at 90 degrees
SPI.begin(); // Init SPI bus
mfrc522.PCD_Init(); // Init MFRC522

void loop() {
// System will first look for mode
if (RFIDMode == true) {

if ( ! mfrc522.PICC_IsNewCardPresent()) {
return;
}
// Select one of the cards
if ( ! mfrc522.PICC_ReadCardSerial()) {
return;
}

String tag = "";


for (byte j = 0; j < mfrc522.uid.size; j++)
{
tag.concat(String(mfrc522.uid.uidByte[j] < 0x10 ? " 0" : " "));
tag.concat(String(mfrc522.uid.uidByte[j], HEX));
}
tag.toUpperCase();
//Checking the card
if (tag.substring(1) == tagUID)

Downloaded by Krishna Panchal


{
// If UID of tag is matched.

digitalWrite(buzzerPin, LOW);
delay(3000);

RFIDMode = false; // Make RFID mode false


}

else
{
// If UID of tag is not matched.

digitalWrite(buzzerPin, HIGH);

delay(3000);
digitalWrite(buzzerPin, LOW);

}
}

if (RFIDMode == false) {
key_pressed = keypad_key.getKey(); // Storing keys
if (key_pressed)
{
password[i++] = key_pressed; // Storing in password variable

}
if (i == 3) // If 6 keys are completed
{
delay(200);

Downloaded by Krishna Panchal


if (!(strncmp(password, initial_password, 3))) // If password is matched
{
//digitalWrite(buzzerPin, LOW);
sg90.write(90); // Door Opened

delay(3000);

sg90.write(0); // Door Closed

i = 0;
RFIDMode = true; // Make RFID mode true
}

else // If password is not matched


{

digitalWrite(buzzerPin, HIGH);

delay(3000);
digitalWrite(buzzerPin, LOW);
i = 0;
RFIDMode = true; // Make RFID mode true
}
}
}
}
CHAPTER 6

SYSTEM DEVELOPMENT AND WORKING

6.1 SYSTEM DEVELOPMENT

Downloaded by Krishna Panchal


In this project, we have introduced a smart security system using RFID and keypad. The
hardware components in this project include RFID reader, tags, keypad, connecting
cables, etc. the RFID reader will retrieve the information from the tag. The reader after
receiving the information sends the information for confirmation. When the tag matches
with the information previously stored in the reader it permits the next level access to the
user. The signal that is received from the RFID is matched with the central control. using
the USB port, the RFID reader is connected to the system. The RFID reader is connected
to the Arduino using 6 pins that are – 3V, GND, MISO, MOSI, RST, SCK and we have
connected the keypad to an Arduino using the digital pins on the board. for servo motor
we have used one digital pin, one GND and one VCC. For buzzer we have used GND
and one digital pin. The working of the system flows from using the RFID reader and
then followed by the password. For condition 1, when the RFID is enabled and the tag
matched is true the buzzer doesn’t beep and quietly asks for the password and if the
password is right then the servomotor rotates and set the door open. For the condition 2,
if the RFID is enabled and the tag is matched the system will ask the user for the
password and if the entered password is wrong the buzzer will beep indicating the
unauthorized access. For the condition 3, if the RFID tag is not matched with the initial
stored information of the tag then the buzzer will beep indicating the unauthorized access
and the system will not request user to enter the password. From keypad module we will
enter a three-digit password and open the door. The advantages of RFID and keypad
based smart door lock system is-
1. Secure home automation
2. Smart locks simplify control on protection
3. Smart door lock offer advantage to the owner of their house who are searching for
better guard to handle their home.

6.2 CIRCUIT WORKING

1. When the user will place the RFID card to the RFID reader then the RC522 RFID
reader will check for the access of the card.
2. If the RFID access is granted then the servo motor will move from its initial
position and open the door if the access is granted.

Downloaded by Krishna Panchal


3. When and unauthorized access is placed over
4. RC522 reader the access to open the door gets blocked.
5. To indicate the access status, we have used LED.
6. Buzzer indicates the status of the authorized access by keeping silent and for
unauthorized access it sounds for a long time.
7. Also, it asks for the password using 3X4 keypad matrix when your RFID gets true
and then opens the servo motor.
8. When your RFID is false it directly comes out of the program letting you know
that the person is unauthorized.

6.3 CIRCUIT DIAGRAM

Fig. 6.2 Smart Door Lock Circuit Diagram

CHAPTER 7

RISK ANALYSIS

What is Risk analysis?

Downloaded by Krishna Panchal


Risk analysis is the process of assessing the likelihood of an adverse
event occurring within the corporate, government, or environmental sector. Risk analysis
is the study of the underlying uncertainty of a given course of action and refers to the
uncertainty of forecasted cash flow streams, the variance of portfolio or stock returns, the
probability of a project's success or failure, and possible future economic states. Risk
analysts often work in tandem with forecasting professionals to minimize future negative
unforeseen effects.

7.1 PERFORMANCE RISK

The biggest risk are they destroy the equipment, not that they get hurt. At least not until
you introduce them to soldering irons.

It would recommend not using lithium ion batteries for power – since they can explode if
shorted. The regular power banks are a source for efficient power supply and aren’t likely
to get explode. The best power supply would be one with an adjustable current limit
which helps avoiding equipment or people.

In the module of RC522 RFID Reader electromagnetic interference (or Noise) from other
RF devices, as well as factory machines or fluorescent lights, can either block waves
from getting to the tag (if they are employing the same frequency) or corrupt
transmission.

7.2 COST RISK

If the application is very low and high margin (like a specialized lab instrument or
machine for a factory), then the disadvantage of the additional unit cost of the Arduino
can be outweighed by the reduction in development time. The Arduino can reduce the
amount of money it takes to get something in production and reduce the risk of having to
commit to the high volumes necessary for low-cost manufacturing.

7.3 PROJECT RISK

Downloaded by Krishna Panchal


Project risk is an uncertain event or condition that, if it occurs, has an effect on at least one
project objective. Risk management focuses on identifying and assessing the risk to the
project to minimize the impact on the project.

Multiple RFID cards would not work on one device but were not recognized on another
device. You have to make sure to have 1 or 2 backup MFRC522. You can figure out why
one device would not read the tags when connected, you can swap it with one of backups
and it will start working. Keep in mind that the device that could not read the card still
works when connected on my breadboard. So maybe there is just too much interference
for that device.

7.4 PREDICTABLE RISK

In this phase of prediction, the RFID reader would read the RFID tag without knowing to the
user when the person comes in the range of the RC522 RFID reader and continue
operating further.

CHAPTER 8

TESTING

8.1 FORMAL TESTING

Software testing is the process of executing a program or application with the intent of
finding the software bugs. It can also be stated as the process of the validity and verifying

Downloaded by Krishna Panchal


the software program or a product. It meets the business and technical requirements that
guided its design development.

A formal technical review is a software quality assurance activity performed by software


engineers. The objectives of FTR are –

1. To uncover the error in function, logic, implementation for representation of the


product.
2. To verify that the product under review meets its requirement.
3. To ensure that the hardware has been represented according to predefined
standards.
4. To achieve project that is developed in uniform manner.
5. To make project more manageable.

The FTR also serves to promote backup and continuity because a member of people
become familiar with the parts that they may not have otherwise seen. The FTR is
actually a set of reviews that includes walkthrough, inspection, etc. Each FTR is
conducted as a meeting and will be successful only if it is properly planned, controlled
and attended. In the section that follow, guideline similar to those for a walkthrough are
presented as a representative formal technical.

8.2 TEST PLAN

The test plan identifies the following: -


1. Items required for testing.
2. Instructions to set up the items that will be used during the test.
3. General description for how to operate the systems under test.
4. Specific actions and events that will take place during the test.

Downloaded by Krishna Panchal


8.3 TESTING

What is Testing?

Testing is the process of evaluating a system or its component(s) with the intent to find
whether it satisfies the specified requirements or not. In simple words, testing is
executing a system in order to identify any gaps, errors, or missing requirements in
contrary to the actual requirements.

8.3.1 HARDWARE/SOFTWARE TESTING

Hardware testing is usually more detailed and thorough than verification. Testing is needed
to ensure that every component of a system is operating as it should, and that the
system is performing exactly in accordance with the specific local requirements.

A comprehensive structured testing program is one that ensures that all aspects of a system
are tested. This is especially important for key systems such as electronic voting systems.
Testing measures that could be followed include:

1. Developing a set of test criteria. Applying 'non-operating' tests to ensure


that equipment can stand up to expected levels of physical handling,
such as transit drop tests.
2. Examining if appropriate any code 'hard wired' in hardware (this code is
sometimes known as firmware) to ensure its logical correctness and to
ensure that appropriate standards are followed.
3. Applying functional tests to determine whether the test criteria have
been met. Applying qualitative assessments to determine whether the
test criteria have been met.

Downloaded by Krishna Panchal


4. Conducting tests in both 'laboratory' conditions and in a variety of 'real
life' conditions.
5. Conducting tests over an extended period of time, to ensure systems can
perform consistently.
6. Conducting 'load tests', simulating as closely as possible a variety of
'real life' conditions and using or exceeding the amounts of data that
could be expected in an actual situation.
7. Verifying that 'what goes in' is 'what comes out', by entering known
data and checking that the output agrees with the input.

Fig. 8.1 Types of Hardware Testing

Downloaded by Krishna Panchal


8.4 TESTCASES

A TEST CASE is a set of conditions or variables under which a tester will determine
whether a system under test satisfies requirements or works correctly. The process
of developing test cases can also help find problems in the requirements or design of
an application.

Following are testcases for Smart Door Lock using RFID and Keypad Technology:

TC Testcase Pre- Steps Input Actual Expected


No Objectiv requisite Result Result
. e

1 To verify System 1. 37 5F 42 RFID true RFID true


access should Scan 34 and ask for and ask for
be on. your password. password.
RFID
Reader

2 To verify System 1. 868 Password Password


access should Enter true. true.
be on. valid
passw

Downloaded by Krishna Panchal


ord.

3 To verify System 1. Tag- 37 Open door. Open door.


access should Scan 5F 42 34
be on. your
Password
RFID
- 868
Reader

2.
Enter
valid
passw
ord.

4 To verify System 1. Tag- 37 Access Access


access should Scan 5F 42 34 Denied Denied
be on. your
Password
RFID
- 123
Reader

2.
Enter
invalid
passw
ord.

5 To verify System 1. 19 D9 67 Access Access


access should Scan 89 Denied Denied
be on. your
invalid
RFID

Downloaded by Krishna Panchal


tag.

CHAPTER 9

SNAPSHOTS

Downloaded by Krishna Panchal


Downloaded by Krishna Panchal
Downloaded by Krishna Panchal
Downloaded by Krishna Panchal
Downloaded by Krishna Panchal
CHAPTER 10

CONCLUSION

10.1 SUMMARY OF THE LITERATURE

General purpose door locks using key have an issue of security and many more
general-purpose locks like these may face a problem dealing with security. Thus, two
steps verification locks get much more popular. So, it’s a need to replace the old system
with new and advance systems. Smart Door Lock will deal with providing more safe lock
to the door and minimize the security issue. It is very easy to use and its implementation
is also easy. The user can always have a concern with the system and feel safe. Incase of
loosing the first step verification card the user doesn’t have to worry about security as the
password level protection will not be asked and to open your door you will have to create
a new card and grant the permissions to it. So, this door lock will prove to provide more
security than any other general-purpose locks.

10.2 FUTURE WORK

Currently, the system is developed for providing two step authentications. As this
is starting of this kind of initiative, majority of uses, “Security” is considered as first
choice. For the future development of this project we will maintain a universal keypad for
ease of use to the user as in this system if you lose your RFID permission granted card
you will not be able to open your door. By using the Universal keypad technology in this
system, we will add a password through which you can open your door by entering that
password and you will not require your card. We can add more functionality to the door
lock like using GSM module to inform the user about the security status. The user can
open and close the door by giving command “open” and “close” using their android
device. Universal keypad module can be implemented in the existing system.

Downloaded by Krishna Panchal


CHAPTER 11

SCOPE

1. The scope of this project is it can be implemented on actual implementation for


using.
2. The two-step verification can be implemented with low cost and provide a
verified and tested security.
3. This project can be used in home, industries, factories, etc. and can be
implemented easily. This is used in home automation to advance your security
system.

Downloaded by Krishna Panchal


CHAPTER 12

BIBILIOGRAPHY

[1] Aman Pathak1, Utakarsh Sundaram2, Smart Locking System for Homes, International
Science Press, 2016.
[2] Dhrubajyoti Adak1, Manoj Kumar Pain2, Uttam Kumar Dey3, RFID BASED
SECURITY SYSTEM USING ARDUINO MODULE, International Journal of
Scientific and Engineering Research, Volume 8, Issue 3, March-2017.
[3] Lia Kamelia, Mufid Ridlo Effendi, Integrated Smart Housr Security System Using
Sensors and RFID, IEEE 2018
[4] Karabi Deka, Raktim Jyoti Gogoi, Design a RFID Technology Based Door Security
System Using GSM Module, International Journal of Advaced Research in
Electrical, Electronics and Instrumental Engineering, Vol.6, July 2017.
[5] Md.Makasudur Rahman, Dr.Mohammed Sowket Ali, Password Protected Electronic
Lock System for Smart Home Security, International Journal of Engineering
Research & Technology, Vol.7,April 2018.
[6] Gyanendra K Verm, Pawan Tripathi, A Digital Security System with Door Lock
System Using RFID Technology, International Journal of Computer Applications,
Vol.5, August 2010.
[7] Janaki Venukumar1, Naveen.S2, Arduino Based Door Access Control, International
Journal of Research in Advent Technology, Vol.4, August 2018
[8] S.Umbarkar, G. Rajput, S. Halder, P. Harname and S. Mendgudle,
Keypad/Bluetooth/GSM Based Digital Door Lock Security System, International
Journal, Vol.137, July 2018

[9] Ni Ni San Hlaing | San San Lwin, Electronic Door Lock using RFID and
Password Based on Arduino IJTSRD, International Journal of Trend in Scientific
Research and Development, Vol.3, April 2019

[10] 1Lecturer, Department of Electronic Engineering, 2Lecturer, Department of


Information Technology, 1,2Technological University Kyaukse, Myanmar, Door Lock
using RFID and Password Based on Arduino, International Journal of Trend in
Scientific Research and Development, Vol.3, March 2019

Downloaded by Krishna Panchal


[11] Adarsh V Patil, Android Based Smart Door Locking System, International
Journal of Engineering Research & Technology, Vol.6, Issue-2018

[12] Panguluri Srinivasa Rao, Mohammed Ali Hussain, Ch.Sriharika ,Automatic Door
Unlock System Using IOTand RFID, International Journal of Innovative Technology
and Exploring Engineering, Vol.8, March 2019

[13] Orji EZ*, Oleka CV, Nduanya UI, Automatic Access Control System using
Arduino and RFID, Journal of Scientific and Engineering Research, Vol.5, Issue
2018

[14] Yong Tae Park Pranesh Sthapit Jae-Young Pyun, Smart digital door lock for
the home automation, Journal of Scientific and Engineering Research, Vol.6, Issue
2019

[15] Kalaimagal.R,Gowri Shankar.S, Abdhul Asif.N.S ,IOT Based Smart Door Locks,
National Conference on Innovative Research Trends in Computer Science and
Technology, Vol.4, Issue 2018

[16] Door Lock System with Arduino, International Conference on Innovations in


Information and Communication Technology (ICIICT), June 2019

[17] Panguluri Srinivasa Rao, Mohammed Ali Hussain, Ch.Sriharika ,Automatic Door
Unlock System Using IOT and RFID, International Journal of Innovative
Technology and Exploring Engineering, Vol.8, March 2019

[18] Dr. Manish Kumar1, Dr. M Hanumanthappa2, Dr. T V Suresh Kumar3, Mr. Amit
Kumar Ojha4, Android Based Smart Door Locking System with Multi User and
Multi Level Functionalities, International Journal of Advanced Research in
Computer and Communication Engineering, Vol.5, October 2018

[19] Karan Khar, Electronic Door Lock using RFID, Journal Of Information,
Knowledge And Research In Electronics And Communication Engineering, Vol.4,
October 2019

Downloaded by Krishna Panchal


[20] Dhrubajyoti Adak1, Manoj Kumar Pain2, Uttam Kumar Dey3, RFID Based
Automatic Door System, International Journal of Scientific & Engineering Research,
Vol.8, March 2018

[21] Pradnya Joshi, Shivani Mane, RFID Based Security System using Arduino
module, Conference paper, March 2019

Downloaded by Krishna Panchal

You might also like