Académique Documents
Professionnel Documents
Culture Documents
Computer Engineering Dept. Michael Okpara University of Agriculture, Umudike, Abia State Nigeria.
In this present age of digital technology, the concept of a existing technologies with a view to creating our own idea
digital revolution carries the ramifications of paradigm with a view to solving contemporary problems.
device. need a regulator key to reset the lock. The original lock
had four lever tumblers,
Locks are the most widely employed security devices.
They are found on anything to which access must be Another locksmith, American Alfred Charles Hobbs,
controlled, such as vehicles, storage containers, doors, invented the protector lock. Hobbs became famous as the
gates and windows. The security of any property or first man to be able to pick the Chubb detector lock at the
facility relies heavily on locking devices. Locks merely 1851world fair in London (The Great Exhibition), but in
deter or delay entry and should be supplemented with 1947 Charles and his son john increased the number to six.
other protection devices when a proper balance of physical They later invented another device that made it impossible
security is needed. And assessment of all hardware for a lock picker to detect the additional tumbler. In
including door frames and jams, should be included in any 1984 Chubb and Sons Lock & safe Co Ltd became a part
physical security survey. Locking devices vary greatly in of the Racal Electronic group, making the Chubb lock
appearance as well as function and application, as written group one of the largest in its field in the world. Another
in a book by Sandra Kay Miller (1996). company, Williams Holdings, brought Chubb Security in
1997; but sold it on to in 2000 after poor sales figure.
In 1778, English man Robert Barron patented a
completely new kind of lock, the lever tumbler lock, In his book on locks, Allen Palms (1999) stated that, in the
which originally only uses two tumblers along with 15th to 16th century, sacristies were added on Swedish
traditional wards obstructions for key bit. The idea of church on the north side of the building outside the
building tumblers into the lock itself was completely sanctuary. They were built with sturdy stone walls and
revolutionary, and represented the first modern door arched stone or brick ceilings, and the windows are
lock. The Barron lock was manufactured completely by protected by sturdy iron bars. Between the sanctuary and
hand and was pricey for its day. Part of Barron lock was the sacristy was a heavy wooden door with wrought- iron
soon copied and was used and developed by competitors hinges. It often had iron fittings or iron stripes riveted on.
in his country. The door was locked with a wooden block lock, a smith
tumbler lock, or in the 18th century, with a large rot iron
Jeremiah Chubb of Portsmouth, England, invented a rim lock.
detected lock, a type of lever tumbler that instantly
stopped working if the wrong key was used. Only the A time lock is a part of a locking mechanism commonly
original key or a special regular key would activate the found in bank vault and other high- security container.
lock again. Chubb invented the lock in 1818 in response to The lock is a timer designed to prevent the opening of the
a government sponsored context to develop an unpick safe or vault until it reaches zero, even if the correct
able lock. The Chubb lock had a spring loaded bolt combination(s) are known. Most safes or vaults utilize at
which was held in closed position by four oblong least two independent clock mechanism as a fail safe
perforated brass lever tumblers. The tumblers were placed system to guarantee the unlocking of the safe peradventure
one on top of the other and locked on one end with a one of the timers (called movement) fails. Only one needs
to reach zero in order for the safe to be opened. Time
locks can typically be set from 15minutes to 144hours board. The components were soldered on the Vero board
(6days). using soldering lead and soldering iron. After the entire
system had been tested it was packaged in a casing for
Time locks were originally created to prevent criminals
better presentation.
from kidnapping and torturing the person(s) who knows
the combination, and the using the extracted information A type of relay that can handle the high power required to
to later burgle the safe of vault. directly drive an electric motor is called a contactor. Solid-
state relays control power circuits with no moving parts,
There is also the time delay combination lock which will
instead using a semiconductor device to perform
open at anytime with the correct combination, but will not
switching. Relays with calibrated operating characteristics
actually unlock until a set delay period elapses, usually
and sometimes multiple operating coils are used to protect
less than one hour. Modern time locks are electronic but
electrical circuits from overload or faults; in modern
otherwise serve the same function as the old mechanical
electric power systems these functions are performed by
wind- up time lock, however, when the battery dies, the
digital instruments still called protective relays.
time lock unlocks.
When electromagnetic radiation interacts with single
Materials and Methods. atoms and molecules, its behavior also depends on the
amount of energy per quantum (photon) it comes.
This electronic system is designed with an 89C51 of the
8051 microcontroller family. An electromagnetic relay
driven by a transistor static switch is interfaced to the Basic Theory; Electromagnetic Spectrum
microcontroller. Also four light emitting diodes (LEDs),
red, yellow, green and blue serve as a form of indicators The electromagnetic spectrum is the range of all possible
(LED indicator) when the remote is in use, presence of an
frequencies of the electromagnetic radiation. The
RF signal, when the gate is open and closed respectively
and an interfaced soft coding key pad. electromagnetic spectrum of an object is the characteristic
distribution of electromagnetic radiation emitted or
A relay is an electrically operated switch. Many relays use
absorbed by that particular object. The electromagnetic
an electromagnet to operate a switching mechanism
spectrum extends from low frequencies used for modern
mechanically, but other operating principles are also used.
radio to gamma radiation at the short wave-length end,
Relays are used where it is necessary to control a circuit
covering wavelengths from thousands of kilometers down
by a low power signal (with complete electrical isolation
to a fraction of the size of an atom. The long wavelength
between control and controlled circuits), or where several
limit is the size of the universe itself, while it is thought
circuits must be controlled by be signal. The first relays
that the short wavelength limit is in the vicinity of the
were used in long distance telegraph circuits, repeating the
Planck length, In principle the spectrum is infinite and
signal coming in from one circuit and retransmitting it to
continuous.
another. Relays were used extensively in telephone
exchanges and early computers to perform logical Electromagnetic waves are typically described by any of
operations. the following three physical properties: the frequency f,
wavelength, or photon energy E. The frequencies range
The system components were all assembled and placed
from 241023 Hz (1 GeV gamma rays) down to the local
together in modules. They were tested individually and
plasma frequency of the ionized interstellar medium (-1
then placed on a bread board. The system was tested, and
kHz). Wavelength is inversely proportional to the wave
when proved to be working, they were replaced on a Vero
frequency, so gamma rays have very short wavelengths Special Properties of RF Electrical Signals
that are fractions of the size of atoms, whereas
wavelengths can be as long as the universe. Photon energy An electrical current that oscillates at RF has unique
is directly proportional to the wave frequency, so gamma characteristics, one of such property is the ability to ionize
rays have the highest energy and radio waves have very air thus, creating a conductive path through it. This
f0 = 1/2LC .(2)
C?
33F
X?
CRYSTAL
19
18
U?
XTAL1
XTAL2
P0.0/AD0
P0.1/AD1
P0.2/AD2
P0.3/AD3
P0.4/AD4
39
38
37
36
35
34
1
2
3
4
5
8
10
9
CS
RD
WR
C LK IN
INTR
A GND
D GND
VCC
DB0(LSB)
DB1
DB2
DB3
DB4
DB5
20
18
17
16
15
14
13
12
VC?
CAP-PRE
L?
100nH
MsS
P0.5/AD5 VREF/2 DB6
33 19 11
P0.6/AD6 C LK R D B7 (MSB)
9 32
RST P0.7/AD7
6
MCU
ALE P2.4/A12
31 26 1 nF
EA P2.5/A13
27
P2.6/A14
28 1nF
P2.7/A15 D? TR? L? C?
R?
1
P1.0 P3 .0/RXD
10 L? C?
2 11 100 nH 1nF
P1.1 P3.1/TXD 10k
3 12 R? DIODE 10 0nH 1n F
P1.2 P3.2/INT0
4 13 RV? C? C? Q?
P1.3 P3.3/INT1
5 14 10k 2K 1nF 1nF NPN
P1.4 P3.4/T0
6 15 C?
P1.5 P3.5/T1 R?
7
P1.6 P3.6/WR
16 10k C? 1nF
8 17 1 nF R?
P1.7 P3.7/RD 10k
R? C? 1 0k
80C51
Receive input
1nF
R5 10k TRAN-2P2S
R?
R1 R2 R3 R4
2 20 220 220 2 20 10k
R?
R?
10k
10k
from keypad
D1 D2 D3 D4 R?
LED LED L ED LED
10k
RL?
D? 12V
DIODE
Q?
NPN
Is pass -
world Energize
correct?
door
FIG.3, SYSTEMS CIRCUIT DIAGRAM.
YES
Stop
System Software Design Flow Chart
System Tests and Result. To confirm that the initial objectives of the
system are constantly being met.
Each unit was tested individually using a multi-meter.
To deal with unforeseen problems arising from
Some malfunctioned and were replaced with those of
operation.
appropriate values.
To ensure that the system is able to cope with
After assembling each module in the breadboard, a visual
changing requirements of its operational site.
inspection was carried out. Each module was re- tested
before being transferred to the Vero board. The
Suggestions for Further Improvements.
components were then soldered and the Vero board re-
tested. The system can be improved upon by applying some
Artificial Intelligence Techniques to make it a more
The system was re- inspected to ensure that the wired
complex and robust and result oriented system ,
circuit was properly built before powering the system thereby enhancing its capacity to perform the various
(continuity test). After the system was coupled, it was set functions in real-time.
tested using a power source and it worked in accordance
Summary and Conclusion
with the system design objective. That is, the red light
glows to signify power, the yellow light glows when there This project was actualized by the design, construction
is the presence of an Radio Frequency signal, the green and implementation of a microcontroller- based RF remote
light glows when the gate is open, while the blue comes control gate opener with digital code lock. It should be
up when the gate it is locked. noted that the system has been designed in such a way that
it can be modified with respect to change in the future, as