Friday, October 3, 2008

PC baSed fingerprint Locker




PC BASED FINGERPRINT LOCKER

RANDY C. DE CHAVEZ
JOHN DONALD F. GARCIA
ALBERT S. LAYLO
RAY ISMAEL R. MARTINEZ

BACHELOR OF SCIENCE IN COMPUTER ENGINEERING


ADVISER: ENGR. ROZEL A. PUNAY






Abstract

The researchers designed a prototype that provided an easy access to locker and secured the things inside. The prototype was designed to aids the limited locker the faculty members used that equipped with fingerprint biometric technology in accessing the locker. It also promoted the school vision of leading in the development of information technology innovation. It was designed to have administrator for maintaining the system continues operation and managed the enrollment of the users. In terms of components, all was available in local marketplace and the prices were suitable to their functions. The system was a user friendly. The prototype was design to be implemented to AMA Computer College Lucena Campus. In this study entitled “PC-Based Fingerprint Locker” the proponents were able to design a system that would be used for the security and provided an easy access to the lockers of the faculty members. Recommended generator not only a UPS helped a lot in continues operation of the entire system in case of power interruptions and using the PC for alarm system instead of external buzzer also consumed electricity.

Keywords: biometric, fingerprint, locker, system







I. Introduction

Technology indeed has essentially developed and advanced a person’s living condition. People now live in an industrialized civilization where state-of-the-art innovations seem to appear at an increasing rate. The range of such technological breakdown in terms of new products, processes and organizations is so wide. As the saying goes, today’s breakthrough can easily become tomorrow’s history.
In an increasingly digital world, reliable personal authentication has become an important human computer interface activity. National security, e-commerce, and access to computer networks are some examples where establishing a person’s identity is vital. Existing security measures rely on knowledge-based approaches like passwords or token-based approaches such as swipe cards and passports to control access to physical and virtual spaces. Though ubiquitous, such methods are not very secure. Tokens such as badges and access cards may be shared or stolen. Passwords and PIN numbers may be stolen electronically. Furthermore, authorize user and a person having access to the tokens or knowledge is cannot be differentiated. Biometrics has emerged as one of the most convenient, accurate, and cost-effective forms of security.
Biometrics such as fingerprint, face and voiceprint offers means of reliable personal authentication that can address these problems and is gaining citizen and government acceptance. The use of fingerprints as a biometric is both the oldest mode of computer-aided, personal identification and the most prevalent in use today. However, this widespread use of fingerprints has been and still is largely for law enforcement applications.


This chapter contains the brief view of the entire study upon the completion of the design project.

Summary

In this study entitled “PC Based Fingerprint Locker System” the proponents were able to design a system that would be used for the security and provide an easy access for the lockers of the faculty members.

The main problem of the study is to design and develop a prototype that can be used for security, thus the proponents attempted to create solutions.

Specifically, it sought to answer the following.

1. What design prototype will provide easy access to lockers?
2. What design prototype will provide secure storage for personal belongings?


Conclusion

Based from the study conducted and the result obtained from series of testing the researchers concluded that the PC-Based Fingerprint Locker had provide an easy access to the lockers and also provided a secure storage of personal belonging of the faculty members. This study had the capacity of being one of the technologies for securing things in the locker which has primarily disadvantage from other lockers from the basic Padlocks to a fingerprint scanner without using any keys. It has user friendly interface for easy access on the system.

1. The designed Pc –based locker provided an easy access for the user’s by using biometric technology as fingerprint as the main key access.
2. It provided secure storage of personal belongings by installing in the permanent lock and alarms for each cabinet.

Recommendations

For further improvements of the proposed design, the following are recommended:

1. Future researchers should provide a back up power supply which can provide a longer period of voltage or a generator.
2. They should provide other preferences for replacing other system devices to lessen the power consumption of the circuit.
3. They should provide higher specifications of personal computer for faster processing of the database.

Tuesday, September 30, 2008

THE TRANSISTOR-RESISTOR EQUIVALENT CIRCUIT

THE TRANSISTOR-RESISTOR

EQUIVALENT CIRCUIT

EXPERIMENT NO. 1





EXPERIMENT NO. 1

DATE PERFORMED Expt. No. 1: 9/21/2006

DATE SUBMITTED Expt. No. 1: 10/10/2006

THE TRANSISTOR-RESISTOR EQUIVALENT CIRCUIT

OBJECTIVES:

1. to demonstrate the resistor-equivalent of a transistor in an amplifier circuit

2. To observe how the CE amplifier output current and voltage are relate

d to each other.

BACKGROUND INFORMATION:

A review of what happens in a normal DC resistive circuit should help somewhat, before commencing the study of amplifiers. It gives the experimenter a feeling for what he supposed to be looking for.

In this case we are connected of what is going to happen in the output circuit of a transistor amplifier, and so first it will be simulated with resistors. Notice for example the figure shown below. The transistor is in series with a load resistance; therefore, a voltage division will occur as current passes through the load and the transistor.

Ideally, at the correct operating current, the voltage across each of

these resistances should be identical, that is, one half of the supply voltage. As the resistance of the transistor charges with a signal input, the voltage will also change, giving you an output voltage that tracks the input voltage.






MATERIALS REQUIRED:

Power Source: Regulated Power Source

Equipment: DVM, 0-5mA ammeter

Components:

Resistor: - 4.7kΩ

Potentiometer: - 10kΩ

Miscellaneous: protoboard , connecting wires, and long nose pliers.




PROCEDURES:

1. Connect the circuit shown below. Notice that the 10kΩ potentiometer replaced the transistor in Figure 1-1 and will simulate its function.

2. Turn ON the power source and adjust the potentiometer resistance until the current registers 1.0mA. Measure the voltage V1 and record it in Table 1-1

3. Repeat the Measurements each value of current as indicated in Table1-1

4. When the measurements are completed and before turning OFF the power, measure and record the actual supply voltage. Compute and record the voltage across the load for each point in table1-1.

5. Measure the resistance of the load resistance and record it in Table1-1.

Table1-1

I,mA

1.0

1.2

1.4

1.6

1.8

V1

4.4v

2.7v

2.22v

1.9v

0

VRL

3.9v

5.6v

6.1v

6.5v

8.4




CONCLUSIONS:

QUESTIONS:

1. When the circuit was 1.0 mA, was the voltage across the load resistor equal to the voltage across the potentiometer?

2. As the voltage increases across the load resistance, what happens to the voltage across the potentiometer which is simulating the transistor?

3. What should be the collector-to-emitter voltage at the main point of operation (IC=1.0mA) if a transistor was substituted for the potentiometer?

4. If a transistor was substituted for the potentiometer, what should be its resistance at 1.9 mA of circuit current?