• Tidak ada hasil yang ditemukan

CHAPTER 1 INTRODUCTION Background

N/A
N/A
Protected

Academic year: 2024

Membagikan "CHAPTER 1 INTRODUCTION Background"

Copied!
2
0
0

Teks penuh

(1)

2

CHAPTER 1 INTRODUCTION

Background

At this time the security of the house is still using a manual locking system that is by using a conventional key. The use of conventional keys is less practical these days. The use of conventional keys is also easy for thieves to open because the way thieves steal is increasingly opening the door of the house. With the development of current microcontroller technology, the security system can be carried out using electronic devices as a substitute for conventional key security systems. RFID is a system that can send and receive data by utilizing radio waves, consisting of 2 parts, namely: tag and reader.

Here is also added a camera module so that we can know who will enter. with the Decision Tree algorithm will make it easier to classify data.

Based on the explanation of the description that has been explained, the author aims to conduct a study entitled "KEY SYSTEMS USING SMARTPHONE CARD AND PHONE".

Problem Formulation

Based on the background that has been described, the formulation of the problem to complete this final project is as follows:

1. How to connect Nodemcu with Relay for switch Solenoid?

2. How to implement rule-based Decision Tree logic on a security system using Nodemcu?

3. How does Tasmota work in this Lock System.

(2)

3 Scope

Based on the formulation of the problem that has been described, there are several limitations to the problem of building a system, including the following:

1. The Microcontroller used is Nodemcu.

2. RFID Tag to read a card.

3. Relay to switch on off Solenoid.

4. Solenoid functions as an electronic lock the Solenoid valve will be attracted if there is a voltage and vice versa.

5. Esp 32 Cam works to see who will enter.

Objective

To make it easier for users if the Card is missing, this Door can be Opened using a Smartphone, and vice versa if the Smartphone is left behind, it can be opened using a Card.

And I added an alternative this Door can be opened using a code on the RFID.

Referensi

Dokumen terkait

Through this study, a researcher can provide information to English teachers with students with disabilities learning grammar by implementing gamification into learning to be more

The first thing that can be done is to analyze what students need and what students have in learning to teach language, so that it is in accordance with the analysis

The results of this study hopefully useful for other writers, and can be used a reference in teaching English especially in learning short functional text

Benefits for students With the Peraktek Work program, it is hoped that it can be a good opportunity for Bengkalis State Polytechnic students to be able to apply the knowledge that can

So, with those features teachers and students can be easier to conduct the learning and teaching process using the Zoom platform, that’s why it is so important implementing the online

We finally demonstrate how these multiaxial damping formulas can be used for finite element computation of modal damping ratios of arbitrary solid objects using both solid and shell

In the past decade, neurite outgrowth and neuroprotection becoming a popular research topic because it can be a promising alternative treatment for people with damaged or impaired

Based on the research done, at times something that seems to be trivial symptoms can lead to major issues, such as diabetes, bulimia, oral cancer, or kidney failure.. It has to be made