Cloud base security office a utomation [600878]

1 | P a g e

Cloud base security & office a utomation
(CSOA)

Submitted By

Syed Hassan Ali Student: [anonimizat]25583
Muhammad Fahad Khan Student: [anonimizat]25682
Muhammad Hassan Khalid Student: [anonimizat]25691
Rija Khan Student: [anonimizat]25542

Under the Supervision of
Mr. Muhammad Ali

Bachelors of Science
In
(Computer Science) & (Software Engineering)
Institute of Business & Technology, Karachi

2 | P a g e

Institute of Business & Technology (IBT), Karachi

Certificate

This is to certify that Syed Hassan Ali (ID No. BB -25583), Muhammad Fahad Khan
(ID No. BB -25682), Muhamma d Hassan Khalid (ID No. BB -25691 ), and Rija Khan
(ID No. BB -25542) have been completed their final year project successfully.
Title “Cloud Based Security System ”.

The Project is submitted to the IS committee of the Institute of Business & Technology, Karachi,
Pakistan for evaluation.

Mr. Muhammad Ali Mr. Mahmood Naqvi
Project Supervisor Dean Faculty of Computer Sciences&
Information Technology

3 | P a g e

Acknowledgement

Firstly, we are thankful to Allah Almighty , the most gracious and merciful. Who
gives us courage and ability for the success in the comp letion this project .
The work would be never being accomplished wit hout the keen interest,
attention, and full co-operation of Mr. Muhammad Ali , supervisor ; we
appreciate his skillful guidance and helpful attitude . We always found him
agreeable, sympathetic, and friendly in his dealing that always encouraged and
enabled us to achieve this overwhelming task. We, from the core of our heart
extend thanks to him.

We are also thankful to Mr. Adnan Alam , and Mr. Ziauddian the Faculty of
Computer Science program fo r providing us useful guiding tips throughout
project work .

Finally we would like to acknowledge efforts of all other individuals, who
helped us during questionnaire survey part of the project .

4 | P a g e

Work Breakdown Structure

Sr. Task Assigned Due Task Completed (S) Date
(S)/Sign
.
1 Research on project 4-oct-15 Research on project 3-oct-15
2 Market Survey 7-cot-15 Market Survey 7-cot-15
3 Questioner Survey 10-oct-15 Questioner Survey 10-oct-
15
4 Report 15-dec-15 Report 16-dec-
15
5 Hardware 25-nov-15 Hardware 25-nov-
15
6 Software 30-nov-15 Software 29-nov-
15
7 Statistically Analysis 4-dec-15 Statistically Analysis 4-dec-15
8 Testing 6-dec-15 Testing 7-dec-15
9 Final Editing in Report 15-dec-15 Final Editing in Report 14-dec-
15
10 Final Presentation 18-dec-15 Final Presentation 18-dec-
15

5 | P a g e

Abstract

This report describes the Cloud based Security and automation system which let the user to
manage the Office from by empowering them to control electronic devices in the office by an
Android application or through a web site is presented. This projects sho ws that how a
microcontroller can automatically control the security system and the electrical household
appliances.
The proposed system consists of three main components: a device control using a
microcontroller to transfer signals to appliances (Arduino ), a cloud server, which manages and
controls the data and information of door access and the status of appliances which stores in a
database on the server, and a running Android application. This paper put forwards the design
of office automation and secu rity system using Arduino board. We develop an authentication to
the system for authorized person to access the office through.
Cloud computing has the potential to provide easy access to home/office automation for the
user by providing easy to use online services. This paper aims to implement the web services
through cloud which is basically need for security and availability of the data. The paper
presents the outcomes of a survey carried out regarding the properties of this system, and also
the evaluatio n results of the experimental tests conducted with volunteers on running prototype.

6 | P a g e

Table of Contents

A c k n ow l e d ge m e nt ………………………….. ………………………….. ………………………….. ……………………….. 3
Abstract ………………………….. ………………………….. ………………………….. ………………………….. ……………… 4
Table of Contents ………………………….. ………………………….. ………………………….. ……………………….. 6
LIST OF TABLES ………………………….. ………………………….. ………………………….. ………………………….. ….. 9
LIST OF F I G U R E S ………………………….. ………………………….. ………………………….. ………………………….. ……. 10
Chapter 1 ………………………….. ………………………….. ………………………….. ………………………….. …………. 11
1.1 Introduction ………………………….. ………………………….. ………………………….. ……………………. 11
Arduino Uno – R3 ………………………….. ………………………….. ………………………….. ……………………….. 11
1.2 ARDUIN O MAGA MICROCONTROLLER ………………………….. ………………………….. …….. 12
1.2.1 What is Microcontroller ………………………….. ………………………….. ………………………….. …….. 12
1.2.2 Arduino ………………………….. ………………………….. ………………………….. ………………………….. … 12
1.2.3 Arduino Maga 2560 ………………………….. ………………………….. ………………………….. ………………. 14
Ardu ino Mega 2560 ………………………….. ………………………….. ………………………….. ……………………. 14
Technical specs: ………………………….. ………………………….. ………………………….. …………………………. 15
Programming: ………………………….. ………………………….. ………………………….. ………………………….. . 15
Power: ………………………….. ………………………….. ………………………….. ………………………….. ………….. 16
Memory: ………………………….. ………………………….. ………………………….. ………………………….. ………. 16
Communication: ………………………….. ………………………….. ………………………….. ………………………… 17
Physical Characteristics and Shield Compatibility: ………………………….. ………………………….. …. 17
1.2.4 Arduino Ethernet Shield: ………………………….. ………………………….. ………………………….. ………. 18
Overview: ………………………….. ………………………….. ………………………….. ………………………….. ……… 18
Description: ………………………….. ………………………….. ………………………….. ………………………….. ….. 19
1.2.5 Arduino RF ID module: ………………………….. ………………………….. ………………………….. …………. 21
Features: ………………………….. ………………………….. ………………………….. ………………………….. ………. 22
Key Specification: ………………………….. ………………………….. ………………………….. ……………………… 22
1.2.5 Arduino RFID module: ………………………….. ………………………….. ………………………….. …………. 23
Specification: ………………………….. ………………………….. ………………………….. ………………………….. … 23
Features: ………………………….. ………………………….. ………………………….. ………………………….. ………. 24
Chapter 2 ………………………….. ………………………….. ………………………….. ………………………….. …………. 25

7 | P a g e

2.1 Background ………………………….. ………………………….. ………………………….. ………………………….. … 25
2.1.1 Purpose ………………………….. ………………………….. ………………………….. ………………………….. .. 25
2.1.2 Scope ………………………….. ………………………….. ………………………….. ………………………….. ……. 25
2.1.3 Glossary ………………………….. ………………………….. ………………………….. ………………………….. . 25
2.1.1 Problem Definition ………………………….. ………………………….. ………………………….. ……… 26
2.1.2 Security Purpose ………………………….. ………………………….. ………………………….. ……………… 26
2.1.1.1 Management Roll ………………………….. ………………………….. ………………………….. ………. 26
2.1.1.2 Monitoring Activity ………………………….. ………………………….. ………………………….. ……. 26
2.1.2 Application related objectives ………………………….. ………………………….. …………………….. 26
2.1.2.1 Data must be secure ………………………….. ………………………….. ………………………….. ……. 26
2.1.2.2 User friendly ………………………….. ………………………….. ………………………….. ………………….. 26
2.1.2.3 Data organize ………………………….. ………………………….. ………………………….. ……………… 26
2.1.2.4 Care of abnormal and normal date ………………………….. ………………………….. …………. 26
2.1.2.5 General Business Related Objectives ………………………….. ………………………….. …………. 27
2.1.2.6 To make the system fast, efficient and time conserving ………………………….. ……………. 27
2.1.2.7 To increase owner satisfaction ………………………….. ………………………….. …………………. 27
2.1.2.8 To Increase Profits ………………………….. ………………………….. ………………………….. ……… 27
2.1.2.9 To make it Dependable ………………………….. ………………………….. ………………………….. .. 27
2.2 Motivation ………………………….. ………………………….. ………………………….. ………………….. 27
2.2.1 Intended Audience ………………………….. ………………………….. ………………………….. …………….. 27
Chap ter 3 ………………………….. ………………………….. ………………………….. ………………………….. …………. 28
3.1 Literature Review ………………………….. ………………………….. ………………………….. ……………………. 28
3.1.1 Plan of Action ………………………….. ………………………….. ………………………….. …………………… 28
3.2.1 Ti me Boxing with Gantt chart ………………………….. ………………………….. ………………………. 22
3.1.3 System Requirement ………………………….. ………………………….. ………………………….. …………. 23
3.1.1.1 Minimum Hardware Requirement ………………………….. ………………………….. ………….. 23
3.1.1.2 Minimum Software Requirement ………………………….. ………………………….. ……………. 23
3.1.1.3 Recommend Hardware Requirement ………………………….. ………………………….. …………… 24
3.1.1.4 Recommend Software Requirement ………………………….. ………………………….. …………… 24
3.1.4 Requirement Specification ………………………….. ………………………….. ………………………….. . 24
Chapter 4 ………………………….. ………………………….. ………………………….. ………………………….. …………. 25
4.1 Methodology of Solution ………………………….. ………………………….. ………………………….. ………. 25
4.1.1 Software ………………………….. ………………………….. ………………………….. …………………………. 25

8 | P a g e

4.1.1.1 Main Screens ………………………….. ………………………….. ………………………….. …………………. 25
Video Streaming: ………………………….. ………………………….. ………………………….. ………………………. 30
4.1.2Hardwar e ………………………….. ………………………….. ………………………….. ………………………….. . 31
RFID (Radio Frequency Identification Card): ………………………….. ………………………….. ………… 31
Code of Motor Driver with Arduino ………………………….. ………………………….. ……………………….. 39
Relay Module: ………………………….. ………………………….. ………………………….. ………………………….. . 40
Code of Relay Module with Arduino: ………………………….. ………………………….. ……………………… 41
Ethernet Shield: ………………………….. ………………………….. ………………………….. ………………………… 48
We used Ethernet shield to connect with the internet. ………………………….. ………………………….. …… 48
Code of Ethernet Shield ………………………….. ………………………….. ………………………….. ……………… 49
Complete Arduino code with detail ………………………….. ………………………….. …………………………. 53
Chapter 5 ………………………….. ………………………….. ………………………….. ………………………….. …………. 70
5.1 Results & Discussion ………………………….. ………………………….. ………………………….. ……………….. 70
5.1.1 ANALY SIS AND INTERP RETATION OF DATA: ………………………….. …… 78
5.1.2 CHI -SQUARE METHOD: ………………………….. ………………………….. ………………………….. … 78
5.1.3 FORMULA OF CHI -SQUARE: ………………………….. ………………………….. …………………….. 78
Analysis: ………………………….. ………………………….. ………………………….. ………………………….. …… 79
Chapter 6 ………………………….. ………………………….. ………………………….. ………………………….. …………. 86
6.1 Findings: ………………………….. ………………………….. ………………………….. ………………………….. …. 86
6.2 Conclusion: ………………………….. ………………………….. ………………………….. ………………………….. 87
Chapter 7 ………………………….. ………………………….. ………………………….. ………………………….. …………. 88
7.1 Future Work / Recommendation (if any) ………………………….. ………………………….. ………………. 88
Chapter 8 ………………………….. ………………………….. ………………………….. ………………………….. …………. 89
8.1 Appendix ………………………….. ………………………….. ………………………….. ………………………….. …. 89
8.2 Questioner ………………………….. ………………………….. ………………………….. ………………………….. .. 90
Final Snapshots of Project ………………………….. ………………………….. ………………………….. …………….. 91

9 | P a g e

LIST OF TABLES

Table 1: Analysis ………………………….. ………………………….. ………………………….. ………………………….. …………………… 28
Table 2: Design ………………………….. ………………………….. ………………………….. ………………………….. …………………….. 29
Table 3: Coding and Implementation ………………………….. ………………………….. ………………………….. …………………… 30
Table 4: Testing ………………………….. ………………………….. ………………………….. ………………………….. ……………………. 31
Table 5: Documentation system evaluation development ………………………….. ………………………….. …………………… 21
Table 6: Timing Box ………………………….. ………………………….. ………………………….. ………………………….. ………………. 22
Table 7: Minimum Hard ware Requirement Android ………………………….. ………………………….. ………………………….. 23
Table 8: Minimum Hardware Requirement for Computer ………………………….. ………………………….. …………………… 23
Table 9: Minimum Software Requirement for Software ………………………….. ………………………….. ……………………… 23
Table 10: Minimum Software Requirement for computer ………………………….. ………………………….. …………………… 23
Table 11: Recommend Hardware Requirement for Android ………………………….. ………………………….. ………………… 24
Table 12: Recommend Hardware Requirement for Computer ………………………….. ………………………….. ……………… 24
Table 13: Recommend Software Requirement for Android ………………………….. ………………………….. ………………….. 24
Table 14: Recommend Software Requirement for Computer ………………………….. ………………………….. ………………. 24

10 | P a g e

LIST OF F IG U RE S

Figure 1: Arduino Uno R3 ………………………….. ………………………….. ………………………….. ………………………….. ………. 12
Figure 2: Arduino Mega 2560 ………………………….. ………………………….. ………………………….. ………………………….. …. 14
Figure 3: Arduino Ethernet Shield ………………………….. ………………………….. ………………………….. ……………………….. 18
Figure 4: Arduino Ethernet Shield ………………………….. ………………………….. ………………………….. ……………………….. 20
Figure 5: RFID Module ………………………….. ………………………….. ………………………….. ………………………….. …………… 21
Figure 6: RFID Tags ………………………….. ………………………….. ………………………….. ………………………….. ……………….. 21
Figure 7: RFID working diagram ………………………….. ………………………….. ………………………….. ………………………….. 22
Figure 8: Arduino RFID Module ………………………….. ………………………….. ………………………….. ………………………….. . 23
Figure 9: Main Web Page ………………………….. ………………………….. ………………………….. ………………………….. ………. 25
Figure 10: Index Page ………………………….. ………………………….. ………………………….. ………………………….. ……………. 26
Figure 11: Remaining Index Page ………………………….. ………………………….. ………………………….. ………………………… 27
Figure 12: Complete Index Page ………………………….. ………………………….. ………………………….. ………………………….. 28
Figure 13: Logs ………………………….. ………………………….. ………………………….. ………………………….. …………………….. 29
Figure 14: Arduino Detail Diagram ………………………….. ………………………….. ………………………….. ……………………… 31
Figure 15: Arduino Mega ………………………….. ………………………….. ………………………….. ………………………….. ………. 32
Figure 16: Arduino Motor Driver ………………………….. ………………………….. ………………………….. …………………………. 33
Figure 17: RFID We Use ………………………….. ………………………….. ………………………….. ………………………….. …………. 33
Figure 18: Motor Driver Module ………………………….. ………………………….. ………………………….. …………………………. 34
Figure 19: RFID to Motor driver Schematic ………………………….. ………………………….. ………………………….. …………… 34
Figure 20: RFID cards ………………………….. ………………………….. ………………………….. ………………………….. ……………. 35
Figure 21: Breadboard with LED and Pizo Buzzer ………………………….. ………………………….. ………………………….. ….. 35
Figure 22: Arduino 4 Relay Module ………………………….. ………………………….. ………………………….. ……………………… 40
Figure 23: RFID Module ………………………….. ………………………….. ………………………….. ………………………….. …………. 40
Figure 24: Arduino Etherne t Shield ………………………….. ………………………….. ………………………….. ……………………… 48
Figure 25: Ethernet Shield ………………………….. ………………………….. ………………………….. ………………………….. ……… 48
Figure 26: Complete project ………………………….. ………………………….. ………………………….. ………………………….. …… 52
Figure 27: Login page ………………………….. ………………………….. ………………………….. ………………………….. ……………. 91
Figure 28: Live Streaming with cloud switch ………………………….. ………………………….. ………………………….. …………. 92
Figure 29: Main Page ………………………….. ………………………….. ………………………….. ………………………….. ……………. 92
Figure 30: Database ………………………….. ………………………….. ………………………….. ………………………….. ……………… 92
Figure 31: Live Streaming ………………………….. ………………………….. ………………………….. ………………………….. ………. 92

11 | P a g e

Chapter 1

1.1 Introduction

The concept of home/office automation has been around for a long time. Office automation may include
centralized control of lighting, intelligent network of electronic devices, appliances, and other systems,
to provide comfort, energy efficiency, and security . [2] Design ed to monitor and control the appliances
and lighting [3] system . It allows user to remotely control electronics through the external network such
as Internet. This can be achieved by local network or by remote control. Several technologies are used to
implement an office automation concept to solve office automation issues by different short range
communication technologies.
Our system will provide proper notifications to users for such activities and alert them via sending
notification on the android appl ication. It also provides a remote interface to lighting and other
appliances, via internet, to provide control and monitoring through android application or web browser.
Smart Office and cloud security system has various benefits such as providing comfor t, safety and
security. Such system will be affordable, portable and scalable so that new devices can be easily
integrated in to systems.
This report will describe the approach which we are implementing to control various appliances and
Security with Andro id. [4]
This project Cloud Security Office and Automation System is made for the security of an office. This
project is for viewing the employee who enter the office, notified the detail, and control the lighting
from web browser or android application.
In This project we are going to see how to build an Office automation with cloud security system with
Arduino Uno which based on RFID system for automatic entry through a door. To build an office
automation security system to prevent the other persons to e nter into the office by checking a suitable
RFID card. When the RFID card is swap if valid RFID card is detected by the system door opened and
closed after some delay and we will get the information on the application with time and date that when
the door is opened. Once the door is open the lights of that employee room will ON. If no one is present
in the room all lights turned OFF. This can be monitor through video streaming and control the lighting
from web browser or android application. A alarm is set which will automatically turn on after the office
timing for example: Office open in morning at 9am and closes at 9pm the alarm will activated after 9pm
till 9am if any unauthorized person tries to enter the office the alarm will start ringing and also not ified
on the android app. The component used are as follow.
 Arduino Uno – R3
 Arduino Ethernet shield
 RFID kit
 Relay module (4output/switch)
 Breadboard
 Jumper wires
 Adaptor (12V)
 Usb data cable
 Camera
 Buzzer
 SD card

12 | P a g e

1.2 ARDUINO MAGA MICROCONTROLLER
1.2.1 What is Microcontroller

A microcontroller is a computer present in a single integrated circuit which is
dedicated to perform one task and execute one specific application. It contains
memory, programmable input/output peripherals also a processor.
Microcontrollers are used in automatically controlled products and devices, such
as automobile engine control systems, remote controls, office machines,
appliances, power tools and toys. [5]

1.2.2 Arduino
The Arduino is a single -board microcontroller that was introduced in 2005.
Arduino is an open source computing platform based on a simple input/output
board and a development environment that implements the Processing Language.
The Arduino board we use in our project is the Arduino Uno (R3 ) [6]. The Uno is
one of the more popular boards in the Arduino family and a great choice for
beginners [7] having an ATMega328P Microcontroller on board that comes with
32KB flash memory and 2KB SRAM.2KB of the flash memory is consumed by
the Arduino Boot loader . It has a n 8-bit CPU and 14 digital input/output pins, 6
Analog I/O pins and a USB connection and a reset button . [6]
"Uno" means one in Italian and is named to mark the upcoming release of
Arduino 1.0. The Uno and version 1.0 will be the reference versions of Ardu ino,
moving forward. The Uno is the latest in a series of USB Arduino boards, and the
reference model for the Arduino platform; for a comparison with previous
versions . [8]
It contains everything needed to support the microcontroller; simply connect it to
a computer with a USB cable or power it with an AC -to-DC adapter or battery to
get started. [9]

Figure 1: Arduino Uno R3

13 | P a g e

Features of Arduino UNO

Microcontroller ATmega328
Operating Voltage 5V
Input Voltage (recommended) 7 -12V
Input Voltage (limits) 6 -20V
Digital I/O Pins 14 (of which 6 provide PWM output)
Analog Input Pins 6
DC Current per I/O Pin 40 mA
DC Current for 3.3V Pin 50 mA
Flash Memory 32 KB (ATmega328) of which 0.5 KB used by boot loader
SRAM 2 KB (ATmega328)
EEPROM 1 KB (ATmega328)
Clock Speed 16 MHz

14 | P a g e

1.2.3 Arduino Me ga 2560

Figure 2: Arduino Mega 2560
Arduino Mega 2560

Arduino is an open -source physical computing platform based on a simple I/O board and a
development environment that implements the Processing/Wiring language. Arduino can be
used to develop stand -alone interactive objects or can be connected to software on your
computer (e.g. Flash, Processing, Max MSP). The open -source IDE can b e downloaded for free
(currently for Mac OS X, Windows, and Linux).
The Arduino Mega is a microcontroller board based on the ATmega2560. It has 54 digital
input/output pins (of which 14 can be used as PWM outputs), 16 analog inputs, 4 UARTs
(hardware seria l ports), a 16 MHz crystal oscillator, a USB connection, a power jack, an ICSP
header, and a reset button. It contains everything needed to support the microcontroller; simply
connect it to a computer with a USB cable or power it with an AC-to-DC adapter o r battery to
get started. The Mega is compatible with most shields designed for the Arduino Duemilanove
or Diecimila.
The Mega 2560 also adds SDA and SCL pins next to the AREF. In addition, there are two new
pins placed near the RESET pin. One is the IOREF that allow the shields to adapt to the voltage
provided from the board. The other is a not connected and is reserved for future purposes. The
Mega 2560 R3 works with all existing shields but can adapt to new shields which use these
additional pins.

15 | P a g e

Techn ical specs:
Microcontroller = ATmega2560
Operating Voltage = 5V
Input Voltage (recommended) = 7 -12V
Input Voltage (limit) = 6 -20V
Digital I/O Pins = 54 (of which 15 provide PWM output)
Analog Input Pins = 16
DC Current per I/O Pin = 20 mA
DC Current for 3.3V Pin = 50 mA
Flash Memory = 256 KB of which 8 KB used by boot loader
SRAM = 8 KB
EEPROM = 4 KB
Clock Speed = 16 MHz
Length = 101.52 mm
Width = 53.3 mm
Weight = 37 g [10]

Programming:
The Mega 2560 board can be programmed with the Arduino Software (IDE). For details, see
the reference and tutorials.
The ATmega2560 on the Mega 2560 comes preprogrammed with a boot loader that allows you
to upload new code to it without the use of an external hardware programmer. It communicates
using the original STK5 00 protocol (reference, C header files).
You can also bypass the boot loader and program the microcontroller through the ICSP (In –
Circuit Serial Programming) header using Arduino ISP or similar; see these instructions for
details.
The ATmega16U2 (or 8U2 in the rev1 and rev2 boards) firmware source code is available in
the Arduino repository. The ATmega16U2/8U2 is loaded with a DFU boot loader, which can be
activated by:
On Rev1 boards: connecting the solder jumper on the back of the board (near the map of I taly)
and then resetting the 8U2.
On Rev2 or later boards: there is a resistor that pulling the 8U2/16U2 HWB line to ground,
making it easier to put into DFU mode. You can then use Atmel's FLIP software (Windows) or
the DFU programmer (Mac OS X and Linux) to load a new firmware. Or you can use the ISP
header with an external programmer (overwriting the DFU boot loader). See this user –
contributed tutorial for more information.

16 | P a g e

Power:
The Mega 2560 can be powered via the USB connection or with an external power supply. The
power source is selected automatically.
External (non -USB) power can come either from an AC -to-DC adapter (wall -wart) or battery.
The adapter can be connected by plugging a 2.1mm center -positive plug into the board's power
jack. Leads fro m a battery can be inserted in the GND and Vin pin headers of the POWER
connector.
The board can operate on an external supply of 6 to 20 volts. If supplied with less than 7V,
however, the 5V pin may supply less than five volts and the board may become uns table. If
using more than 12V, the voltage regulator may overheat and damage the board. The
recommended range is 7 to 12 volts.
The power pins are as follows:
Vin. The input voltage to the board when it's using an external power source (as opposed to 5
volts from the USB connection or other regulated power source). You can supply voltage
through this pin, or, if supplying voltage via the power jack, access it through this pin.
5V. this pin outputs a regulated 5V from the regulator on the board. The board c an be supplied
with power either from the DC power jack (7 – 12V), the USB connector (5V), or the VIN pin
of the board (7 -12V). Supplying voltage via the 5V or 3.3V pins bypasses the regulator, and can
damage your board. We don't advise it.
3V3. A 3.3 volt supply generated by the on -board regulator. Maximum current draw is 50 mA.
GND. Ground pins.
IOREF. This pin on the board provides the voltage reference with which the microcontroller
operates. A properly configured shield can read the IOREF pin voltage a nd select the
appropriate power source or enable voltage translators on the outputs for working with the 5V
or 3.3V.
Memory:
The ATmega2560 has 256 KB of flash memory for storing code (of which 8 KB is used for the
boot loader), 8 KB of SRAM and 4 KB of EE PROM (which can be read and written with the
EEPROM library).

17 | P a g e

Communication:
The Mega 2560 board has a number of facilities for communicating with a computer, another
board, or other microcontrollers. The ATmega2560 provides four hardware UARTs for TT L
(5V) serial communication. An ATmega16U2 (ATmega 8U2 on the revision 1 and revision 2
boards) on the board channels one of these over USB and provides a virtual com port to
software on the computer (Windows machines will need a .inf file, but OSX and Lin ux
machines will recognize the board as a COM port automatically. The Arduino Software (IDE)
includes a serial monitor which allows simple textual data to be sent to and from the board. The
RX and TX LEDs on the board will flash when data is being transmit ted via the
ATmega8U2/ATmega16U2 chip and USB connection to the computer (but not for serial
communication on pins 0 and 1).
A Software Serial library allows for serial communication on any of the Mega 2560's digital
pins.
The Mega 2560 also supports TWI a nd SPI communication. The Arduino Software (IDE)
includes a Wire library to simplify use of the TWI bus; see the documentation for details. For
SPI communication, use the SPI library.
Physical Characteristics and Shield Compatibility:
The maximum length and width of the Mega 2560 PCB are 4 and 2.1 inches respectively, with
the USB connector and power jack extending beyond the former dimension. Three screw holes
allow the board to be attached to a surface or case. Note that the distance between digital pin s 7
and 8 is 160 mil (0.16"), not an even multiple of the 100 mil spacing of the other pins.
The Mega 2560 is designed to be compatible with most shields designed for the Uno and the
older Diecimila or Duemilanove Arduino boards. Digital pins 0 to 13 (and the adjacent AREF
and GND pins), analog inputs 0 to 5, the power header, and ICSP header are all in equivalent
locations. Furthermore, the main UART (serial port) is located on the same pins (0 and 1), as
are external interrupts 0 and 1 (pins 2 and 3 respe ctively). SPI is available through the ICSP
header on both the Mega 2560 and Duemilanove / Diecimila boards. Please note that I2C is not
located on the same pins on the Mega 2560 board (20 and 21) as the Duemilanove / Diecimila
boards (analog inputs 4 and 5). [11]

18 | P a g e

1.2.4 Arduino Ethernet Shield:

Overview:
The Arduino Ethernet board is like an Arduino Uno and Ethernet shield, but without USB. The
Arduino Ethernet Shield allows you to easily connect your Arduino to the internet. This shield
enables your Arduino to send and receive data from anywhere in the world with an internet
connection. You can use it to do like control robots remotely from a we bsite, or ring a bell
every time you get a new twitter message. This shield opens up endless amounts of possibility
by allowing you to connect your project to the internet. There is also an on -board micro SD slot
which enables you to store a heck -of-a-lot of data, and serve up entire websites using just your
Arduino. This requires the use of an external SD library . [12]
The Arduino Ethernet Shield R3 allows the addition of networking capabilities as well as the
ability to store and host files. The 10/100Mb Ethernet controller allows you to use any other
networked device to communicate with your Arduino project. For example you can reset your
Arduino, or give it commands from your mobile phone while across the world.
This shield also has a Micro SD card socke t enabling file storage and hosting, which is great if
you’re looking to host your own mini server or keeping your files with you wherever you go.
This enables you to attach it to most Arduino related development boards that have the same
pin layout. Conne ct to development boards without the need of jump leads or soldering,
maximizing the amount of space you have to work with while maintaining a tidy finish.
This shield is a middle layer shield, as it uses stacking pins so you can add further breakout.
Some shields may fit without header extensions, just be cautious of the RJ45 socket.

Figure 3: Arduino Ethernet Shield

19 | P a g e

Description:
Wiznet W5100 Ethernet chip (datasheet). The Wiznet W5100 provides a network (IP) stack
capable of both TCP and UDP. It supports up to four simultaneous socket connections. Use the
Ethernet library to write sketches which connect to the internet using the shield. The Ethernet
shield connects to an Arduino board using long wire -wrap headers which extend through the
shield. This keeps the pin layout intact and allows another shield to be stacked on top.
The most recent revision of the board exposes the 1.0 pinout on rev 3 of the A rduino UNO
board.
The Ethernet Shield has a standard RJ -45 connection, with an integrated line transformer and
Power over Ethernet enabled.
There is an onboard micro -SD card slot, which can be used to store files for serving over the
network. It is compati ble with all the Arduino/Genuino boards. The on -board micro SD card
reader is accessible through the SD Library. When working with this library, SS is on Pin 4.
The original revision of the shield contained a full -size SD card slot; this is not supported.
The shield also includes a reset controller, to ensure that the W5100 Ethernet module is
properly reset on power -up. Previous revisions of the shield were not compatible with the Mega
and need to be manually reset after power -up.
The current shield has a P ower over Ethernet (PoE) module designed to extract power from a
conventional twisted pair Category 5 Ethernet cable:
1) IEEE802.3af compliant
2) Low output ripple and noise (100mVpp)
3) Input voltage range 36V to 57V
4) Overload and short -circuit protecti on
5) 9V Output
6) High efficiency DC/DC converter: typ 75% @ 50% load
7) 1500V isolation (input to output) [13]
Arduino communicates with both the W5100 and SD card using the SPI bus (through the ICSP
header). This is on digital pins 10, 11, 12, and 13 on the Uno and pins 50, 51, and 52 on the
Mega. On both boards, pin 10 is used to select the W5100 and pin 4 for the SD card. These pins
cannot be used for general I/O. On the Mega, the hardware SS pin, 53, is not used to select
either the W5100 or the SD ca rd, but it must be kept as an output or the SPI interface won't
work.

20 | P a g e

Note that because the W5100 and SD card share the SPI bus, only one can be active at a time. If
you are using both peripherals in your program, this should be taken care of by the
corres ponding libraries. If you're not using one of the peripherals in your program, however,
you'll need to explicitly deselect it. To do this with the SD card, set pin 4 as an output and write
a high to it. For the W5100, set digital pin 10 as a high output.
The shield provides a standard RJ45 Ethernet jack.
The reset button on the shield resets both the W5100 and the Arduino board.
The shield contains a number of informational LEDs:
PWR : indicates that the board and shield are powered
LINK : indicates the presence of a network link and flashes when the shield transmits or
receives data
FULLD : indicates that the network connection is full duplex
100M : indicates the presence of a 100 Mb/s network connection (as opposed to 10 Mb/s)
RX: flashes when the shield receives data
TX: flashes when the shield sends data
COLL : flashes when network collisions are detected
The solder jumper marked "INT" can be connected to allow the Arduino board to receive
interrupt -driven notification of events from the W5100, but this i s not supported by the Ethernet
library. The jumper connects the INT pin of the W5100 to digital pin 2 of the Arduino. [14]

Figure 4: Arduino Ethernet Shield

21 | P a g e

1.2.5 Arduino RFID module:
RFID Reader Module, are also called as interrogators. They convert radio waves returned from
the RFID tag into a form that can be
passed on to Controllers, which can
make use of it. R FID tags and
readers have to be tuned to the same
frequency in order to communicate.
RFID systems use many different
frequencies, but the most common
and widely used & supported by our
Reader is 125 KHz.
An RFID system consists of two
separate com ponents: a tag and a reader. Tags are analogous to barcode labels, and come in
different shapes and sizes. The tag contains an antenna connected to a small microchip
containing up to two kilobytes of data. The reader, or scanner, functions similarly to a b arcode
scanner; however, while a barcode scanner uses a laser beam to scan the barcode, an RFID
scanner uses electromagnetic waves. To transmit these waves, the scanner uses an antenna that
transmits a signal, communicating with the tags antenna. The tags antenna receives data from
the scanner and transmits its particular chip information to the scanner.
The data on the chip is usually stored in one of two types of memory. The most common is
Read -Only Memory (ROM); as its name suggests, read -only memory can not be altered once
programmed onto the chip during the manufacturing process. The second type of memory is
Read/Write Memory; though it is also programmed during the manufacturing process, it can
later be altered by certain devices.

Figure 6: RFID Tags

Figure 5: RFID Module

22 | P a g e

Figure 7: RFID working diagram The RFID tag consists of a powered or non -powered microchip and an antenna. The three
different types of tags are described below.
Passive tags are the simplest, smallest, and cheapest version of an RFID tag as they do not
contain a built -in power source and consequently cannot initiate communication with a reader.
As the available power from the reader field diminishes rapidly with distance, passive tags have
practical read ranges that vary from abou t 10 mm up to about 5 meters.
Semi -passive tags have built -in batteries and do not require energy from the reader field to
power the microchip. This allows them to function with much lower signal power levels and act
over greater distances . [15]

Features:
1) Support external antenna
2) Maximum effective distance up to 50mm
3) Less than 100ms decoding time
4) UART TTL interface
5) Support EM4100 compatible read only or read/write tags
6) Built -in external bi -color LED and buzzer driver
7) Small outline design

Key Specification:
Frequency = 125 KHz
Baud Rate = 9600 (TTL Electricity Level RS232 format)
Interface = Weigang26 or TTL Electricity Level RS232 format
Power supply = DC 5V (±5%)
Current = <50Ma
Operating range = >50mm (Depend on Card/Tag shape, manufacturer)
Expand I/O port = N/A
Indication light = N/A
Working temperature = -10℃~ +70℃

23 | P a g e

Storage temperature = -20℃~ +80℃
Max. Humidity = Relative humidity 0 ~ 95%
Size = 38.5mm ×19mm×9mm [16]

1.2.5 Arduino RFID module:
The DF Robot Single Relay blocks the number of electronic modules. It can be used in
interactive projects. This relay shield uses Omron G5LA high -quality relay. It can also be used
to control the lighting, electrical, and other equipment’s. The modular design makes it easy to
expand with the Arduino board (not included). The Relay output state by a light -emitting diode.
It can be controlled through the digi tal IO port, such as solenoid valves, lamps, motors and
other high current or high voltage devices.

Specification:
1) Type: Digital
2) Single relay board
3) Rated through -current: 10A (NO) 5A (NC)
4) Maximum switching voltage: 150VAC 24VDC
5) Digital interface
6) Control signal: TTL level
7) Rated load: 8A 150VAC (NO) 10A 24VDC (NO), 5A 250VAC (NO/NC) 5A
24VDC (NO/NC) [17]
8) Maximum switching power: AC1200VA DC240W (NO) AC625VA DC120W (NC)
9) Contact action time: 10ms
10) Module pin definitions: Pin1 – control side, Pin2 – Power supply (VCC), Pin3 –
ground. [18]

Figure 8: Arduino RFID Module

24 | P a g e

Features:
1) Using of high -quality relay, normally open relay contacts maximum load: AC 0 –
-250V/10A, DC 0 –30V/10A;
2) Using of high -withstand voltage transistor, strong driving ability, stable
performance, trigger current of 3mA;
3) Working voltage 5V/12V/24V (for options, please note the voltage you need
when you place an order)
4) User can select the relay control level ,it can be high -level pull or low -level pull;
the module contain limited flow resistance, Trigger signal can be DC power
supply positive or negative, also can be microcontroller I/O port set high or low;
5) Fault -tolerant design, if the control line is broken, the relay will not operate;
6) The power indica tor (red LED), 1 -channel relay status indicator (blue LED);
7) The interface humanization design, all interfaces can be drawn through terminals
connect directly, very convenient;
8) The module size: 5.0cm (L) * 2.7cm (W) * 2.0cm (H);
9) With four fixed bolt holes f or easy installation

Hypothesis:
1) Office automation help people to maintain their offices.
2) Office automation provide security for employes.
3) Office automation reliable for monitoring the information.
4) Office automation help in securing electricity .

25 | P a g e

Chapter 2

2.1 Background

2.1.1 Purpose
To provide the secure environment for office where a person work efficiently and more
flexibility throughout its carrier . It help the management to control the activity of their
workers and create a pure efficiency out of them. This work is done with the help of same
tools which an office environment have such as camera and RFID card to secure the
environment of their industry. These thing can be monitored afterword from the cloud
server as t hese monitoring activities were saved in the cloud server.
2.1.2 Scope
While developing the project it was important to consider their suitability for
organization use. Organization will use this software as for the securing purpose and
as well as for monitoring the activities for their personals working on that
environment . The feature of this project will increase the communication relationship
between the employee and the organization . The milestones of the project are planning
with the flow chart which starts from the 1st week, design the database and layout
back and forth in 2nd week. Implementation and Integration testing will do at last of
the month.

2.1.3 Glossary
a) Hardware
a. Arduino
b. Ethernet Shield
c. RFID receiver
d. Relay Switch
e. Router

b) Application
c) HTML
d) CSS.
e) Java script
f) Database Administration
g) Responsive Web Design

26 | P a g e

2.1.1 Problem Definition
One of the biggest problem we see at many companies, we visit our overworked staff
in the office. We see many of them are just trying to survive, getting their work done
with the tools given to them with no understanding or knowledge, how to make work
more enjoyable or free up time for customer service, innovation or taking on more
work.
With the rapid expansion of the internet, the increased digitalization of data and rapid
decrease in technology costs, employees, and companies can now put in an office automation
system that will reduce overtime, processing times and improve morale.

2.1.2 Security Purpose
The general problem with the organization or with every country is the security.
There are some threads through which the income of any organization will go
towards down and so as the reputation of the organization will strike to dust. Even i f
the organization have the some security guards and even if the organization pay for
cameras and all what if there is the lackn ous in the management of those camera,
what will happened .
2.1.1.1 Management Roll
Management is playing a greater role in the organization . If the management is not
loyal with its work the organization will fall. So the management is the main
foundation of any organization .
2.1.1.2 Monitoring Activity
The major thing for the manager and for the owner to keep an eye on thei r worker
while they were not in the country. The major problem is that manager need to travel
and while he is doing it he cannot monitoring the activities of their workers.
2.1.2 Application related objectives
2.1.2.1 Data must be secure
Data must be secure from unofficial and unauthorized user of the internal employee.
They can only access the data which have privileges

2.1.2.2 User friendly
Application must be user friendly with respect to layout, color and content size.

2.1.2.3 Data organize
Data must store with organize and updated at every time by using database
management system. Data should be retrieved with any bother

2.1.2.4 Care of abnormal and normal date
Abnormal data should be rejected and normal data must insert and accepted. For
example if users insert phone number in name field it must reject the insertion.

27 | P a g e

2.1.2.5 General Business Related Objectives

2.1.2.6 To make the system fast, efficient and time conserving
To prevent delays, the system will be designed to run in the most efficient of manners.
No time will be wasted in making reports as they will be generated by the
computerized system automatically.

2.1.2.7 To increase owner satisfaction
This objective carries great worthy and is one of the most essential ones that must
deal with. It is very important the owner leave satisfied and are loyal to the project .
That situation where the owner has to use another application must avert.

2.1.2.8 To Increase Profits
Once this project is implemented, the number of employees will be reduced to a
minimum. This will end up as a profit because fewer salaries will have to be paid.
The running cost of the system will be low.

2.1.2.9 To make it Dependable
The application will be made as dependable as possible, so that both the employee and
the customer have no doubt about the working and can fully trust it

2.2 Motivation

2.2.1 Intended Audience
The intended audience of this Project report consists of:
• Software designers
• Systems engineers
• Software developers
• Software testers
• Hardware designer
• Hardware tester
• Customers (user)

28 | P a g e

Chapter 3

3.1 Literature Review

3.1.1 Plan of Action

Project Phase
Objective(s)
Task(s)
Duration
Analysis

Recognize the
problems in
Manual System
Observing the working
of general office of any
organization and get
data with the help of
Interviewing the
management and
employee. Elicit
questionnaires.
Identifying problems
using the above methods

3 Days

Defining the
solution with
their evaluation

Present the solution of
with their advantage and
disadvantage

1 Week

Analysis Impact
on business

Analysis the scope of
project in business
domain

1 Day

Table 1: Analysis

29 | P a g e

Project Phase
Objective(s)
Task(s)
Duration
Design

Prepare the plane
of action and
define the detail
of the project

Plan and set the target
and objective to be
achieved.

1 Day

Set Deadlines

Set the deadline for each
and whole objective.

1 Day

Use different
methods and
techniques to
solve the
problems.

Flowcharts Designing of
system

1-2 Days

Finalizing
the Design

Finalize
Design

Recheck
make
necessary
changes if
need

3 Days

Gather Hardware
and Software
requirements
Analyzing the hardware
and software
requirements for the
Application

2 Days
Analysis the hardware
and software to use for
the application and
availability in local
market

Table 2: Design

30 | P a g e

Project Phase
Objective(s)
Task(s)
Duration
Coding and Implementation

Security of Data
An Effectual
authorization method to
make sure that our
server cannot be
accessed by
unauthorized personnel .

3 Days

Data
Management

Data will be managed
by creating tables of the
following; User, group,
messages, users
availability

1 Week

User Friendly
System

Sliding will make
application more user
so it can be access by
the internet browser
as well as from
Smart phones

2-3 Weeks

Simple searching
and using
features
Easy query and coding
will be used for
searching the data and
using feature such as on
or off status and future
updating.

2-4 Weeks

Table 3: Coding and Implementation

31 | P a g e

Project Phase
Objective(s)
Task(s)
Duration
Testing

Creating Reports
Reports will be easily
generated based upon :
Employee past and
future information

5-6 Hours

Normal Data
will be Accepted
The validation will be
tested by entering
correct and valid data.
The test will confirm
that all valid data is
being allowed in the
database

1 Day

Abnormal Data
will Rejected
The validation will be
tested by entering un
correct and un -valid
data. The test will
confirm that all un-valid
data is being not
allowed in the database

1 Day

Extreme Data
Values will be
Accepted
The extreme values of
all the fields’ ranges
would be inserted and
checked that if they are
being accepted or not

1 Day

Clean Room
testing
Check all Variable,
functions, structures,
classes and its method
are declared with their
Specific Name

1 Day

Performance
Testing
Testing the time take for
the each task
1 Day

Compatibility
Testing Test the application on
every device and mobile
operating system
1 Day

Table 4: Testing

21 | P a g e

Project Phase
Objective(s)
Task(s)
Duration
DOCUMENTATION
SYSTEM EVALUATION DEVELOPMENT

All User Manual
Documentation
provided
Create the user manual
for how application will
work step by step
learning

2 week

All Technical
Manual
Documentation
provided

Create technical
document for the person
if client want to update
the feature in application
by other developer team

2 week

Ensure all target
have been
achieved.

Evaluation of the new
system

1 Week

Table 5: Documentation system evaluation development

22 | P a g e

3.2.1 Time Boxing with Gantt chart

Plane of Action
Project Activity Months (Each dark color on small cell represent one week)

Months September October November December
1 2 3 4 1 2 3 4 1 2 3 4 1 2 3 4

1 Analysis
2 Design
3 Coding and
Implementation
4 Testing
5 Documentation
6 System
evaluation
7 Presentation

Table 6: Timing Box

23 | P a g e

3.1.3 System Requirement

3.1.1.1 Minimum Hardware Requirement

The Minimum requirement for the application has been improvised to provide
at minimum cost, whether these requirement are not recommend .

For Android:
Req. code Requirement Description
Hw-Mn-101 Processor 1.0-GHz Processor
Hw-Mn-102 Internal Memory 500 MB
Hw-Mn-103 External Memory 2 GB
Hw-Mn-104 Device Mobile with GPRS enable
Table 7: Minimum Hard ware Requirement Android

For Computer :
Req. code Requirement Description
Hw-Mn-101 Processor Pentium 4
Hw-Mn-102 Internal Memory 500 MB
Hw-Mn-103 External Memory 80 GB
Hw-Mn-104 Device Enable with internet
Hw-Mn-105 Browser Mexthon
Table 8: Minimum Hardware Requirement for Computer
3.1.1.2 Minimum Software Requirement

The Minimum requirement for the application has been improvised to
provide at minimum cost, whether these requirement are not recommend.

For Android:
Req. code Requirement Description
Sw-Mn-101 Operating system Android Gingerbread

Table 9: Minimum Software Requirement for Software
For Computer:
Req. code Requirement Description
Sw-Mn-101 Operating system Windows XP

Table 10: Minimum Software Requirement for computer

24 | P a g e

3.1.1.3 Recommend Hardware Requirement
The Recommend requirement for the application has been improvised the
application more efficient. The internet required for this purpose to complete
the activity .
For Android:
Req. code Requirement Description
Hw-Mn-101 Processor 1.33-GHz Dual core
Hw-Mn-102 Internal Memory 1GB
Hw-Mn-103 External Memory 8GB
Hw-Mn-104 Device Mobile with 3G/4G enable
Hw-Mn-105 Display 4.5 Inch Display screen
Table 11: Recommend Hardware Requirement for Android
For Computer:
Req. code Requirement Description
Hw-Mn-101 Processor 1.33-GHz Dual core
Hw-Mn-102 Internal Memory 2GB
Hw-Mn-103 External Memory 120GB
Hw-Mn-104 Device Enable with Internet
Hw-Mn-105 Browser Chrome
Table 12: Recommend Hardware Requirement for Computer
3.1.1.4 Recommend Software Requirement
For Android:
Req. code Requirement Description
Sw-Mn-101 Operating system Lollipop
Table 13: Recommend Software Requirement for Android
For Computer:
Req. code Requirement Description
Sw-Mn-101 Operating system Windows 10
Table 14: Recommend Software Requirement for Computer
3.1.4 Requirement Specification
This section includes the functional requirement, non -functional requirement for the
application. Functional requirement describe that what the system must do and non –
functional requirement how the system will do.

25 | P a g e

Chapter 4

4.1 Methodology of Solution

4.1.1 Software
4.1.1.1 Main Screens
Screen panel with respect to Browser

Panel Name: Main Screen
Purpose: To provide a security.

Screen Description
Through this screen no unauthorized person can access it .
Figure 9: Main Web Page

26 | P a g e

Panel Name: Index Screen
Purpose: To provide an Interface through user can interact with the Cloud base
Security
System .

Screen Description
Through this screen a user can interact with the activities

Figure 10: Index Page

27 | P a g e

Panel Name: Index Screen
Purpose: To provide an Interface through user can keep an eye on o ffice activities.

Screen Description
Through this screen a user can interact with the activities
Figure 11: Remaining Index Page

28 | P a g e

Panel Name: Index Screen
Purpose: To provide an Interface through user can keep an eye on office activities .

Screen Description
Through this screen a user can interact with the activities
Figure 12: Complete Index Page

29 | P a g e

Panel Name: Index Screen Logs
Purpose: To provide an Interface through user can check the electricity activities .

Screen Description
Through this screen a user can interact with the activities
Figure 13: Logs

30 | P a g e

Video Streaming:
In this project we used video streaming to keep an eye on activity going on outside as
well as inside the office. As this is the only prototype so we used an android smart phone
for video streaming. For this we used LG G2 Smart phone in we inst all android
application which used the live video streaming. We used a link of the application into
our web page through we can use it from our web page. There is an application available
in the Android store which is an IP camera. We use that application for video streaming
and give a link to our Web page.

<div id="iframeParent">
<h1>Live Streaming</h1>
<iframe src="http://192.168.0.100:8080" frameborder="0">

</iframe>
</body>
</html>

31 | P a g e

4.1.2 Hardware

RFID ( Radio Frequency Identification Card) :
Our projects has a many part, one of the important part is the microcontroller that control
every activity going in the whole project. Micro controller is connected to the RFID
Module that is fixed in the door which allow th e user to interface with. User used its
RFID card to open the door. This RFID module sense through RFID card which show
that who will enter into the office. This RFID module send the report to the
microcontroller to identify the person that interact with t he RFID modular. There are two
types of RFID card we used the Passive RFID card to perform the identification method.

Figure 14: Arduino Detail Diagram

32 | P a g e

This RFID module is connected to the Arduino microcontroller with the port no. Micro controller
will identify the person through its RFID card and provide the access if the person is authorized and
if not then it alarmed and send the notification to the ow ner.

Motor Driver :
Motor driver is used for drive the motor in our project we used the motor in to move the
sliding do or too open and closed the door . It connected to the microcontroller with the
help of motor driver. Motor driver is only being activate d if the microcontroller send the
feedback to it. This is only being happened if an authorized person swap the RFI card
through RFID modular. If an authorized person swap the RFID card the RFID modular
send the detail to Arduino microcontroller to identify the authorization if it does then it
activate the motor driver to side the door op en.
Our motor driver is L298N H -bridge . It Support DC motor and Stepper motor types of
motor . We used () motor to slide the door open .
Figure 15: Arduino Mega

33 | P a g e

We used RFID with the motor driver to open and closed the front door through which a
user enter into the office.
The RFID module is connected to the Arduino with the port of () which it received the ID
of the passive RFID card and send to Arduino. Then Arduino check it whether it is the
authorized person or not. Then after that it send the high command depending on t he
condition to motor driver which drive the motor so the door will open for the person. If
there is unauthorized person try to access through RFID it ring the alarm and indicate the
red LED which is embedded inside the office. We used PIZO buzzer which ri ng if
unauthorized person try to enter.

Figure 17: RFID We Use Figure 16: Arduino Motor Driver

34 | P a g e

Figure 18: Motor Driver Module

Figure 19: RFID to Motor driver Schematic

35 | P a g e

Figure 20: RFID cards
Figure 21: Breadboard with LED and Pizo Buzzer

36 | P a g e

Code of RFID with LED Access

void r()
{
if(rfid.isCard()){

if(rfid.readCardSerial()){
Serial.print(rfid.serNum[0]);
Serial.print(",");
Serial.print(rfid.serNum[1]);
Serial.print(",");
Serial.print(rfid.serNum[2]);
Serial.print(",");
Serial.print(rfid.serNum[3]);
Serial.print(",");
Serial.print(rfid.serNum[4]);
Serial.println("");

for(int x = 0; x < sizeof(cards); x++){
for(int i = 0; i < sizeof(rfid.s erNum); i++ ){
if(rfid.serNum[i] != cards[x][i]) {
access = false;
break;
} else

37 | P a g e

{
access = true;
}
}
if(access) break;
}

}

if(access){
Serial.println("Welcome!");
startAlarm = false;
digitalWrite(rfidled, HIGH); // HIGH with regular rfidled
digitalWrite( dooropen, HIGH);
digitalWrite(doorclose, LOW);
delay(1000);
digitalWrite(rfidled, LOW);
digitalWrite(dooropen, LOW);
digitalWrite(doorclose, HIGH);
delay(1000);
digitalWrite(do oropen, LOW);
digitalWrite(doorclose, LOW);
} else
{
Serial.println("Not allowed!");

38 | P a g e

startAlarm = true;
// digitalWrite(rfidled, HIGH); // LOW with regular rfidled
}
}

if(startAlarm) {
digitalWrite(alarm, HIGH);
delay(1000);
digitalWrite(alarm, LOW);
} else
{
digitalWrite(alarm, LOW);
}

rfid.halt();

}
void reset_alarm(){
startAlarm = false;
}

39 | P a g e

Code of Mot or Driver with Ar duino

int dooropen = 2;
int doorclose = 3;

void setup()
{
Serial.begin(9600); // for debugging
SPI.begin();
pinMode(dooropen, OUTPUT);
pinMode(doorclose, OUTPUT);
}

void loop()
{
digitalWrite(dooropen, HIGH);
digitalWrite(doorclose, LOW);
delay(1000);
digitalWrite(rfidled, LOW);
digitalWrite(dooropen, LOW);
digitalWrite(doorclose, HIGH);
delay(1000);
digitalWrite(dooropen, LOW);
digitalWrite(doorclose, LOW);
}

40 | P a g e

Relay Module:
Relay module is used for switching between the 2 20 v to 5 v . In our project we used
Arduino relay module to switching our light around the office. This help us to convert the
5 v switch which help us to connect or dis connect the 220 v light aroun d the office. This
Arduino relay module is con nected to the Arduino mega which built a cloud application
through which an application is available online so it is any easy for the admin to
interface with the hardware . If the user press and button through application a
microcontroller received that instruction with the help of Ethernet shiel d, by receiving
those instruction i t activate the relay module so the relay module work as an switch
between 5 v to 220 v .

We used the Arduino Relay Module 4 channel . This help me to do switching between 4
channels. This Relay Module
is connected to Arduino
microcontroller with the port
().

Figure 23: RFID Module Figure 22: Arduino 4 Relay Module

41 | P a g e

Code of Relay Module with Ar duino :

void setup()
{
// LEDs on pins 6,7,8 and 9
pinMode(6, OUTPUT);
pinMode(7, OUTPUT);
pinMode(8, OUTPUT);
pinMode(9, OUTPUT);
}

void loop()
{
SetLEDs();
}

void SetLEDs(void)
{
// LED 1 (pin 6)
if (StrContains(HTTP_req, "LED1=1")) {
LED_state[0] = 1; // save LED state

42 | P a g e

digitalWrite(6, HIGH);
//Serial.println("led 1 is switch on");
}
else if (StrContains(HTTP_req, "LED1=0")) {
LED_state[0] = 0; // save LED state
digitalWrite(6, LOW);
//Serial.println("led 1 is switch off");
}
// LED 2 (pin 7)
if (StrContains(HTTP_req, "LED2=1")) {
LED_state[1] = 1; // save LED state
digitalWrite(7, HIGH);
}
else if (StrContains(HTTP_req, "LED2=0")) {
LED_state[1] = 0; // save LED state
digitalWrite(7, LOW);
}
// LED 3 (pin 8)
if (StrContains(HTTP_req, "LED3=1")) {
LED_state[2] = 1; // save LED state
digitalWrite(8, HIGH);
}
else if (StrContains(HTTP_req, "LED 3=0")) {

43 | P a g e

LED_state[2] = 0; // save LED state
digitalWrite(8, LOW);
}
// LED 4 (pin 9)
if (StrContains(HTTP_req, "LED4=1")) {
LED_state[3] = 1; // save LED state
digitalWrite(9, HIGH);
}
else if (StrContains(HTTP_req, "LED4=0")) {
LED_state[3] = 0; // save LED state
digitalWrite(9, LOW);
}
}

Code of Web Page to Relay

strLED1 = "";
strLED2 = "";
strLED3 = "";
strLED4 = "";
var LED1_state = 0;
var LED3 _state = 0;
var LED4_state = 0;

44 | P a g e

function GetArduinoIO()
{
nocache = "&nocache=" + Math.random() * 1000000;
var request = new XMLHttpRequest();
request.onreadystatechange = function()
{
if (this.readyState == 4) {
if (this.status == 200) {
if (this.responseX ML != null)
// XML file received – contains analog values, and LED states
var count;
// get analog inputs
var num_an =
this.responseXML.getElementsByTagName('analog').length;
for (count = 0; count < num_an;
count++) {

document.getElementsByClassName("analog")[count].innerHTML =

this.responseXML.getElementsByTagName('analog')[count].childNodes
[0].nodeValue;
}
// LED 1

45 | P a g e

if
(this.responseXML.getElementsB yTagName('LED')[0].childNodes[0].nodeVal
ue === "on") {

document.getElementById("LED1").innerHTML = "LIGHT 1 is ON
(D6)";

document.getElementById("LED1").className = " active";
LED1_state = 1;
}
else {

document. getElementById("LED1").innerHTML = "LIGHT 1 is OFF
(D6)";

document.getElementById("LED1").className = "inactive";
LED1_state = 0;
}
//LED 2
/*if
(this.responseXML.getElementsByTagName('LED')[1].childNodes[0].nodeVal
ue === "on") {

document.LED_form.LED2.checked = true;
}
else {

46 | P a g e

document.LED_form.LED2.checked = false;
}*/
// LED 3
if
(this.responseXML.getElementsByTagName('LED')[2].childNodes[0].nodeVal
ue === "on") {

document.getElementById("LED3").innerHTML = "LIGHT 3 is ON
(D8)";

document.getElementById("LED3").className = " active";
LED3_state = 1;
}
else {

document.getElementById("LED3").innerHTML = "LIGHT 3 is OFF
(D8)";

document.getElementById("LED3").className = "inactive";
LED3_state = 0;
}
// LED 4
if
(this.responseXML.getElementsByTagName('LED')[3].childNodes[0].nodeVal
ue === "on") {

47 | P a g e

document.getElementById("LED4").innerHTML = "Master Switch
ON";

document.getElementById("LED4").className = "active";
LED4_state = 1;
}
else {

document.getElementById("LED4").innerHTML = "Master Switch
OFF";

document.getElementById("LED4").className = "inactive";
LED4_state = 0;
}
}
}
}
}
request.open("GET", "ajax_inputs" +
strLED1 + strLED2 + strLED3 + strLED4 + nocache, true);
request.send(null);
setTimeout('GetArduinoIO()', 1000);
strLED1 = "";
strLED2 = "";
strLED3 = "";

48 | P a g e

strLED4 = "";
}

Ethernet Shield :
As I discuss that microcontroller received instruction from the cloud through Ethernet
shield . Ethernet Shield provide a connection oriented interface through which Arduino
interact with Internet. In our project we used Arduino Ethernet Shield R3 . We use this
Ethernet shield R3 as it has only one difference only issue that may create an
incompatibility seems to be the IOREF pin next the 5V output pin which is extra on
Revision 3 but not in Revision 2.

Figure 24: Arduino Ethernet Shield
We used Ethernet shield to connect with the internet .

Figure 25: Ethernet Shield

49 | P a g e

Code of Ethernet Shield

void e()
{
EthernetClient client = server.available();

if (client) {
boolean currentLineIsBlank = true;
while (client.connected()) {
if (client.available()) {
char c = client.read();
// limit the size of the stored received HTTP request
// buffer first part of HTTP request in HTTP_req array (string)
// leave last element in array as 0 to null terminate string (REQ_BUF_SZ –
1)
if (req_index < (REQ_BUF_SZ – 1)) {
HTTP_req[req_index] = c; // save HTTP request character
req_index++;
}
// last line of client request is blank and ends wit h \n
// respond to client only after last line received
if (c == ' \n' && currentLineIsBlank) {
// send a standard http response header

50 | P a g e

client.println("HTTP/1.1 200 OK");
// remainder of header follows below, depending on if
// web page or XML page is requested
// Ajax request – send XML file
if (StrContains(HTTP_req, "ajax_inputs")) {
// send rest of HTTP header
client.println("Content -Type: text/xml");
client.println("Connection: keep -alive");
client.println();
SetLEDs();
// send XML file containing input states
XML_response(client);
}
else { // web page request
// send rest of HTTP header
client.println("C ontent -Type: text/html");
client.println("Connection: keep -alive");
client.println();
// send web page
webFile = SD.open("index.htm"); // open web page file
if (webFile) {
while(webFile.available()) {
client.write(webFile.read()); // send web page to client

51 | P a g e

}
webFile.close();
}
}
// display received HTTP request on serial port
Serial.print(HTTP_req);
// reset buffer index and all buffer elements to 0
req_index = 0;
StrClear(HTTP_req, REQ_BUF_SZ);
break;
}
// every line of text received from the client ends with \r\n
if (c == ' \n') {
// last character on line of received text
// starting new line with next character read
currentLineIsBlank = true;
}
else if (c != ' \r') {
// a text character was received from client
currentLineIsBlank = false;
}
} // end i f (client.available())
} // end while (client.connected())

52 | P a g e

delay(1); // give the web browser time to receive the data
client.stop(); // close the connection
} // end if (client)
}
Figure 26: Complete project

53 | P a g e

Complete Arduino code with detail

/*–––––––––––––––––––––
Program: Cloud Base Security System

Description: Arduino Cloud web server that controls 4 rfidleds outputs,
3 using buttons.
The cloud web page is stored on the micro SD card.

Hardware: Arduino Me ga and official Arduino Etherne shield.
Should work with other Arduinos and compatible Ethernet
shields. 2Gb micro SD card formatted FAT16.
pins 6 to 9 as Replays outputs And 22 for Door open using rfid
Card.
Rfid MFRC522:
––––––––––––––––––––––––––––––
MFRC522 Arduino Arduino Arduino Arduino Arduino
Reader/PCD Uno Mega Nano v3 Leonardo/Micro Pro Micro
Signal Pin Pin Pin Pin Pin Pin
––––––––––––––––––––––––––––––
RST/Reset RST 9 24 D9 RESET/ ICSP -5 RST
SPI SS SDA(SS) 10 25 D10 10 10
SPI MOSI MOSI 11 / ICSP -4 51 D11 ICSP -4 16
SPI MISO MISO 12 / ICSP -1 50 D12 ICSP -1 14

54 | P a g e

SPI SCK SCK 13 / ICSP -3 52 D13 ICSP -3 15 \

Software: Developed using Arduino 1.6.5 software
Should be compatible with Arduino 1.0 +
SD card contains web page called index.htm

References: – Ethernet library documentation:
http://arduino.cc/en/Reference/Ethernet
– SD Card library documentation:
http://arduino.cc/e n/Reference/SD
– SPI library documentation:
http://arduino.cc/en/Reference/SPI

––––––––––––––––––––– */

55 | P a g e

#include <SPI.h>
#include <Ethernet.h>
#include <SD.h>
#include <RFID.h>
// size of buffer used to capture HTTP requests
#define REQ_BUF_SZ 60
#define SS_PIN 25
#define RST_PIN 24
#define rfidled 22

RFID rfid(SS_PIN,RST_PIN);

// MAC address from Ethernet shield sticker under board
byte mac[] = { 0 xDE, 0xAD, 0xBE, 0xEF, 0xFE, 0xED };
IPAddress ip(192, 168, 0, 20); // IP address, may need to change depending on
network
EthernetServer server(80); // create a server at port 80
File webFile; // the web page file on the SD card
char HTTP_req[REQ_BUF_SZ] = {0}; // buffered HTTP request stored as
null terminated string
char req_index = 0; // index into HTTP_req buffer
boolean LED_state[4] = {0}; // stores the states of the LEDs

56 | P a g e

int dooropen = 2;
int doorclose = 3;

int startAlarm = false;
int resetAlarm = 2;

int alarm = 23;

int serNum[5];

int cards[][5] = {
{114,121,255,229,17
}, // card 1
{101,220,213,229,137} // card 2
};

bool access = false;

void setup()
{
Serial.begin(9600); // for debugging
SPI.begin();
rfid.init();
pinMode(dooropen, OUTPUT);
pinMode(doorclose, OUTPUT);

57 | P a g e

pinMode(resetAlarm, INPUT);
pinMode(rfidled, OUTPUT);
pinMode(alarm, OUTPUT);
digitalWrite(rfidled, LOW); // or LOW if you have a regular rfidl ed

// disable Ethernet chip
pinMode(10, OUTPUT);
digitalWrite(10, HIGH);

// initialize SD card
Serial.println("Initializing SD card…");
if (!SD.begin(4)) {
Serial.println("ERROR – SD card initialization failed!");
return; // init failed
}
Serial.println("SUCCESS – SD card initialized.");
// check for index.htm file
if (!SD.exists("index.htm")) {
Serial.println("ERROR – Can't find index.htm file!");
return; // can't find index file
}
Serial.println("SUCCESS – Found index.htm file.");

// LEDs on pins 6,7,8 and 9

58 | P a g e

pinMode(6, OUTPUT);
pinMode(7, OUTPUT);
pinMode(8, OUTPUT);
pinMode(9, OUTPUT);

Ethernet.begin(mac, ip); // initialize Ethernet device
server.begin(); // start to listen for clients
}

void loop()
{
r();
e();
}
void r()
{

if(rfid.isCard()){

if(rfid.readCardSeria l()){
Serial.print(rfid.serNum[0]);
Serial.print(",");
Serial.print(rfid.serNum[1]);
Serial.print(",");
Serial.print(rfid.serNum[2]);

59 | P a g e

Serial.print(",");
Serial.print(rfid.s erNum[3]);
Serial.print(",");
Serial.print(rfid.serNum[4]);
Serial.println("");

for(int x = 0; x < sizeof(cards); x++){
for(int i = 0; i < sizeof(rfid.serNum); i++ ){
if(rfid.serNum[i] != cards[x][i]) {
access = false;
break;
} else {
access = true;
}
}
if(access) break;
}

}

if(access){
Serial.println("Welcome!");
startAlarm = false;
digitalWrite(rfidled, HIGH); // HIGH with regular rfidled
digitalWrite(dooropen, HIGH);

60 | P a g e

digit alWrite(doorclose, LOW);
delay(1000);
digitalWrite(rfidled, LOW);
digitalWrite(dooropen, LOW);
digitalWrite(doorclose, HIGH);
delay(1000);
digitalWrite(dooropen, LOW);
digitalWrite(doorclose, LOW);
} else {
Serial.println("Not allowed!");
startAlarm = true;
// digitalWrite(rfidled, HIGH); // LOW with regular rfidled
}
}

if(startAlarm) {
digitalWrite(alarm, HIGH);
delay(1000);
digitalWrite(alarm, LOW);
} else {

digitalWrite(alarm, LOW);
}

rfid.halt();

61 | P a g e

}
void reset_alarm(){
startAlarm = false;
}

void e()

{
EthernetClient client = server.available(); // try to get client

if (client) { // got client?
boolean currentLineIsBlank = true;
while (client.connected()) {
if (client.available()) { // client data available to rea d
char c = client.read(); // read 1 byte (character) from client
// limit the size of the stored received HTTP request
// buffer first part of HTTP request in HTTP_req array (string)
// leave last element in array as 0 to null terminate string
(REQ_BUF_SZ – 1)
if (req_index < (REQ_BUF_SZ – 1)) {
HTTP_req[req_index] = c; // save HTTP request character
req_index++;
}

62 | P a g e

// last line of client request is blank and ends with \n
// respond to client only after last line received
if (c == ' \n' && currentLineIsBlank) {
// send a standard http response header
client.println("HTTP/1.1 200 OK");
// remainder of header follows below, depending on if
// web page or XML page is requested
// Ajax request – send XML file
if (StrContains(HTTP_req, "ajax_inputs")) {
// send rest of HTTP header
client.println("Content -Type: text/xml");
client.println("Connection: keep -alive");
client.println();
SetLEDs();
// send XML file containing input states
XML_response(client);
}
else { // web page reques t
// send rest of HTTP header
client.println("Content -Type: text/html");
client.println("Connection: keep -alive");
client.println();
// send web page
webFile = SD.open("index.htm"); // open web page file
if (webFile) {

63 | P a g e

while(webFile.available()) {
client.write(webFile.read()); // send web page to client
}
webFile.close();
}
}
// display received HTTP request on serial port
Serial.print(HTTP_req);
// reset buffer index and all buffer elements to 0
req_index = 0;
StrClear(HTTP_req, REQ_BUF_SZ);
break;
}
// every line of text received from the client ends with \r\n
if (c == ' \n') {
// last character on line of received text
// starting new line with next character read
currentLineIsBlank = true;
}
else if (c != ' \r') {
// a text character was received from client
currentLineIsBlank = false;
}
} // end if (client.available())
} // end while (client.connected())

64 | P a g e

delay(1); // give the web browser time to receive the data
client.stop(); // close the connection
} // end if (client)
}

// checks if received HTTP request is swi tching on/off LEDs
// also saves the state of the LEDs
void SetLEDs(void)
{
// LED 1 (pin 6)
if (StrContains(HTTP_req, "LED1=1")) {
LED_state[0] = 1; // save LED state
digitalWrite(6, HIGH);
//Serial.println("led 1 is switch on");
}
else if (StrContains(HTTP_req, "LED1=0")) {
LED_state[0] = 0; // save LED state
digitalWrite(6, LOW);
//Serial.println("led 1 is switch off");
}
// LED 2 (pin 7)
if (StrContains(HTTP_req, "LED2=1")) {
LED_state[1] = 1; // save LED state
digitalWrite(7, HIGH);
}

65 | P a g e

else if (StrContains(HTTP_req, "LED2=0")) {
LED_state[1] = 0; // save LED state
digitalWrite(7, LOW);
}
// LED 3 (pin 8)
if (StrContains(HTTP_req, "LED3=1")) {
LED_state[2] = 1; // save LED state
digitalWrite(8, HIGH);
}
else if (StrContains(HTTP_req, "LED3=0")) {
LED_state[2] = 0; // save LED state
digitalWrit e(8, LOW);
}
// LED 4 (pin 9)
if (StrContains(HTTP_req, "LED4=1")) {
LED_state[3] = 1; // save LED state
digitalWrite(9, HIGH);
}
else if (StrContains(HTTP_req, "LED4=0")) {
LED_state[3] = 0; // save LED state
digitalWrite(9, LOW);
}
}

// send the XML file with analog values, switch status

66 | P a g e

// and LED status
void XML_response(EthernetClient cl)
{
int analog_val; // stores value read from analog inputs
int count; // used by 'for' loops
int sw_arr[] = {2, 3, 5}; // pins interfaced to switches

cl.print("<?xml version = \"1.0\" ?>");
cl.print("<inputs>");
// read analog inputs
for (count = 2; count <= 5; count++) { // A2 to A5
analog_val = analogRead(count);
cl.print("<analog>");
cl.print(analog_val);
cl.println("</analog>");
}

// checkbox LED states
// LED1
cl.print("<LED>");
if (LED_state[0]) {
cl.print("on");
}
else {
cl.print("off");

67 | P a g e

}
cl.println("</LED>");
// LED2
cl.print("<LED>");
if (LED_state[1]) {
cl.print("on");
}
else {
cl.print("off");
}
cl.println("</LED>");
// button LED states
// LED3
cl.print("<LED>");
if (LED_state[2]) {
cl.print("on");
}
else {
cl.print("off");
}
cl.println("</LED>");
// LED4
cl.print("<LED>");
if (LED_state[3]) {
cl.print("on");

68 | P a g e

}
else {
cl.print("off");
}
cl.println("</LED>");

cl.print("</inputs>");
}

// sets every element of str to 0 (clears array)
void StrClear(char *str, char length)
{
for (int i = 0; i < length; i++) {
str[i] = 0;
}
}

// sea rches for the string sfind in the string str
// returns 1 if string found
// returns 0 if string not found
char StrContains(char *str, char *sfind)
{
char found = 0;
char index = 0;
char len;

69 | P a g e

len = strlen(str);

if (strlen(sfind) > len) {
return 0;
}
while (index < len) {
if (str[index] == sfind[found]) {
found++;
if (strlen(sfind) == found) {
return 1;
}
}
else {
found = 0;
}
index++;
}

return 0;
}

70 | P a g e

Chapter 5

5.1 Results & Discussion

By using Cloud Base Security System, communication between the Owner and its
office will be more affective. Organization has all the activity data at one
application . Cloud Base S ecurity system will bring the office into you hand . It
will reduce the communication gap between the owner and organizatio n even he
is not in his office and even so if he is outside his country . Owner can easily
update the status on any time and any place. By using the Cloud Base Security
System it will reduce the time and cost for the all user and organization.
For more conformation for Cloud Base Security System we create a questioner
that will conform that what people will think about Cloud Base Security System.
We uses seven question for our questioner. Our Sample Size is 200

71 | P a g e

QUESTION NO 1
What did you think that this project would help people to maintain their offices?
192 say Y es
8 say N o

People actually think that this project will help them to maintain their
office as a result shown in above graph.

050100150200250
Question 1Yes NO

72 | P a g e

QUESTION NO 2
Does this project help us to make the security more reliable?
190 say Yes
10 say No

The Major issue is the security this project help to make security bat ter as the
people reviews has shown in above graph .
020406080100120140160180200
Question 2Yes No

73 | P a g e

QUESTION NO 3
Does the RIFD is the better tool for security purpose?
165 say Yes
35 say No

There are many tools available which make the security more reliable. RFID
tool is the most popular tool as the people reviews has shown in above graph

020406080100120140160180
Question 3Chart Title
Yes No

74 | P a g e

QUESTION NO 4
Does it is reliable to you that your information is being monitored by the owner?
155 say Yes
45 say No

People are afraid of that their activities will be monitored if they were in their
offices, the result will proved this.

020406080100120140160180
Question 4Chart Title
Yes No

75 | P a g e

QUESTION NO 5
If you were own any office and does it fell easy to control that office just using smart phone?

145 say Yes
55 say No

These days most of the office works performed by smart phones, so that office
owners of this era having this opportunity that they can control their offices
through smart phones as shown in the above graph.

020406080100120140160
Question 5Yes No

76 | P a g e

QUESTION NO 6
Does you feel secured as employee to work in that secured environment?
165 say Yes
35 say No

Security is the essentialness of everyone. As an employee people need more
security towards their office environment in every aspect so every employee
feel secured as working in secured environment as shown in above graph.

020406080100120140160180
Question 6Yes No

77 | P a g e

QUESTION NO 7
Is it that great that with that system you can save your electricity?
155 say Yes
45 say No

Electricity is core need for everything these days. It helps in many industries
and fields to perform work quick ly and effectively. Offices always seeking to
use that kind of systems which use less electricity to perform work and save
electricity too. The system of office automation is good in saving electricity as
shown in above graph.

020406080100120140160180
Question 7Chart Title
Yes No

78 | P a g e

5.1.1 ANALYSIS AND INTERPRETATION OF DATA:
In This chapter researcher have tried to present a detailed description of the population,
related to researcher thesis, by analyzing the statistical findings of the respective sample
of the population in regards to its physical characteristics and other factors relevant to the
study. The analysis of the finding is to be generalized on the entire population. Also Chi –
square test is used for the validity of the hypothesis.

5.1.2 CHI -SQUARE METHOD:
Chi-Square Method is perhaps the best and most effective method to study the existence
of association between two variables. It is used to test the significance of difference
between the distribution expected and frequencies observed.

5.1.3 FORMULA OF CHI -SQUARE:
X² = ∑ (fo-fe) ²
fe
where,
X² = Sign/Symbol of Chi -square.
∑ = Sum of all numbers.
Fo= Observed frequency.
Fe= Expected frequency.

79 | P a g e

Analysis:

Q1) what did you think that this project would help people to maintain their
offices.
Null hypothesis:
There is no significant difference among the opinions of people about that
they think that this project would help them to maintain their offices.
Description Yes No Total
Fo 192 8 200
Fe 100 100 200

Formula:
X² = ∑ (fo -fe) ²
fe

X² = (192-100)² + (8-100)²
100 100

X² = (92)² + (-92)²
100 100

X² = 8464 + 8464
100 100

X² = 84.64 + 84.64
X² = 169.28 Calculated Value.
Now find Degree of freedom:
df = (R -1) (C -1)
df = (2 -1) (2 -1)
df = 1 x 1
df = 1
Level of Significance = 0.05
Significance Value = 3.841
Calculated Value = 169.28

RESULT:
Hence the Calculated value which is 169.28 is greater than the table value
which is 3.841 at 0.05 df. So, Null Hypothesis is rejected. It is proved that,
“Project would help people to maintain their offices”

80 | P a g e

Q2) Does this project help people to make the security more reliable.
Null hypothesis:
There is no significant difference among the opinions of people about that
they think that this project help them to make the security more r eliable
Description Yes No Total
Fo 190 10 200
Fe 100 100 200

Formula:
X² = ∑ (fo -fe) ²
fe

X² = (190-100)² + (10-100)²
100 100

X² = (90)² + (-90)²
100 100

X² = 8100 + 8100
100 100

X² = 81 + 81

X² = 16 2 Calculated Value.
Now find Degree of freedom:
df = (R -1) (C -1)
df = (2 -1) (2 -1)
df = 1 x 1
df = 1
Level of Significance = 0.05
Significance Value = 3.841
Calculated Value = 162

RESULT:
Hence the Calculated value which is 162 is greater than the table value
which is 3.841 at 0.05 df. So, Null Hypothesis is rejected. It is proved that,
“Project help people to make the security more reliable”

81 | P a g e

Q3) Does the RIFD is the better tool for security purpose.
Null hypothesis:
There is no significant difference among the opinions of people about that
they think that the RIFD is the better tool for security purpose
Description Yes No Total
Fo 178 22 200
Fe 100 100 200

Formula:
X² = ∑ (fo -fe) ²
fe

X² = (178-100)² + (22-100)²
100 100

X² = (78)² + (-78)²
100 100

X² = 6084 + 6084
100 100

X² = 60.84 + 60.84

X² = 121.68 Calculated Value.
Now find Degree of freedom:
df = (R -1) (C -1)
df = (2 -1) (2 -1)
df = 1 x 1
df = 1
Level of Significance = 0.05
Significance Value = 3.841
Calculat ed Value = 121.68

RESULT:
Hence the Calculated value which is 121.68 is greater than the table value
which is 3.841 at 0.05 df. So, Null Hypothesis is rejected. It is proved that,
“The RIFD is the better tool for security purpose.”

82 | P a g e

Q4) Does it is reliable to you that your information is being monitored by
the owner.
Null hypothesis:
There is no significant difference among the opinions of people about that
they think that it is reliable to them that their information is being
monitored by the owner.
Description Yes No Total
Fo 140 60 200
Fe 100 100 200
Formula:
X² = ∑ (fo -fe) ²
fe

X² = (140-100)² + (60-100)²
100 100

X² = (40)² + (-40)²
100 100

X² = 1600 + 1600
100 100

X² = 16 + 16

X² = 32 Calculated Value.

Now find Degree of freedom:
df = (R -1) (C -1)
df = (2 -1) (2 -1)
df = 1 x 1
df = 1
Level of Significance = 0.05
Significance Value = 3.841
Calculated Value = 32
RESULT:
Hence the Calculated value which is 32 is greate r than the table value which
is 3.841 at 0.05 df. So, Null Hypothesis is rejected. It is proved that,
“It is reliable to them that their information is being monitored by the
owner.”

83 | P a g e

Q5) if you were own any office so does it fell easy to control that office just
using smart phone.
Null hypothesis:
There is no significant difference among the opinions of people about that
they think that if they were own any office so it fell easy to control that
office just using smart phone.
Description Yes No Total
Fo 149 51 200
Fe 100 100 200
Formula:
X² = ∑ (fo -fe) ²
fe

X² = (149-100)² + (51-100)²
100 100

X² = (49)² + (-49)²
100 100

X² = 2401 + 2401
100 100

X² = 24.01 + 24.01

X² = 48.02 Calculated Value.

Now find Degree of freedom:
df = (R -1) (C -1)
df = (2 -1) (2 -1)
df = 1 x 1
df = 1
Level of Significance = 0.05
Significance Value = 3.841
Calculated Value = 48.02
RESULT:
Hence the Calculated value which is 48.02 is greater than the table value
which is 3.841 at 0.05 df. So, Null Hypothesis is rejected. It is proved that,
“If they were own any office so it fell easy to control that office just
using smart phone.”

84 | P a g e

Q6) Does you feel secured as employee to work in that secured environment.
Null hypothesis:
There is no significant difference among the opinions of people about that
they think that they feel secured as employee to work in that secured
environment.
Description Yes No Total
Fo 165 35 200
Fe 100 100 200
Formula:
X² = ∑ (fo -fe) ²
fe

X² = (165-100)² + (35-100)²
100 100

X² = (65)² + (-65)²
100 100

X² = 4225 + 4225
100 100

X² = 42.25 + 42.25

X² = 84.5 Calculated Value.

Now find Degree of freedom:
df = (R -1) (C -1)
df = (2-1) (2 -1)
df = 1 x 1
df = 1
Level of Significance = 0.05
Significance Value = 3.841
Calculated Value = 84.5

RESULT:
Hence the Calculated value which is 84.5 is greater than the table value
which is 3.841 at 0.05 df. So, Null Hypothesis is rejected. It i s proved that,
“They feel secured as employee to work in that secured environment.”

85 | P a g e

Q7) Is it that great that with that system you can save your electricity.
Null hypothesis:
There is no significant difference among the opinions of people about that
they think is it that great that with that system they can save their
electricity.
Description Yes No Total
Fo 155 45 200
Fe 100 100 200
Formula:
X² = ∑ (fo -fe) ²
fe

X² = (155-100)² + (45-100)²
100 100

X² = (55)² + (-55)²
100 100

X² = 3025 + 3025
100 100

X² = 30.25 + 30.25

X² = 60.5 Calculated Value.

Now find Degree of freedom:
df = (R -1) (C -1)
df = (2 -1) (2 -1)
df = 1 x 1
df = 1
Level of Significance = 0.05
Significance Value = 3.841
Calculated Value = 60.5

RESULT:
Hence the Calculated value which is 60.5 is greater than the table value
which is 3.841 at 0.05 df. So, Null Hypothesis is rejected. It is proved that,
“Is it that great that with that system they can save their electricity.”

86 | P a g e

Chapte r 6

6.1 Findings:

1. One Ninty Two percent of the respondents said YES about that Project would help
people to maintain their offices and eight percent said NO.
2. One Ninty percent of the respondents said YES about that Project help people to make
the security more reliable and Ten said NO.
3.One Seventy Eight percent of the respondents said YES about that The RIFD is the
better tool for security purpose and Twenty Two said NO.
4. One Fourty percent of the responden ts said YES about that It is reliable to them that
their information is being monitored by the owner and Sixty said NO.
5. One Fourty Nine percent of the respondents said YES about that if they were own any
office so it fell easy to control that office just using smart phone and Fifty One said NO.
6.One Sixty Five percent of the respondents said YES about that They feel secured as
employee to work in that secured environment and Thirty Five said NO.
7. One Fifty Five percent of the respondents said YES about that is it that great that with
that system you can save your electricity and Fourty Five percent said NO.

87 | P a g e

6.2 Conclusion :

In Conclusion, we presented the idea of cloud based security and computerization
framework. The framework is intended to oversee and screen the entrance control and
Lighting over system in an office situation. The fundamental advantage of the framework
is a method for dealing with the entrance control all the more successfully. Any Android
based Smart phone with inherent backing for Wi -Fi can be utilized to get to and control
the gadgets anyplace. The task incorporates the Interfacing of RFID Reader module with
entryway for access. Both application mode and desktop mode includes an appealing and
natural plan that intends to being Security and Office robotization innovation simple to
work by anybody. The associated GUIs are synchronized to the control board. IT
demonstrates the continuous switches status. The framework is outlined in easy to
understand interface. The simple to utilize interface on Window and Application GUI
gives straightforward control to the client. Cameras stream live video from your nearby
system to the Internet and you can watch that video on a PC, or advanced mobile phone.
We made this versatile applic ation with incredible alert and to make it exceptionally easy
to use. Security System Features This framework can be physically worked with the
utilization of pc or utilizing the Android application through Cloud client can get to it all
around .Security S ystem can be booked to switch on and switch off at indicated time of
day. For instance it can be exchanged on at 9:00 PM night and exchanged off at 6:00 AM
as indicated by the client necessity. Little organizations can profit by this sort of model in
light of the fact that it doesn't require a major IT or security groups to get it up and
running.

88 | P a g e

Chapter 7

7.1 Future Work / Recommendation (if any)

This system is scalable and there are multiple things that we can add to create it as
good as possible. We can used motion sensor to ensure the high level security. We
also can used retina scanner instead of RFID card to create more reliable security . We
also can used special cameras to keep an eye on the activities of the employee. This
project will be more efficient for the filtering the internet and check & balance
towards the employee.

89 | P a g e

Chapter 8

8.1 Appendix

1. https://archive.nyu.edu/handle/2451/14762
2. http://www.researchgate.net/publication/261131296_Smart_home_automation
3. http://www.slideshare.net/olafusimichael/500project1
4. http://www.ijettjournal.org
5. http://www.theworkdept.com
6. http://www.warse.org
7. http://sparkfun28.rssing.com
8. http://circuitmath.com/
9. http://www.arra -al.com/
10. https://www.creatroninc.com/
11. https://www.arduino.cc
12. https://www.britannia.com/
13. https://electronhobbies.com/
14. http://table -info.blogspot.com/
15. https://ugpro143.blogspot.com/
16. https://www.cheers4all.com/
17. http://www.centralelectro.com/
18. https://www.dfrobot.com/

90 | P a g e

8.2 Questioner

1. What did you think that this project would help people to maintain their
offices? (Yes and No)

ANS._________________
2. Does this project help us to make the security more reliable?
(Yes and No)

ANS._________________
3. Does the RIFD is the better tool for security purpose?
(Yes and No)
ANS._________________
4. Does it is reliable to you that your information is being monitored by the
owner? (Yes and No)
ANS._________________
5. If you were o wn any office and does it fell easy to control that office just
using smart phone?
(Yes and No)
Ans._________________
6. Does you feel secured as employee to work in that secured environment?
(Yes and No)

Ans._________________
7. Is it that great that with that system you can save your electricity?
(Yes and No)

Ans._________________

91 | P a g e

Final Snapshots of Project

Figure 27: Login page

92 | P a g e

Figure 29: Main Page
Figure 28: Live Streaming with cloud switch

93 | P a g e

Figure 31: Live Streaming
Figure 30: Database

Similar Posts