Intelligent Security System in A Campus Building Using RFID to Improve Security for Elevator Users

D. Desmira, Department of Electrical Engineering, Universiti Teknikal Malaysia Melaka, Durian Tunggal, Malaysia
Mustofa Abi Hamid, Department of Electrical Engineering Vocational Education, Universitas Sultan Ageng Tirtayasa, Indonesia
Lilis Noviawati, Department of Electrical Engineering Vocational Education, Universitas Sultan Ageng Tirtayasa, Indonesia
Tb. Ai Munandar, Department of Informatics, Universitas Bhayangkara Jakarta Raya, Jakarta Selatan, Indonesia
M. Martias, Universitas Bina Sarana Informatika, Jakarta, Indonesia, Indonesia
Didik Aribowo, Department of Electrical Engineering Vocational Education, Universitas Sultan Ageng Tirtayasa, Indonesia

Abstract


This study aims to develop an intelligent system of elevator access with RFID (Radio Frequency Identification) using fuzzy logic as an intelligent system, a safety controller of elevator doors that will open when the power goes out. This research made an Arduino Uno-based elevator access system with an RFID card using fuzzy logic as an intelligence system and markers for each floor. Each floor has an RFID card that contains the information data of each floor.  This research uses research and development (R&D) methods with a waterfall development model. The research procedure consists of several stages, namely the requirement analysis stage, design, implementation, testing, operation, and maintenance. Based on the research and development of the elevator control intelligent system, it can be concluded that the intelligent control lift system was developed using a waterfall model. integration and system testing includes RFID-RC522 reading distance testing, component function testing, and RFID response time measurement testing. The test results show that the RFID-RC522 is readable, and the RFID response time is fast. In addition, the components and all features function well as an elevator control system.


Keywords


RFID; intelligent security; elevator; security system; control system

Full Text:

PDF

References


M. M. Hossain and V. R. Prybutok, “Consumer acceptance of RFID technology: An exploratory study,” IEEE Transactions on Engineering Management, vol. 55, no. 2, pp. 316–328, 2008, doi: 10.1109/TEM.2008.919728.

D. Trček and P. Jäppinen, “RFID Security,” in RFID and Sensor Networks, 1st Editio., Y. Zhang, L. T. Yang, and J. Chen, Eds. CRC Press, 2009, pp. 167–188.

D. Desmira, M. A. Hamid, N. A. Bakar, M. Nurtanto, and S. Sunardi, “A smart traffic light using a microcontroller based on the fuzzy logic,” IAES International Journal of Artificial Intelligence, vol. 11, no. 3, pp. 809–818, 2022, doi: 10.11591/ijai.v11.i3.pp809-818.

X. P. Zhang and R. Gu, “Electrical energy consumption forecasting based on cointegration and a support vector machine in China,” WSEAS Transactions on Mathematics, vol. 6, no. 12, pp. 818–883, 2007.

E. Welbourne et al., “Building the internet of things using RFID: The RFID ecosystem experience,” IEEE Internet Computing, vol. 13, no. 3, pp. 48–55, 2009, doi: 10.1109/MIC.2009.52.

R. Hossain, M. Ahmed, M. Alfasani, and H. U. Zaman, “An Advanced Security System Integrated With RFID Based Automated Toll Collection System,” 2017, doi: 10.1109/ACDT.2017.7886158.

R. Zhang, “A transportation security system applying RFID and GPS,” Journal of Industrial Engineering and Management, vol. 6, no. 1, pp. 163–174, 2013, doi: 10.3926/jiem.668.

F. Tun, M. Aqil, M. Fadzir, H. Mansor, T. S. Gunawan, and Z. Janin, “Development of School Bus Security System Based on RFID and GSM Technonologies for Klang Valley Area,” in 2018 IEEE 5th International Conference on Smart Instrumentation, Measurement and Application (ICSIMA), 2018, no. November, pp. 1–5, doi: 10.1109/ICSIMA.2018.8688783.

A. T. Noman, S. Hossain, S. Islam, M. E. Islam, N. Ahmed, and M. A. Mahmud Chowdhury, “Design and Implementation of Microcontroller Based Anti-Theft Vehicle Security System using,” in 4th International Conference on Electrical Engineering and Information and Communication Technology, iCEEiCT 2018, 2019, pp. 97–101, doi: 10.1109/CEEICT.2018.8628051.

Z. Pala and N. Inanç, “Smart parking applications using RFID technology,” 2007, doi: 10.1109/RFIDEURASIA.2007.4368108.

W. Yao, C. H. Chu, and Z. Li, “The adoption and implementation of RFID technologies in healthcare: A literature review,” Journal of Medical Systems, vol. 36, no. 6, pp. 3507–3525, 2012, doi: 10.1007/s10916-011-9789-8.

B. S. Vijayaraman and B. A. Osyk, “An empirical study of RFID implementation in the warehousing industry,” The International Journal of Logistics Management, vol. 17, no. 1, pp. 6–20, 2006, doi: 10.1108/09574090610663400.

S. Shah and B. Singh, “RFID Based School Bus Tracking and Security System,” in International Conference on Communication and Signal Processing, ICCSP 2016, 2016, pp. 1481–1485, doi: 10.1109/ICCSP.2016.7754404.

G. K. Verma and P. Tripathi, “A Digital Security System with Door Lock System Using RFID Technology,” International Journal of Computer Applications, vol. 5, no. 11, pp. 6–8, 2010, doi: 10.5120/957-1334.

A. K. Biswal, M. Jenamani, and S. K. Kumar, “Warehouse efficiency improvement using RFID in a humanitarian supply chain: Implications for Indian food security system,” Transportation Research Part E: Logistics and Transportation Review, vol. 109, pp. 205–224, Jan. 2018, doi: 10.1016/J.TRE.2017.11.010.

J. Vaˇsˇc´ak and J. Hvizdoˇ, “Vehicle Navigation by Fuzzy Cognitive Maps Using Sonar and RFID Technologies,” pp. 75–80, 2016.

S. Kim, S. Kim, B. Kim, and H. Kim, “A Study on the Development of a Home Mess-Cleanup Robot Using an RFID Tag-Floor,” vol. 11, no. 2, pp. 508–516, 2010.

Y. J. Huang, C. Y. Chen, B. W. Hong, T. C. Kuo, and H. H. Yu, “Fuzzy neural network based RFID indoor location sensing technique.”

M. Al-zewairi, D. Suleiman, and A. Shaout, “Multilevel Fuzzy Inference System for Risk Adaptive Hybrid RFID Access Control System,” pp. 1–7, 2016, doi: 10.1109/CCC.2016.9.

D. Desmira, M. A. Hamid, Irwanto, S. D. Ramdani, and T. Y. Pratama, “An ultrasonic and temperature sensor prototype using fuzzy method for guiding blind people,” Journal of Physics: Conference Series, vol. 1446, no. 1, p. 012045, Jan. 2020, doi: 10.1088/1742-6596/1446/1/012045.

M. A. Hamid, E. Permata, D. Aribowo, I. A. Darmawan, M. Nurtanto, and S. Laraswati, “Development of cooperative learning based electric circuit kit trainer for basic electrical and electronics practice,” in Journal of Physics: Conference Series, 2020, vol. 1456, p. 12047, doi: 10.1088/1742-6596/1456/1/012047.

K. Petersen, C. Wohlin, and D. Baca, “The waterfall model in large-scale development,” in Lecture Notes in Business Information Processing, 2009, vol. 32 LNBIP, pp. 386–400, doi: 10.1007/978-3-642-02152-7_29/COVER.

M. A. Hamid, S. A. Rahman, I. A. Darmawan, M. Fatkhurrokhman, and M. Nurtanto, “Performance efficiency of virtual laboratory based on Unity 3D and Blender during the Covid-19 pandemic,” Journal of Physics: Conference Series, vol. 2111, no. 1, p. 012054, Nov. 2021, doi: 10.1088/1742-6596/2111/1/012054.

R. S. Pressman, Software Engineering: A Practitioner’s Approach , 6th Edition. New York: McGraw Hill, 2005.




DOI: https://doi.org/10.21831/elinvo.v8i1.57848

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Elinvo (Electronics, Informatics, and Vocational Education)

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Our Journal indexed by:

ISSN 2477-2399 (online) || ISSN 2580-6424 (print)

View My Stats

Flag Counter