0% found this document useful (0 votes)
82 views

Automatic Secure Door Lock

The document describes an automatic secure door lock system that can be controlled remotely through a web interface. Key features include user authentication, remote locking and unlocking of the door, real-time monitoring of the door status, security measures to prevent unauthorized access, and handling errors and alerts. The system will be implemented by setting up the hardware, developing the backend and user interface software, integrating the components, testing functionality and security, and deploying the system on a server.

Uploaded by

sy.anjamnoor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views

Automatic Secure Door Lock

The document describes an automatic secure door lock system that can be controlled remotely through a web interface. Key features include user authentication, remote locking and unlocking of the door, real-time monitoring of the door status, security measures to prevent unauthorized access, and handling errors and alerts. The system will be implemented by setting up the hardware, developing the backend and user interface software, integrating the components, testing functionality and security, and deploying the system on a server.

Uploaded by

sy.anjamnoor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 47

QUAID-I-AZAM UNIVERSITY

ISLAMABAD

AUTOMATIC SECURE DOOR LOCK

By:

SIDRA NIAZ 40507203032

Supervisor:

(TABASSUM BIBI)

Bachelor of Science in Computer Science (BSCS)


i
DECLARATION
We hereby declare that this project has not been copied in whole or in part by any supporting
source. It is further announced that we have developed this project and therefore this report is
based entirely on our personal understanding and efforts under the supervision of our supervisor
and co-supervisor. No portion of the work presented during this report has been offered in
support of his or her other degree or qualification from another university or institute of learning,
if found we will be responsible.

Signature:

ii
DEDICATION
I dedicate my dissertation work to my family and many friends. A special feeling
of gratitude to my loving parents whose words of encouragement and push for
tenacity ring in my ears.
I also dedicate this dissertation to my friends who have supported me throughout
the process. I will always appreciate all they have done.

iii
EXORDIUM

In the name of Allah, the Compassionate,


The Merciful.

Praise be to Allah, Lord of Creation,


The Compassionate, the Merciful,
King of Judgment-day!

You alone we worship, and to you alone we pray for


help,
Guide us to the straight path

The path of those who you have favored,

Not of those who have incurred your wrath,


Nor of those who have gone astray.

iv
Executive Summary
An automatic secure door lock based on the web is a cutting-edge security solution
that utilizes the power of the internet and a single-board computer to control and
secure access to a door.
The system can be controlled through a web interface, which can be accessed from
any device with internet access, such as a smartphone, tablet, or computer. This
allows users to remotely grant or revoke access to the door, making it ideal for use
in homes, offices, and secure facilities. The web interface is designed to be user-
friendly, with a simple and intuitive interface that makes it easy for users to
manage access to the door.

The system is designed to be highly secure, with features such as encrypted


communications, secure user authentication, and the ability to log and track access
attempts. This ensures that unauthorized access to the door is prevented, and that
sensitive information, such as user codes and biometric data, is protected.

v
Acknowledgement
All praise is to Almighty Allah who bestowed upon us a minute portion of His
boundless knowledge by virtue of which we were able to accomplish this
challenging task.

We are greatly indebted to our project supervisor “Tabassum Bibi”. Without their
personal supervision, advice and valuable guidance, completion of this project
would have been doubtful. We are grateful to them for their encouragement and
continual help during this work.

And we are also thankful to our parents and family who have been a constant
source of encouragement for us and brought us with the values of honesty & hard
work

TABASSUM BIBI SIDRA NIAZ

---------------------- ----------------------

vi
TABLE OF CONTENTS

1. INTRODUCTION: 1

1.01 Project Overview: 2

1.02 Key Features: 2

1.03 Implementation Steps: 3


1.04 User Authentication: 4
1.05 Remote Door Control: 4
1.06 Real-time Door Status Monitoring: 4
1.07 User Management: 4
1.08 Security Measures: 5
1.09 Error Handling and Alerts: 5
1.10 Compatibility and Responsiveness: 5
1.11 System Performance: 5
1.12 Documentation and Help: 6
1.13 Non-Functional Requirements: 6
1.14 Hardware Requirements: 7

2. SYSTEM DESCRIPTION: 8

2.01 Adopted Methodology: 10

2.02 Software Requirements: 12

2.03 System Limitations/Constraints: 12

3. SOFTWARE REQUIREMENT SPECIFICATION (SRS): 13

3.01 Problem Statement: 14

3.02 Problem Solution: 14

3.03 Objectives of the Proposed System: 15

vii
3.04 Scope: 15
3.05 Modules: 16
4. SYSTEM DESIGN: 19

4.01 Introduction: 20

4.02 Requirement Identifying Technique: 20

4.03 Use case diagram: 21


4.04 Event- response table: 24
4.05 DFD: 25
4.06 ERD: 28

5. DESIGN AND ARCHITECTURE: 30

4.01 System Analysis and Design: 31

4.02 Architecture Diagram: 31

4.03 Design Model: 32


4.04 Context Diagram: 33
4.05 Data Design: 33

6. TESTING AND EVALUATION: 34

5.01 Modules Testing: 35

5.02 Integration Testing: 35

5.03 Approval Testing: 36


5.04 Hardware Testing: 36

7. REFERENCES: 37

viii
ix
CHAPTER 1
INTRODUCTION

1
1. Introduction:
Nowadays, technology plays an essential role in our life in which different domain of

interests are taking advantage of technology. Recently, computers and smart phones have

significantly contributed our daily life where numerous computations and adjustments are being

accomplished by such technologies. Securing homes has become one of the concerning issues

that facing many people. With the expanded duration of leaving the home due to work, study and

other duties, homes are being more vulnerable for several threats especially being burgled. Apart

from the threats, there are different cases where securing or monitoring the house is very critical

such as the existence of elderly individuals or kids with baby sitter. For this manner, home

security system or so-called Home OS has been proposed in order to provide more secure

arrangements. Such concept aims to turn the home into a smart in which different tasks

especially monitoring can be performed remotely. Monitoring and controlling some tasks inside

the house would have the ability to provide maximum safety.

1.1 Project Overview:


Objective: To design a web-based interface for controlling an automatic secure door lock system.

1.2 Key Features:

 User Authentication: Implement a secure login system to authenticate users before

granting access to the door controls.

 Remote Locking/Unlocking: Provide options to remotely lock and unlock the door

through the web interface.

 Real-time Status Updates: Display the current status of the door (locked/unlocked) in

real-time on the web interface.

 Security Measures: Ensure robust security measures such as encryption, secure

2
authentication protocols, and user authorization to prevent unauthorized access.

 Error Handling and Alerts: Implement error handling mechanisms and alerts for

situations like unauthorized access attempts, system failures, etc.

1.3 Implementation Steps:

 Hardware Setup: Connect the electronic door lock system to the microcontroller. Set up

any additional sensors if required.

 Software Development:

 Backend Development: Create APIs for communication between the web interface and

the door lock system.

 User Interface: Design a user-friendly web interface allowing users to log in, view door

status, and control the lock remotely.

 Database Management: Implement a database to store user credentials, access logs, and

door status information securely.

 Integration: Integrate the hardware and software components to ensure seamless

communication between the web interface and the door lock system.

 Testing and Security Checks: Conduct thorough testing to ensure proper functionality

and security. Test scenarios involving different user actions and edge cases. Implement

security measures and protocols to safeguard against potential vulnerabilities.

 Deployment: Deploy the system on a reliable server and ensure it can handle concurrent

user access without compromising performance or security.

3
1.4 User Authentication:

 Login/Logout: Users should be able to log in securely using credentials

(username/password or other authentication methods) and log out when the session ends.

 User Roles: Admin, regular users, or different privilege levels to control access and

permissions.

1.5 Remote Door Control:

 Lock/Unlock Functionality: Users with appropriate permissions can remotely lock and

unlock the door through the web interface.

 Confirmation: Provide feedback to users confirming the successful execution of

lock/unlock commands.

1.6 Real-time Door Status Monitoring:

 Status Display: Display the current status of the door (locked/unlocked) in real-time on

the web interface.

 Refresh Mechanism: Automatically or manually refresh door status to reflect any

changes made outside of the web interface.

1.7 User Management:

 User Registration: Allow authorized users to register new accounts.

 Password Management: Enable users to reset passwords and maintain secure password

policies.

 User Profile Management: Users should be able to update their profiles and manage

4
their information.

1.8 Security Measures:

 Encryption: Use secure communication protocols (HTTPS, SSL/TLS) to encrypt data

transmission between the web interface and the door lock system.

 Access Control: Implement measures to prevent unauthorized access, including brute

force protection, session management, and secure data storage.

 Logging and Auditing: Maintain logs of user activities, access attempts, and system

events for auditing and troubleshooting purposes.

1.9 Error Handling and Alerts:

 Error Messages: Provide clear and informative error messages for invalid login

attempts, system errors, or other issues.

 Alerts and Notifications: Send notifications/alerts to authorized personnel in case of

security breaches, system failures, or suspicious activities.

1.10 Compatibility and Responsiveness:

 Cross-browser Compatibility: Ensure the web interface works well across different web

browsers (Chrome, Firefox, Safari, etc.).

 Responsiveness: Design a responsive interface that adapts to various device screens

(desktop, tablet, mobile) for ease of access.

1.11 System Performance:

 Response Time: Ensure quick response times for locking/unlocking actions and status

5
updates.

 Scalability: Design the system to handle multiple concurrent users without

compromising performance.

1.12 Documentation and Help:

 User Guide: Provide comprehensive documentation explaining how to use the system,

troubleshoot common issues, and contact support.

 Support Channel: Offer a support system or help desk for users to seek assistance if

needed.

1.13 Non-Functional Requirements:

 Performance Requirements:

The system must be interactive and the delays involved must be less. So, in every action-

response of the system, there are no immediate delays. In case of opening windows forms, of

popping error messages and saving the settings or sessions there is delay much below 2

seconds, in case of opening databases, sorting questions and evaluation there are no delays

and the operation is performed in less than 2 seconds for opening sorting, computing, posting

> 95% of the files. Also, when connecting to the server the delay is based editing on the

distance of the 2 systems and the configuration between them so there is high probability that

there will be or not a successful connection in less than 20 seconds for sake of good

communication.

 Safety Requirements

Information transmission should be securely transmitted to server without any changes in

information.

 Security Requirements:

6
As the system provides the right tools for discussion, problem solving it must be made sure

that the system is reliable in its operations and for securing the sensitive details.

 Software Quality Attributes:

There are some Software Quality Attributes which are given below:

 Availability:

If the internet service gets disrupted while sending information to the server, the information

can be sent again for verification.

 Security:

The main security concern is for users account hence proper login mechanism should be used

to avoid hacking. The tablet id registration is way to spam check for increasing the security.

Hence, security is provided from unwanted use of recognition software.

 Usability:

As the system is easy to handle and navigates in the most expected way with no delays. In

that case the system program reacts accordingly and transverses quickly between its states.

1.14 Hardware Requirements:

PROCESSOR PENTIUM 4, 1.2 GHz


RAM 2GB
MONITOR 17” COLOR
HARD DISK 80GB
KEYBOARD STANDARD 102 KEYS
MOUSE 3 BUTTONS

7
CHAPTER 2
SYSTEM DESCRIPTION

8
2 Productive Perspective:

The primary objective of an automatic secure door lock system is to provide heightened security.

By integrating this system with web-based controls, it allows for convenient and secure remote

access management. This perspective ensures that only authorized individuals can control access

to the secured area.

 Convenience and Accessibility: The web-based interface offers a convenient means of

managing door access remotely. Authorized users can lock or unlock doors from anywhere

with an internet connection, eliminating the need for physical keys or direct access.

 Real-time Monitoring and Control: The project provides a productive perspective by

enabling real-time monitoring of door status. Users can instantly check whether the door is

locked or unlocked and take action accordingly, enhancing control and security measures.

 Scalability and Integration: This project can be expanded or integrated with other systems.

For instance, it could be integrated with smart home automation, security systems, or office

access control systems, providing a scalable solution that can adapt to various environments.

 Efficiency and Time-saving: Automating the door lock system through a web interface

saves time and effort. Users can manage multiple access points simultaneously, reducing the

need for physical checks or manual locking/unlocking procedures.

 Data Logging and Analysis: The system can log user access, providing valuable data for

analysis. It can track entry and exit times, user activities, and access attempts, enabling

administrators to assess patterns, improve security protocols, and enhance overall system

efficiency.

 Customization and User Management: The web-based nature of the project allows for

9
customization and efficient user management. It enables administrators to easily add or

remove user access, modify privileges, and update security settings as needed.

 Technological Advancement and Innovation: Implementing an automatic secure door lock

web project showcases the integration of IoT, web development, and security technologies. It

represents an innovative approach that aligns with technological advancements and modern

security trends.

 Remote Troubleshooting and Maintenance: With remote access to the system,

administrators can perform troubleshooting and maintenance tasks without being physically

present. This capability streamlines the maintenance process and reduces downtime.

2.1 Adopted Methodology


Definition:
“Methodology is a framework that is used to structure, plan and control the process developing
an information system”.
VU process model is a combination of the waterfall and spiral model.
Waterfall model:
Waterfall model is the first process model to be introduced. This model is also known as linear
sequential model or classic life cycle model. It consists of five stages.

1. Requirement definition:
In this stage, the systems services, constraints and goals are established by consultation with
system users.

2. System and software design:


In this stage, we conceptualize overall system architecture.

3. Implementation and unit testing:


In this stage the software design is realized as a set of programs or program units.

10
4. Integration and system testing:
In this stage, the individual program unit or programs are integrated and tested as a complete
system to ensure that the system requirements have been met.

5. Operation and maintenance:


Maintenance means correcting errors which were not discovered in earlier stages.
Spiral model:
It is a form of incremental model. In this model, main emphasis is given on risk analysis. It is
used for large and complicated projects. Generally, the spiral model has four phases: planning,
risk analysis, development, and evaluation. Planning phase covers scope, requirement and
functionality of the system. Second phase risk analysis is most important phase. Development
phase covers the designing, coding and testing and finally the application is delivered to client
for further evaluation
.

Methodology development model

11
2.2 Software Requirements:

Operating System Windows 10 Professional


Environment MS Visual Studio 2019
Language PHP
Web technology PHP
Backend PHP

2.3 System Limitations/Constraints

1) Internet connectivity requirement: The proposed door lock system requires a stable and

reliable internet connection for remote access and control, which may not be available in all

locations.

2) Compatibility with existing locks: The proposed system may not be compatible with all types

of existing door locks and may require additional hardware for installation.

3) Technical skill requirement: Installation and setup of the system may require technical skill

and knowledge, making it difficult for some users to install and use.

4) Cost: The cost of the proposed system may be higher compared to traditional keyed locks or

simple electronic locks.

5) Security risks: The proposed system relies on secure web-based access and control, which

can be vulnerable to cyber threats such as hacking and malicious software.

6) Privacy concerns: The collection and storage of user data, including access logs, may raise

privacy concerns for some users.

7) Power outages: The proposed system may be impacted by power outages, rendering it

12
temporarily inoperable.

CHAPTER 3
SOFTWARE REQUIREMENT
SPECIFICATION (SRS)

13
3 Problem Definition

This chapter discusses the precise problem to be solved. It should extend to include the outcome.

3.1 Problem Statement

Carrying keys every time with us or forgetting lock door while leaving home is an issue that

needs some attention. We need some kind of solution that lets us lock and unlock our door using

mobile devices or web portal in secure way that only the authorized user can access the security

of our doors. The development of this software system is aimed at solving this problem by

providing a secure, flexible, and convenient means of remote access and control for door locks.

The system utilizes a web-based user interface for remote access and control, as well as secure

authentication and authorization mechanisms to ensure the privacy and security of user data.

The goal is to provide a reliable and secure door lock system that can be easily installed and

used, and which offers the flexibility and convenience of remote access and control.

3.2 Problem Solution

 Online secure door lock system will provide it’s user the ease of use to unlock and lock

their door from anywhere in the world our application will connect with internet and

provide it’s user with a friendly interface that he/she can use to interact with it and lock

or unlock their door.

 Remote Access and Control To provide users with the ability to remotely access and

control their door locks using a web-based user interface.

 Security and Privacy to ensure the privacy and security of user data by incorporating

14
secure authentication and authorization mechanisms.

 Ease of Use to design a user-friendly interface that is easy to use, even for those with

limited technical knowledge.

 Reliability to develop a software system that is reliable, robust, and resistant to failure,

with a focus on error handling and recovery mechanism

3.3 Objectives of the Proposed System

 No stressing if we miss keys at home or forget to lock the door while leaving

 Providing a safe and secure way to lock and unlock doors

 To provide a secure and convenient means of remote access and control for door locks.

 To design a user-friendly web-based interface for accessing and controlling door locks.

 To incorporate robust and secure authentication and authorization mechanisms to ensure

the privacy and security of user data.

 To develop a reliable and scalable system that can support a large number of door locks

and users.

 Avoiding any untheorized person to enter your home

 Or simply unlocking the door from anywhere around the world if we want someone to

enter without keys

3.4 Scope

Online Secure Door Lock is created to provide user ease of use in their daily life by simply

providing them a secure and safe way to lock and unlock their doors from anywhere this project

is developed as the final requirement of BSCS degree and will be completed in 2 semester period

15
meaning 8 months.

The scope of the proposed project the design and implementation of a secure, scalable, and user-

friendly software system for remote access and control of door locks.

3.5 Modules

The proposed project, the automated secure door lock based on a web application, consists of the

following modules:

Client Web App:

 User Login/Registration: Users can create an account and log in to the system to access

and control their door locks.

 Door Lock Management: Users can view the status of their door locks and lock/unlock

them remotely through the web interface.

 Event Logs: Users can view a log of events related to their door locks, including

lock/unlock events and unauthorized access attempts.

 Access Management: Users can grant and revoke access permissions to others, enabling

flexible management of who has access to the premises.

 Notifications: Users will receive real-time notifications of events related to their door

locks, including alerts for unauthorized access attempts.

3.6 Admin Web App:

 User Management: The administrator can manage users, including adding new users,

editing user information, and deactivating accounts.

 Access Management: The administrator can manage access permissions for users,

including granting and revoking access to door locks.

16
 Event Logs: The administrator can view a log of all events related to the door locks,

including lock/unlock events and unauthorized access attempts.

 Notifications: The administrator will receive notifications of events related to the door

locks, including alerts for unauthorized access attempts.

Module 1:

User Management Module:

 User registration and login

 Profile management

 Role-based access control

 forgotten password recovery

Module 2:

Door Lock Management Module:

 Real-time lock status monitoring

 Remote lock/unlock control

 Log tracking of lock activities

 Scheduling of lock operation

Module 3:

Access Management Module:

 Creation and management of access codes

 Assigning access codes to users

17
 Revoking access codes

 Setting access code expiration dates

Module 4:

Notification Module:

 Real-time notifications for lock events

 Configurable notifications for specific events

 Email notifications

Module 5:

Admin Management Module:

 Managing user accounts

 Managing door lock devices

 Managing access codes

 Managing notifications and reporting.

18
CHAPTER 4
SYSTEM DESIGN

19
4 Requirement Analysis

4.1 Introduction:

The requirement analysis is an important phase in the software development life cycle as it helps

to identify and understand the needs of the stakeholders and users. This chapter provides an in-

depth analysis of the requirements for the automated secure door lock based on web application.

It outlines the functional and non-functional requirements, user needs and expectations, and

technical requirements necessary to develop a high-quality and effective solution. The

requirements are analyzed to ensure that the project meets the desired objectives and delivers the

desired outcomes. The result of the requirement analysis will be used to guide the design and

development of the system.

4.2Requirement Identifying Technique

There are various requirement identifying techniques that can be used. Some of the popular ones

are Use case analysis, Event-Response Table, Functional Requirements, For instance,

20
4.3Use case diagram

Login

User
Add User

Lock Door

View Status

Delete User

Unlock Door

21
Use Case ID: Enter a unique numeric identifier for the Use Case. e.g. UC-1
Use Case Name: A descriptive name for the use case, such as "Unlock Door".
Actors: The actor or user that initiates the request to the system.
Trigger: The event that starts the use case, such as a user approaching a door
and requesting access.
Pre-conditions: Any conditions that must be met before the use case can start.
 The user must have an active account with the system.
 The user must have the necessary credentials to access the
system.
 The door lock must be properly installed and configured.
 The user's device must have an active internet connection.
Post-conditions: Any changes to the system or conditions that result from the
completion of the use case.
 Successful authentication of the user.
 Unlocking of the door.
 Recording of the user's access and time of entry.
 Secure storage of all access logs.
 Generation of reports on user activity.
 Provision of real-time notifications for authorized personnel.
 Maintenance of the system's security and privacy protocols
Normal Flow: The step-by-step description of the actions taken by the system and the
user to complete the use case.
 User accesses the door lock system through the web
application.
 User enters their login credentials to authenticate their identity.
 The system verifies the user's credentials and grants access if
they are valid.
 The user selects the door lock they want to control from the list
of available locks.
 The user selects the desired action, such as locking or unlocking
the door.
 The system carries out the requested action and displays a
confirmation message to the user.
 The user logs out of the system.

22
Alternative Flows: Any alternate paths the use case may take, such as a user being
denied access.
 If the user enters an incorrect password, the system will
prompt the user to re- enter the password.
 If the user exceeds the maximum number of attempts, the
system will lock the user out for a specified amount of time.
 If the user tries to access the door without being authorized,
the system will deny access and notify the administrator.
 If the door is not able to be locked or unlocked due to a
technical malfunction, the system will notify the administrator
for manual intervention.
 If the internet connection is lost, the system will switch to
offline mode and allow access based on pre-authorized
credentials stored on the device
Exceptions:  Any exceptional or error conditions that may occur during the
use case.
 Incorrect or invalid user credentials
 Network connectivity issues
 Lack of sufficient permissions to perform the desired action
 Technical failures or errors in the system
 User attempting to access restricted areas without proper
authorization
 Exceeding the maximum number of allowed login attempts
 Power failure or system shutdown
 User attempting to perform actions that are outside the scope
of the system.
Assumptions:  The system assumes that users have access to the internet to
use the web application
 The system assumes that users have a device capable of
accessing the web application (e.g. smartphone, computer,
tablet)
 The system assumes that the user has a valid account to
access the secure door lock functionality
 The system assumes that users have the necessary privileges
to perform specific use cases (e.g. administrator privileges for
managing users)
 The system assumes that the secure door lock hardware is

23
installed and functioning properly

4.4 Event- response table:

An event-response table for the automated secure door lock based on a web application

would outline the various events that can occur in the system and the corresponding

responses from the system.

Event System State Response


User logs in with User account exists User is granted access
correct credentials.
User logs in with User account doesn't exist User is denied access
incorrect credentials
User requests to lock door Door is unlocked Door is locked

User requests to unlock door Door is locked Door is unlocked

User loses access privilege User's access privilege User is denied access
revoked

24
4.5Data Flow Diagram

Admin Manage Users

25
Signup Users / Admin

26
Login Users / Admin

27
Door Lock Status:

4.6Entity Relationship Diagram (ERD):

Designing an Entity-Relationship Diagram (ERD) for an Automatic Secure Door Lock web

project involves identifying and illustrating the essential entities, their attributes, and

relationships within the system. Below is a conceptual ERD for such a project:

Entities:

 User

 Attributes: UserID (Primary Key), Username, Password, Email, Role

28
 Door

 Attributes: DoorID (Primary Key), DoorName, Status (Locked/Unlocked)

 Access Log

 Attributes: LogID (Primary Key), UserID (Foreign Key referencing User), DoorID

(Foreign Key referencing Door), Access Date Time, Action (Lock/Unlock)

Relationships:

 User - Access Log (One-to-Many):

 One user can have multiple access log entries (one-to-many relationship).

 Each access log entry is associated with a single user.

 Door - Access Log (One-to-Many):

 One door can have multiple access log entries (one-to-many relationship).

 Each access log entry is associated with a single door.

29
CHAPTER 5
DESIGN AND ARCHITECTURE

30
5 Design and Architecture

5.1System Analysis and Design

 Introduction
System analysis and architecture entails learning a defining in depth what system can
achieve as well as how the subsystem elements should be implemented and interact.
 System Design:
System design is the process of defining the elements of a system such as the
architecture, modules and components, the different interfaces of those components and
the data that goes through that system. It is meant to satisfy specific needs and
requirements of a business or organization through the engineering of a coherent and well
running system.
 System Architecture:
System architecture is conceptual modal describes a system’s configuration and actions.
It describes who system works and the environment of the system in a way it is the
representation of a system’s structure.
5.2Architecture Diagram

31
5.3Design Model:

Architectural models are visual representations of the system architecture that provide a

comprehensive view of the software and hardware components, the relationships between them,

and the data flows.

5.4Context Diagram:

32
5.5Data Design:

In the data design of the automated secure door lock based on the web application project the

following databases or data storage items are used:

 User database: This database stores information about the users who have access to the

secure door lock system, including their user names, passwords, access levels, and other

relevant details.

 Access logs database: This database stores a log of all door lock access events, including

the date and time of the event, the user who accessed the lock, and the status of the lock.

 Door lock status database: This database stores the current status of each door lock,

including whether it is locked or unlocked, and the date and time of the last change in

status.

 Door lock configuration database: This database stores the configuration settings for

each door lock, including the access codes or keys required to unlock the lock, and other

relevant details.

33
CHAPTER 6
TESTING AND EVALUATION

34
6 Testing and Evaluation

Testing of the system's software is compulsory and much needed to clear out all errors. It helps

us to clear out all existing errors from systems software by checking them and by making

necessary changes to clear out all factors It assists us in preventing device program failure.

Sometimes it may take much time to clear out all the errors, but after a successful testing it will

make our system to run smooth and accurate.

6.1Modules Testing:

Basically, in modules testing we divide the system's software into its subparts to check whether

all the modules working properly or not and to detect which part is disturbing the system's

software environment. It is also called unit testing or component testing. So, by this we easily

detect the errors from our sub modules by checking them separately. It saves time rather to check

whole system's software we only just check the sub module that is not working due to some

systematically errors and failure.

35
6.2Integration Testing:

After successful completion of sub-modules testing, we perform integration testing. Now in

integration test we test each module and sub module of the software and by creating interfaces

between the modules and ensuring that all the modules can communicate accurately. So, by

integration testing, system becomes more efficient and decrease the error rate. Integration testing

also ensure that all the input and output that is moving through modules is passing correctly and

smoothly with no errors.

6.3Approval Testing:

After the integration testing of the system, we perform approval testing. In approval testing, we

mainly check that the system is working correctly in the user interface or

6.4Hardware Testing

Every Piece of hardware is test through stress test to ensure that everything will work properly

after integration we fuses will be used to protect the devices from over electricity flow.

36
CHAPTER 7
REFERENCES

37
7 References

Chinwe Juliana, N. (2021). Construction of password based security door-lock system using
Arduino. Advancements in Materials, 5(2), 1. https://doi.org/10.31058/j.am.2021.52001/

Dharme, S. (2022). Door lock security system using recent technology. International Journal for
Research in Applied Science and Engineering Technology, 10(1),
684–686. https://doi.org/10.22214/ijraset.2022.39812/

Jae-seung Cho. (2015). A study on Automatic Gate Management System Digital door lock - with
a focus on QR code digital door lock development cases using MOTP -. Journal of Digital
Design, 15(1), 235–243. https://doi.org/10.17280/jdd.2015.15.1.023/

Kolluru, V. (2021). Password based Door Lock System. SSRN Electronic Journal.
https://doi.org/10.2139/ssrn.3918717/

38

You might also like