| Titre : | Access control system based on Arduino Technology |
| Auteurs : | Asma Redjouh, Auteur ; Kaouther Zebila Djoumana, Auteur ; Abdessalam Meklid, Directeur de thèse |
| Type de document : | Mémoire magistere |
| Editeur : | Biskra [Algérie] : Faculté des Sciences Exactes et des Sciences de la Nature et de la Vie, Université Mohamed Khider, 2025 |
| Format : | ill.couv.ill.encoul / 30cm |
| Langues: | Anglais |
| Langues originales: | Anglais |
| Résumé : |
Access control systems are one of the most prominent security technologies used in smart institutionsand homes, as they aim to restrict access to only authorized persons. The system also uses artificial intelligence techniques to enhance the process of verifying users' identities and resist attempts at forgery and imitation.A mobile phone application has been developed that allows the administrator to manage the process of registering authorized users, while a smart device is installed next to the door that enables the user to enter the secret code and his voice fingerprint by reading the unique generated sentence, to first verify that the spoken text matches the apparent sentence, then matches the voice.With the stored fingerprint. Upon successful verification, an encrypted password is sent via Bluetooth to the Arduino unit responsible for opening the door. The system was initially tested on a small group of users and the initial results showed good efficiency, indicating the efficiency of the system in real-world use conditions, noting some updates such as poor sentence pronunciation and loud noise. This system is characterized by a high level of security thanks to the double verification mechanism, in addition to ease of installation and low cost compared to other systems, which makesit a practical, flexible, and scalable solution to meet access control requirements within multiple environments. |
| Sommaire : |
General Introduction . 1 Chapter 1: Generalities 3 1.1 Introduction . . .4 1.2 Access control system . . 4 1.3 Types of Access Control Systems . . 5 1.3.1 Logical Access Control Systems . . . . . . . . . . . . . . . . . . . . . . . . 5 1.3.2 Physical Access Control Systems . . . . . . . . . . . . . . . . . . . . . . . 5 1.4 Traditional vs Smart Access Control Systems . . . . . . . . . . . . . . . . . . . . . 6 1.4.1 Traditional Access Control Systems . . . . . . . . . . . . . . . . . . . . . . 6 1.4.2 Smart Access Control Systems . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.5 Control board (Arduino) . . . . 12 1.5.1 Types of Arduino control board . . . . . . . . . . . . . . . . . . . . . . . . 12 1.6 Conclusion . .12 Chapter 2: Overview of the Internet of Things and Related Work 13 2.1 Introduction . . . . 14 2.2 An overview of the Internet of Things . . . . 14 2.2.1 Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 2.2.2 Applications of IoT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 2.2.3 IoT Sensors and components used in Access Control Systems . . . . . . . . 17 2.2.4 IoT Benefits and Drawbacks . . . . . . . . . . . . . . . . . . . . . . . . . . 23 2.3 Related Work . . 24 2.4 Conclusion . . . . .27 Chapter 3: System design 28 3.1 Introduction . . . 29 3.2 Problem Statement . . . . 29 3.3 Objective of project . 29 3.4 Proposed Solution and System Architecture . 30 3.5 System Diagram . . .31 3.5.1 Sequence diagram . . . . . . . . . . . . . . . . . 31 3.5.2 Flow Chart . . . . . . .. . . . . . . . 37 3.6 Conclusion . . 38 Chapter 4: Implementation and Results 39 4.3 IA Models Used in the Project . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 4.3.1 ECAPA-TDNN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 4.3.2 Meta-Llama-3-8B-Instruct . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 4.3.3 Wisper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 4.4 Systems Implementation and Interfaces . . . . . . . . . . . . . . . . . . . . . . . . 46 4.4.1 User Enrollment and Multi-Factor Authentication Workflow . . . . . . . . . 46 4.4.2 Mobile Application Development . . . . . . . . . . . . . . . . . . . . . . . 49 4.4.3 Mobile Application Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . 49 4.4.4 Electronic Lock Control Integration . . . . . . . . . . . . . . . . . . . . . . 56 4.5 Experimentation Examples and Results . . . . . . . . . . . . . . . . . . . . . . . . 58 4.5.1 Experimentation Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 4.5.2 Some of the sentence-voice matching results . . . . . . . . . . . . . . . . . 62 4.6 Conclusion . 63 General conclusion 4.1 Introduction . . 40 4.2 Development Environment . . . 40 4.2.1 Software Environment . . . . . . 40 4.2.2 Hardware Environment . . . . . . . 42 |
| Type de document : | Mémoire master |
Disponibilité (1)
| Cote | Support | Localisation | Statut |
|---|---|---|---|
| MINF/953 | Mémoire master | bibliothèque sciences exactes | Consultable |




