13
SECURITY SYSTEM DESIGN OF RIGHTS ACCESS GATE IN POLICE ACADEMY SEMARANG USING RFID PERANCANGAN SISTEM KEAMANAN HAK AKSES PINTU AKPOL SEMARANG MENGGUNAKAN RFID Puguh Gambiro* ) , Aris Triwiyatno, dan Budi Setiyono Department of Electrical Engineering, Diponegoro University Semarang Street Prof Sudharto, SH, Kampus UNDIP Tembalang, Semarang 50275, Indonesia * ) Email: profpgh @ gmail .com Puguh Gambiro*), Aris Triwiyatno, dan Budi Setiyono Department of Electrical Engineering, Diponegoro University Semarang Street Prof Sudharto, SH, Kampus UNDIP Tembalang, Semarang 50275, Indonesia *)Email: [email protected] Abstract Radio Frequency Identification is a method of identification by means of the so-called RFID tags or transponders to store and retrieve data remotely. Labels or RFID card is an object that can be attached or included in a product, animal, or even human beings with the purpose of identification using radio waves . RFID labels contain information that is stored electronically and can be up to several feet away. RFID reader system does not require direct contact such as bar code reader system ( barcode ) or smartcard. RFID tags consist of a silicon microchip and an antenna. Some RFID tags can approach the size of the small size of rice grains. Labels are passive not require a power source, whereas active labels require a power source to function. To monitor all activities that happened, are programmed using Delphi 7.0. The results of the design of the information system development based on RFID security gate can simplify the process and can be applied in real life. Keyword : RFID, smartcard, tag, RFID Reader, Delphi I. Introduction The development of Radio Frequency Identification technology (RFID) is growing very rapidly these days. Identification technology is widely used in a variety of luxury residential gate, and five-star hotel in the Formatting identification of an object. RFID has advantages of the previous identification technologies, such as barcodes. Among them is capable of reading a data object with a certain size without direct contact (contactless) and should not be read in parallel with the object, in addition to storing the information on the RFID tag in accordance with the storage capacity. RFID technology is being used to help the problems associated with an object such as a membership identification or tracking employee for recording an object [1]. technology generally consists of RFID tags, sensors called the reader, and a computer as a data processor. The workings of the system is carrying an RFID reader emits a radio frequency scanning and the data stored in the tag, reaching full potential in reading the data, then sends that information to a database that stores data attributes contained in these tags [2]. RFID technology has been

Makalah TA_TRANSIENT - Puguh Gambiro (L2F008147) English2

Embed Size (px)

DESCRIPTION

qwerty

Citation preview

SECURITY SYSTEM DESIGN OF RIGHTS ACCESS GATE IN POLICE ACADEMY SEMARANG USING RFIDPERANCANGAN SISTEM KEAMANAN HAK AKSES PINTU AKPOL SEMARANG MENGGUNAKAN RFID

Puguh Gambiro*), Aris Triwiyatno, dan Budi SetiyonoDepartment of Electrical Engineering, Diponegoro University SemarangStreet Prof Sudharto, SH, Kampus UNDIP Tembalang, Semarang 50275, Indonesia*)Email: [email protected]

Puguh Gambiro*), Aris Triwiyatno, dan Budi SetiyonoDepartment of Electrical Engineering, Diponegoro University SemarangStreet Prof Sudharto, SH, Kampus UNDIP Tembalang, Semarang 50275, Indonesia*)Email: [email protected]

AbstractRadio Frequency Identification is a method of identification by means of the so-called RFID tags or transponders to store and retrieve data remotely. Labels or RFID card is an object that can be attached or included in a product, animal, or even human beings with the purpose of identification using radio waves . RFID labels contain information that is stored electronically and can be up to several feet away. RFID reader system does not require direct contact such as bar code reader system ( barcode ) or smartcard. RFID tags consist of a silicon microchip and an antenna. Some RFID tags can approach the size of the small size of rice grains. Labels are passive not require a power source, whereas active labels require a power source to function. To monitor all activities that happened, are programmed using Delphi 7.0. The results of the design of the information system development based on RFID security gate can simplify the process and can be applied in real life.

Keyword : RFID, smartcard, tag, RFID Reader, Delphi

I. Introduction

The development of Radio Frequency Identification technology (RFID) is growing very rapidly these days. Identification technology is widely used in a variety of luxury residential gate, and five-star hotel in the Formatting identification of an object. RFID has advantages of the previous identification technologies, such as barcodes. Among them is capable of reading a data object with a certain size without direct contact (contactless) and should not be read in parallel with the object, in addition to storing the information on the RFID tag in accordance with the storage capacity. RFID technology is being used to help the problems associated with an object such as a membership identification or tracking employee for recording an object [1]. technology generally consists of RFID tags, sensors called the reader, and a computer as a data processor. The workings of the system is carrying an RFID reader emits a radio frequency scanning and the data stored in the tag, reaching full potential in reading the data, then sends that information to a database that stores data attributes contained in these tags [2]. RFID technology has been developed and utilized in various fields. Some of that are for detect animals on a farm, in a supermarket goods detection, detection of vehicles on the highway, security systems, etc, by utilizing RFID transponder as a tags [3].II. Metode

A. Hardware Design

Figure 1 Block Diagram of Hardware Design

From Figure 1 of each part can be explained as follows: 1. Block A consists of: a. Host Computer is used as a regulator of the flow of information from the items that are detected within the scope of the RFID system.b. SmartCard reader and editor is used as edit existing information within the SmartCard through ACR128U ACS - Dual Interface Contactless Mifare Reader before passing it to the database on the host computer. c. Delphi is used as an application program regulating the flow of information from the items that are detected within the scope of the RFID system, and processed for indicator lights turn on each gate. 2. Block B consists of: a. SwitchHub serves as a distributor of data from the tags that have been read by the RFID reader via LAN cable b. RFID Reader (Fingerspot mifare RF-100) which serves as a receiver and reader input the information stored on the SmartCard / tag by scanning with a distance