Rancang Bangun Sistem Keamanan Kunci Pintu Lemari Berbasis Mikrokontroler

Authors

  • Yoga Adi Saputra Universitas Bina Darma
  • Tata Sutabri Universitas Bina Darma

DOI:

https://doi.org/10.61132/jupiter.v2i6.616

Keywords:

Security system, Cabinets, Selenoid door, Microcontroller

Abstract

Cabinet security is generally still done manually and is still done by humans. A common problem that occurs in cabinet security is the ease of dismantling or opening cabinets by irresponsible people until theft of valuable goods or data and very important items occurs. To overcome this, a cabinet security system is needed that can increase the security of goods and data in order to minimize crime. This system is designed using a password door so that it can double the security of the cabinet. This system works when someone wants to open the cabinet door using a password sent via callphone then processed by a microcontroller and displayed by the LCD after using being processed if the password is correct then door will open. The implementation of this system is expected to increase security in cabinets so that they can store important goods or data more safely and the level of security that previously used a manual key is doubled.

References

Adrianto, H. (2015). Pemrograman mikrokontroler AVR Atmega16 menggunakan bahasa C (CodeVisionAVR). [Book].

Hendrik, dkk. (2013). Penerapan mini robot dengan konsep omni directional untuk mendapatkan informasi pada daerah berbahaya. Jurnal Teknologi, 12(3), 45-52.

Sulinda, W., & Muhammad, F. (2010). Pengantar analisa perancangan sistem. Jurnal Teknik Sistem, 8(2), 123-136.

Sutabri, T. (2012). Analisis sistem informasi. [Book].

Sutabri, T. (2012). Konsep sistem informasi. [Book].

Sutabri, T., Napitulu, A., & Dermawan, M. (2019). Sistem informasi bisnis. [Book].

Downloads

Published

2024-11-21

How to Cite

Yoga Adi Saputra, & Tata Sutabri. (2024). Rancang Bangun Sistem Keamanan Kunci Pintu Lemari Berbasis Mikrokontroler. Jupiter: Publikasi Ilmu Keteknikan Industri, Teknik Elektro Dan Informatika, 2(6), 86–92. https://doi.org/10.61132/jupiter.v2i6.616

Similar Articles

1 2 3 4 5 6 > >> 

You may also start an advanced similarity search for this article.