Design And Analysis Of Auto Security Door Locking System
Mortise locks are generally used for exterior doors due to its high durability in sustaining the security level of house access systems. This type of door lock systems have been implemented on all kinds of houses for more than 70 years. However, the mechanical principle of present mortise locks have...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English English |
Published: |
2016
|
Subjects: | |
Online Access: | http://eprints.utem.edu.my/id/eprint/18593/1/Design%20And%20Analysis%20Of%20Auto%20Security%20Door%20Locking%20System%2024%20Pages.pdf http://eprints.utem.edu.my/id/eprint/18593/2/Design%20And%20Analysis%20Of%20Auto%20Security%20Door%20Locking%20System.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-utem-ep.18593 |
---|---|
record_format |
uketd_dc |
institution |
Universiti Teknikal Malaysia Melaka |
collection |
UTeM Repository |
language |
English English |
advisor |
Subramonian, Sivarao |
topic |
T Technology (General) T Technology (General) |
spellingShingle |
T Technology (General) T Technology (General) Lim, Si Qing Design And Analysis Of Auto Security Door Locking System |
description |
Mortise locks are generally used for exterior doors due to its high durability in sustaining the security level of house access systems. This type of door lock systems have been implemented on all kinds of houses for more than 70 years. However, the mechanical principle of present mortise locks have remained the same, even though they differ slightly in terms of their exterior that caters to the design of security doors. The mortise principle of this type of lock requires a definite key to lock and unlock the security door. One main drawback of the existing security door lock is that, it is almost impossible to instantly lock the door by inserting the key exactly into the hole of the lock especially during times of emergency. This is the reason why recent burglary reports claim that there is no evidence of breaking-in but the house owner is robbed. Burglary is a crime where unlawful enter a resistanceless house or building through several entrances such as door or window. Burglary may not always happened through the door, yet the percentage of forced entry through housing doors is very high. In addition, this will not only lead to the threat for valuable items, but also to human life. The weak security protection of conventional mortise locks literally renders the premise defenceless against burglaries. The call to enhance functionality of security door locks is imminent. Thus, this present study is undertaken to overcome the drawback stated above by devising and developing an innovative idea of security door locking system. The features of security door locking system included does not require a key or electricity to lock the door, cannot unlock the door without the key and can lock the door instantly. Analytic Hierarchy Process (AHP) decision making tool as well as multi-aspect Quality Function Development (QFD) method are utilised during the stages of design and operational screening. Moreover, sensitivity analysis also had implemented in this study and justified that Concept 1 is the most appropriate design concept of security door locking system compared with another two concepts. The fabricated prototype had go through the simulation and analysis process for performance evaluation and validation. Consequently, the Auto Security Door Locking Syatem (ASD-Lock) will be proposed to attract manufacturers as this solution has high potentials in overcoming the drawbacks of the current mortise locks. |
format |
Thesis |
qualification_name |
Master of Philosophy (M.Phil.) |
qualification_level |
Master's degree |
author |
Lim, Si Qing |
author_facet |
Lim, Si Qing |
author_sort |
Lim, Si Qing |
title |
Design And Analysis Of Auto Security Door Locking System |
title_short |
Design And Analysis Of Auto Security Door Locking System |
title_full |
Design And Analysis Of Auto Security Door Locking System |
title_fullStr |
Design And Analysis Of Auto Security Door Locking System |
title_full_unstemmed |
Design And Analysis Of Auto Security Door Locking System |
title_sort |
design and analysis of auto security door locking system |
granting_institution |
Universiti Teknikal Malaysia Melaka |
granting_department |
Faculty of Manufacturing Engineering |
publishDate |
2016 |
url |
http://eprints.utem.edu.my/id/eprint/18593/1/Design%20And%20Analysis%20Of%20Auto%20Security%20Door%20Locking%20System%2024%20Pages.pdf http://eprints.utem.edu.my/id/eprint/18593/2/Design%20And%20Analysis%20Of%20Auto%20Security%20Door%20Locking%20System.pdf |
_version_ |
1747833939065569280 |
spelling |
my-utem-ep.185932021-10-08T15:31:05Z Design And Analysis Of Auto Security Door Locking System 2016 Lim, Si Qing T Technology (General) TK Electrical engineering. Electronics Nuclear engineering Mortise locks are generally used for exterior doors due to its high durability in sustaining the security level of house access systems. This type of door lock systems have been implemented on all kinds of houses for more than 70 years. However, the mechanical principle of present mortise locks have remained the same, even though they differ slightly in terms of their exterior that caters to the design of security doors. The mortise principle of this type of lock requires a definite key to lock and unlock the security door. One main drawback of the existing security door lock is that, it is almost impossible to instantly lock the door by inserting the key exactly into the hole of the lock especially during times of emergency. This is the reason why recent burglary reports claim that there is no evidence of breaking-in but the house owner is robbed. Burglary is a crime where unlawful enter a resistanceless house or building through several entrances such as door or window. Burglary may not always happened through the door, yet the percentage of forced entry through housing doors is very high. In addition, this will not only lead to the threat for valuable items, but also to human life. The weak security protection of conventional mortise locks literally renders the premise defenceless against burglaries. The call to enhance functionality of security door locks is imminent. Thus, this present study is undertaken to overcome the drawback stated above by devising and developing an innovative idea of security door locking system. The features of security door locking system included does not require a key or electricity to lock the door, cannot unlock the door without the key and can lock the door instantly. Analytic Hierarchy Process (AHP) decision making tool as well as multi-aspect Quality Function Development (QFD) method are utilised during the stages of design and operational screening. Moreover, sensitivity analysis also had implemented in this study and justified that Concept 1 is the most appropriate design concept of security door locking system compared with another two concepts. The fabricated prototype had go through the simulation and analysis process for performance evaluation and validation. Consequently, the Auto Security Door Locking Syatem (ASD-Lock) will be proposed to attract manufacturers as this solution has high potentials in overcoming the drawbacks of the current mortise locks. UTeM 2016 Thesis http://eprints.utem.edu.my/id/eprint/18593/ http://eprints.utem.edu.my/id/eprint/18593/1/Design%20And%20Analysis%20Of%20Auto%20Security%20Door%20Locking%20System%2024%20Pages.pdf text en public http://eprints.utem.edu.my/id/eprint/18593/2/Design%20And%20Analysis%20Of%20Auto%20Security%20Door%20Locking%20System.pdf text en validuser https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=100903 mphil masters Universiti Teknikal Malaysia Melaka Faculty of Manufacturing Engineering Subramonian, Sivarao 1. Akin, J. Ed., 2009. Finite Element Analysis Concepts via SolidWorks. Rice University, Houston, Texas. 2. Allegion, 2016. MA-Series: Service Manual, United Stated. 3. Amar, S., 2006. Crime Levels and Trends in The Next Decade. Journal of the Kuala Lumpur Royal Malaysia Police Collge. Kuala Lumpur. 4. American Standards Association, 1947. The Magazine of Standards. Cornell University. 5. American Correctional Association, 1954. A Manual of Correctional Standards: Issued by the American Prison Association. The University of California. 6. Amin, B., Rahmin, K., and Geshine, A.M.S., 2014. A Trend Analysis of Violent Crimes in Malaysia. Health and the Environment Journal, 5 (2), pp.41-56. 7. Anvari, A., Zulkifli, N., Sorooshian. S., and Boyerhassani. O., 2014. An Integrated Design Methodology Based on the Use of Group AHP-DEA Approach for Measuring Lean Tools Efficiency with Undesirable Output. Int. J. Adv. Manuf. Technol, 70, pp.2169-2186. 8. ANSI, 1918. Standards Action. American National Standards Institute, New York. 9. Armitage, R., 2000. An Evaluation of Secured by Design Housing within West Yorkshire. Home Office Briefing Note 7/100. London: Home Office. 10. Armitage, R., 2004. Secured by Design – An Investigation of Its History, Development and Future Role in Crime Reduction. Doctor of Philosophy thesis, The University of Huddersfield. 11. Balta-Ozkan, N., Davidson, R., Bicket, M., and Whitmarsh, L., 2013. Social Barriers to The Adaption of Smart Homes. Energy Policy, 63, pp.363-374. 12. Beckford, C., 2012. Door Security: Improving The Security of Your Existing Doors. The Crime Prevention Website, England. 13. Bereketli, I. and Genevois, M.E., 2013. An Integrated QFDE Approach for Identifying Improvement Strategies in Sustainable Product Development. J. Cleaner Production, 54, pp.188-198. 14. Berry, N.E., 2006. Architectural Hardware. Quarry Books, pp. 15-18. 15. Best, W.E., and Gene McCullum, R., Best Lock Corporation, 1976. Cylindrical Lock Set. United State. Pat. US3955387A (US 05/523, 570). 16. Bexar County Curthouse, 2016. Home Security Inspections. [online] Availabl at: https://www.bexar.org/726/Home-Security-Inspections [Accessed on 25th March 2016]. 17. BHMA, 1925. ANSI/BHMA A156 Series Standards Accredited Procedures. Builders Hardware Manufacturers Association, New York. 18. Binggeli, C., 2003. Building Systems for Interior Designers. New Jersey: John Wiley & Sons. 19. Bossert, J.L., 1991. Quality Function Deployment: The Practitioner’s Approach, ASQC Quality Press, New York. 20. Budd, T., 2011. Burglary: Practice Messages From The British Crime Survey. Home Office Briefing Note 5/01. London: Home Office. 21. Cafferty, H.M., 2014. The Key: Practical Tool, Powerful Symbol. [online] Available at: http://www.swide.com/art-culture/history-of-keys-and-locks-from-ancient-egypt-to-modern-days/2014/11/02 [Accessed on 25 May 2015]. 22. Capel, V., 1997. Home Security: Alarm, Sensors and Systems. Second Edition. Newnes, Oxford, pp. 3-4. 23. Catalano, S., 2010. National Crime Victimization Survey: Victimization During Household Burglary. Burean of Justice Statistics, pp. 1-13. 24. Chikofsky, E.J. and Cross II, J.H., 1990. Reverse Engineering and Design Recovery A Taxonomy. IEEE Software, pp.13-17. 25. Cromwell, P.F., Olson, J.N., and Avary, D., 1991. Breaking and Entering: An Ethnographic Analysis of Burglary. Newbury Park, Calif. Sage Publications. 26. Dassault Systèmes, 2016. Why Choose SolidWorks? [online] Available at: https://www.solidworks.com/sw/why-choose-solidworks.htm [Accessed on 23th March 2016]. 27. David, 2005. Force Needed to Open Door, 1998 – 2016. Engineering Forums, Eng – Tips. com, United Stated. 28. DeChiara, J., Panero, J., and Zelnik, M., 2001. Time-Saver Standards for Interior Design and Space Planning, 2nd ed., McGraw Hill Professional. 29. DeMarseilles, P.H., Glenn, R.D., and Sorensen, D.A., 1989. Cylindrical Lever Handle Lock. United State. Pat. US4869083A (US 07/186,385). 30. Edgar, J.M., and Mclnerney, W.D., 2004. Chapter 10: The Use of Lock in Physical Crime Prevention. In Handbook of Loss Prevention and Crime Prevention (Fennelly, L.J., 4th ed.), pp. 165-206. Burlington (USA), Oxford (UK): Elsevier Butterworth-Heinemann. 31. Embassy, E., 2016. Profile on The Production of Door Locks, London: United Kingdom. 32. ExpertChoice, 2014. Expert Choice Decision Making Methodology. [online] Available at: http://expertchoice.com/about-us/our-decision-making-methodology/ [Accessed on 12th April 2016]. 33. Fainberg, A., and Bieber, A.M., 1978. Barrier Penetration Database. Nuclear Regulatory Commission. Office of Nuclear Reactor Regulation, Division of Operating Reactors, 88, pp. 47. 34. Farrell, G., Hobbs, L., and Laycock, G., 2000. RV Snapshot: UK Policing and Repeat Victimization. Crime Reduction Research Series Paper 5. London: Home Office. 35. Fay, J., 1993. Encyclopedia of Security Management: Techniques and Technology. Butterworth-Heinemann. 36. Fennelly, L.J., 2004. Chapter 3: Security Surveys. In Handbook of Loss Prevention and Crime Prevention (Fennelly, L.J., 4th ed.), pp. 19-43. Burlington (USA), Oxford (UK): Elsevier Butterworth-Heinemann. 37. Forman, E.H., and Gass, S.I., 2001. The Analytic Hierarchy Process - An Exposition. Oper. Res., 49, pp.469-486. 38. Frikha, A. and Moalla, H., 2015. Analytic Hierarchy Process for Multi-Sensor Data Fusion based on Belief Function Theory. Eur. J. Operat. Res., 241 (1), pp.133-147. 39. Gibson, S., 2012. How to Install a Lockset. This Old House Magazine, USA. 40. Gigliotti, R., and Jason, R., 2004. Chapter 9: Physical Barriers. In Handbook of Loss Prevention and Crime Prevention (Fennelly, L.J., 4th ed.), pp. 148-164. Burlington (USA), Oxford (UK): Elsevier Butterworth-Heinemann. 41. Granta Design, 2016. What is CES EduPack? [online] Available at: http://www.grantadesign.com/education/edupack/ [Accessed on 19th March 2016]. 42. Guida Inc., 2016. Security Storm Doors. [online] Available at: http://www.goguida.com/Products/product.php?Security-Storm-Doors-8 [Accessed on 19th March 2016]. 43. Hauser, D.O., and de Weck, O.L., 2007. Flexibility in Component Manufacturing Systems: Evaluation Framework and Case Study. J. Intell. Manuf., 18, pp. 421-432. 44. Hernández-Pérez, J.C., Osorio-Gómez, G., and Mejía-Gutiérrez, R., 2015. From Functional Prototypes to Industrial Products. Int. J. Interact. Des. Manuf. 45. HomeServe, 2016. Common Lock Problems. [online] Available at: http://www.homeserve.com/help-advice/locks/common-lock-problems [Accessed on 6th March 2016]. 46. Jansmyr, M., and Graas, R.N., 2012. Continuous Improvement in Production Development: An Action Research Study for Enhancing Quality Culture. Chalmers University of Technology, Gothenburg, Sweden, pp 1 – 73. 47. John’s Screens Service, 2015. Security Screen Doors. [online] Available at: http://johnscreenservice.com/ [Accessed on 20th March 2016]. 48. Jorgustin, K., 2014. 3 Ways A Burglar Breaks In, 80 Percent Of The Time. [online] (30th May 2014) Available at: http://modernsurvivalblog.com/security/3-ways-a-burglar-breaks-in-80-percent-of-the-time/ [Accessed on 6th March 2016]. 49. Kazuo, K., 1996. Design for Manufacturability and Assembly (DFMA) Productivity Evaluation Useful to VE Activities. In: Product Cost Administration Product Planning Office, Isuzu Motors Ltd., Save International Conference Proceedings, Mount Royal, USA, pp 116 – 120. 50. Keyless Locks Store, 2016. PT10 Lockey Latchbolt. [online] Available at: https://keylessentrylocks.com/index.php?main_page=product_info&products_id=29 [Accessed on 25th March 2016]. 51. Laurens Thoughts, 2015. Decorative Locks Images Gallery. [online] Available at: http://www.laurensthoughts.com/decorative-locks/ [Accessed on 20th March 2016]. 52. LockRite, L., 2016. Common Door Lock Problems. [online] Available at: https://www.lockrite.org/common-door-lock-problems.php [Accessed on 6th March 2016]. 53. Made How, 2016. How Doorknob Is Made. [online] Available at: http://www.madehow.com/Volume-5/Doorknob.html [Accessed on 5th April 2016]. 54. Matsumura, N., Fruchter, R., and Leifer, L., 2014. Shikakeology: Designing Triggers for Behavior Change, AI & Soc. 55. Matsuno, K., and Mentzer, J.T., 2015. Market Orientation: Reconciliation of Two Conceptualizations. Proceedings of the 1995 Academy of Marketing Science (AMS) Annual Conference, pp. 49-55. 56. Miethe, T.D. and R. McCorkle, 1998. Crime Profiles – The Anatomy of Dangerous Persons, Places, and Situations, Los Angeles: Roxbury. 57. Momboisse, R.M., 1968. Industrial Security for Strikes, Riots and Disasters. The University of Michigan. Springfield, IL: Charles C. Thomas, pp.13. 58. Moon, C.W., 2012. Patent Issued for Mortise Lock Assembly. VerticalNews Journal Report. Virginia: Alecandria. 59. Mowrey, G., 2011. Building Our Way Out of Crime: The Transformative Power of Police-Community Developer Partnerships. Texas: Alarm Industry Research & Educational Foundation (AIREF). 60. Muuss, J.P., DiSalvatore, A.V., and Rabern, D., 2006. The Complete Guide for CPP Examination Preparation. CRC Press. 61. NCVS, 2014. National Crime Victimization Survey: Technical Documentation. [e-book] Available through: http://www.bjs.gov/content/pub/pdf/ncvstd13.pdf [Accessed on 12th March 2016]. 62. Neary, R.E., and Hull, S.A., Schlage Lock Company, 1984. Cylindrical Lock. United State. Pat. US4604879A (US 06/590, 326). 63. Ollam, D., 2008. Ten Things Everyone Should Know About Lockpicking & Physical Security. [online] Available at: https://www.blackhat.com/presentations/bh-europe-08/Deviant_Ollam/Whitepaper/bh-eu-08-deviant_ollam-WP.pdf [Accessed on 18th May 2015]. 64. OSAC, 2013. Malaysia 2013 Crime and Safety Report. Overseas Security Advisory Council (OSAC), Washington. 65. ORS, 2005. Introduction to Expert Choice. Office of Research Services, Arlington. 66. Osborne, D.R., 1996. Are Repeatedly Victimized Households Different? Journal of Quantitative Criminology, 12 (2), pp. 223-245. 67. Paramasivam, V., and Senthil, V., 2009. Analysis and Evaluation of Product Design through Design Aspects using Digraph and Matrix Approach. Int. J. Interact. Des. Manuf., 3 (1), pp.13-23. 68. Pease, K.J., 1992. Preventing Burglary in A British Public Housing Estate. In Situational Crime Prevention: Successful Case Studies, edited by R.V. Clarke, pp. 123-146. New York: Harrow and Henston. 69. Perry, M., 2014. Are Electronic Door Locks Safe? [online] Available at http://www.houselogic.com/home-advice/home-security/are-electronic-door-locks-safe/ [Accessed on 19 May 2015]. 70. Phillips, J., 2013. Advantages and Disadvantages of Digital Door Locks. [online] Available at: http://www.theworkplacedepot.co.uk/news/ [Accessed on 2nd May 2015]. 71. Priority Door Systems, 2014. Commercial Lock Sets. [online] Available at: http://www.prioritydoors.com/commercial-door-hardware/commercial-lock-sets/ [Accessed on 30th May 2015]. 72. Raja. V., and Fernandes, K.J., 2008. Reverse Engineering: An Industrial Perspective. Springer Series in Advanced Manufacturing. 73. Robinson, R.L., 1973. Complete Course in Professional Locksmithing. Chicago: Rowman & Littlefield. 74. Saaty, T.L., 1980. The Analytic Hierarchy Proces. New York: McGraw Hill. 75. Saaty, T.L., 1990. How to Make A Decision: The Analytic Hierarchy Process. Eur. J. Oper. Res., 48, pp.9-26. 76. Saaty, T.L., 2008. Decision Making with the Analytic Hierarchy Process. Int. J. Services Sci, 1, pp.83-98. 77. Sato, T., Sutoh, A., Nishi, H., and Arai, H., 2011. Identification of Correlation between Demand Performances to Damage of Lining Concrete for Tunnel Management. Science Direct: Procedia Engineering, pp.529-534. 78. SBD, 1989. Burglary Prevention Advice: Locks. Secured by Design, United Kingdom. 79. Schneider, R.H. and Kitchen, T., 2002. Planning for Crime Prevention: A Transatlantic Perspective. RTPI Library Series, London: Rutledge. 80. Siegel, L.J., 2008. Criminology. Belmont, Calif. West/Wadsworth Publishing Company. 81. Sivarao, Dimin, M.F., Faris, N.M.F., Hambali, A., Dhar Malingam, S., and Sapuan, S.M., 2013. Analytical Hierarchy Process for Design Selection of Micro Hot-Marking Tool, In: 3rd International Conference and Exhibition on Sustainable Energy and Advanced Material, Melaka, Malaysia. 82. SolidWorks Corporation, 2002. Introduction to SolidWorks. [e-book]. Available through: University of Western Ontario http://www.eng.uwo.ca [Accessed on 19th March 2016]. 83. Sveen, F.O., Torres, J.M., and Sarriegi, J.M., 2009. Blind Information Security Strategy. Int. J. Critical Infrastructure Protection, 2 (3), pp.95-109. 84. The ITS Crew, 2014. A Historical Lock & Key Visual Guide and Why You Shold Learn to Pick a Lock. [online] Available at: http://www.itstactical.com/skillcom/lock-picking/a-historical-lock-key-visual-guide-and-why-you-should-learn-to-pick-a-lock/ [Accessed on 20th March 2016]. 85. Tyska, L.A., and Fennelly, L.J., 2000. Physical Security: 150 Things You Should Know. Butterworth-Heinemann, Woburn, pp.41-47. 86. Vaidya, O.S. and Kumar, S., 2006. Analytic Hierarchy Process: An Overview of Applications. European Journal of Operational Research, 169, pp.1-29. 87. Vollaard, B. and Koning, P., 2009. The Effect of Police on Crime, Disorder and Victim Precaution. Evidence from Dutch Victimization Survey. Int. Review of Law and Economics, 29 (4), pp. 336-348. 88. Wang, W., 2008. Application of Reverse Engineering in Manufacturing Industry. Department of Engineering Technology University of Massachusetts Lowell, MA, USA. pp.1-7. 89. Waterman, I., and Bell, J., 2013. Disabled Access to Facilities. Routledge. 90. Wright, K.G., 1972. Cost-Effective Security, McGraw Hill. Original from The University of Wisconsin – Madison. 91. Wright, R.T. and Decker, S., 1994. Burglars on the Job: Street Life and Residential Break-ins. Boston: Northeastern University Press. 92. Yang, M., Khan, F.I., Sadiq, R., and Amyotte, P., 2011. A Rough Set-Based Quality Function Deployment (QFD) Approach for Environmental Performance Evaluation: A Case of Offshore Oil and Gas Operations. J. Cleaner Production, 19 (13), pp.1513-1526. |