Logic gates are electronic components used to build digital circuits. In this project, it is significant to know the process involved in making the biometric wardrobe with its logic gate circuit mechanism and its equivalent Complementary metal-oxide-semiconductor (CMOS) circuit and stick diagram. The use of Multisim Simulation Software was maximized to design, simulate, and analyze the circuit. The electrical components used in the logic gates circuits were AND logic gate, NOT logic gate, inputs, and outputs. For the CMOS circuit, n-type, p-type transistors, ground, corresponding inputs, and outputs were used. Based on the gathered results, it was determined that the mechanism of the biometric wardrobe was analogous to the logic gates circuits, CMOS circuit, and stick diagram that were made. Furthermore, this project enhanced a regular wardrobe by installing a biometric scanner, an alarm, and a serial camera to pave the way to catch an intruder. As such, it is recommended to add features such as voice assistant and face recognition that will help the user conduct the system efficiently.
Keywords: logic gates, biometrics, wardrobe, alarm, serial camera[1] “Logic gate (AND, OR, XOR, NOT, NAND, NOR and XNOR),” TechTarget Contributor, Dec. 2020. https:// whatis.techtarget.com/definition/logic-gate-AND-ORXOR-NOT-NAND-NOR-and-XNOR#:~:text=A%20 logic%20gate%20is%20a,are%20 fundamental%20to%20 digital%20 circuits.&text=Most%20logic%20gets%20 have%20two,are%20based%20on%20 Boolean%20 algebra. (accessed Jan. 26, 2022).
[2] E. Coates., “Boolean Statements,” Learnabout Electronics, Dec. 2020. https://learnabout-electronics.org/Digital/dig21. php (accessed Jan. 26, 2022).
[3] ETechnoG., “Best application and uses of logic gates with practical examples,” ETechnoG, Feb. 2019. https://www. etechnog.com/2019/04/application-uses-logic-gate.html (accessed March 1, 2022).
[4] Garg, B., & Kaur, S., “A review of logic gates and its applications,” International Journal of Emerging Technologies and Innovative Research (www.jetir.org), 6(5), 124-129, May 2019. [Online]. Available: https://www. jetir.org/papers/JETIRCW06026.pdf (accessed March 1, 2022).
[5] Elprocus, What is a CMOS: Working principle & its applications, n.d. Available: https://www.elprocus.com/ cmos-working-principle-and-applications/ (accessed Dec. 21, 2021).
[6] Chouhan, S., Chaudhary, S., Upadhay, T., Rupani, A., and Whig, P., “Comparative study of various gates based in different technologies,” Int Rob Auto J., 3(1), 262-269, Sept. 2017. [Online]. Available: https://doi.org/10.15406/ iratj.2017.03.00046 (accessed March 1, 2022). [7] Statista Research Department, “Crime in the Philippines - statistics & facts,” statista, Dec. 6, 2021. https://www.statista.com/topics/6994/crime-in-thephilippines/#dossierKeyfigures (accessed Jan. 26, 2022).
[8] Hamidi, H., “An approach to develop smart health using Internet of Things and authentication based on biometric technology,” ScienceDirect, Feb. 2019. [Online]. Available: https://www.sciencedirect.com/science/article/ pii/S0167739X18313517 (accessed Feb, 7, 2022).
[9] S. D. Cabouli, R. J. Mos, C. V. Mueller, R. A. Lane, M. A. Schilling, and P. E. Catinella., “Smartphone controlled biometric and bluetooth enabled smart wallet system,” IWallet Corporation, 2016. [Online]. Available: https://patents.google.com/patent/US20160098878A1/en (accessed Feb. 7, 2022).
[10] Ahmed, M. S., Mohamimed, A., Alah, G. “Development of a simple sound activated burglar alarm system,” Leonardo Journal Sciences, 2006. [Online]. Available: https://www. researchgate.net/publication/26449169_Development_ of_a_Simple_Sound_Activated_Burglar_Alarm_System (accessed Feb. 7, 2022).
[11] M.J. Jolani., “The anti-burglar alarm system and anti fire security building,” Universitas Muhammadiyah Surakarta, 2017. [Online]. Available: http://eprints.ums.ac.id/54829/3/ Journal%20Final%20Rev..pdf (accessed Jan. 27, 2022).
[12] Gupta, S., “Luggage Security Alarm System,” July 1, 2014. [Online]. Available: https://www.eeweb.com/luggagesecurity-alarm-circuit/ (accessed Feb. 7, 2022).
[13] Jeong, T. G., & Bae, D. H. “A basic study on implementing optimal function of motion sensor for bridge navigational watch alarm system,” Journal of Navigation and Port Research, 38(6), 645-653.2015. [Online]. Available: https:// onlinelibrary.wiley.com/doi/abs/10.1002/ange.201408334 (accessed Feb. 7, 2022).
[14] Chen, J., Zhou, S., & Wen, J. “Concatenated logic circuits based on a three‐way DNA junction: a keypad‐lock security system with visible readout and an automatic reset function,” Angewandte Chemie, 127(2), 456-460. 2015. [Online]. Available: https://www.koreascience.or.kr/article/ JAKO201403460492961.page (accessed Feb. 7, 2022).
[15] Sumangala, B. V., & Ram, K. B., “Design, development and performance study of L3-Home security system, Global Journal of Research in Engineering, 12(8-F), 2012. Available: https://www.engineeringresearch.org/index.php/ GJRE/article/view/641/583 (accessed February 28, 2022)
[16] Ramyateja, S., & Srinivias, K. “Implementation of Enhanced Authentication Scheme for Secured Banking with Biometrics,” 2015. [Online]. Available: http://ijsetr. com/uploads/263514IJSETR477-11.pdf (accessed Feb. 21,2022).
[17] Mohan, K., and Krishna S., “FPGA Implementation of RF Technology And Biometric Authentication Based ATM Security,” International Journal of Engineering Trends and Technology (IJETT), 15(4), Sept 2014. [Online]. Available: https://nanopdf.com/download/fpga-implementation-ofrf-technology-and-biometric-authentication-based-atmsecu_pdf (accessed: February 28, 2022)
[18] Kang, S. “Analysis on the circuit design of fire alarms.” In Journal of Physics: Conference Series(Vol. 1920, No. 1, p. 012022). IOP Publishing. 2015 Accessed https://iopscience. iop.org/article/10.1088/1742-6596/1920/1/012022/pdf (Feb. 21, 2022)
[19] Wang, H., Wang, Z., Sun, G., Zhang, L., Gao, Y., Zhang, Y., & Bi, C., “Design of a Biometric Access Control System Based on Fingerprint Identification Technology.” In Artificial Intelligence in China (pp. 34-42). Springer, Singapore. 2021 Available: https://link.springer.com/ chapter/10.1007/978-981-15-8599-9_5#cities (accessed February 21, 2022).
[20] Kim, S., Lim, S., Shin, S., and Choi, J. “Biometrics for Electronic Eyes: System Authentication with Embedded CMOS Image Sensor,” 2016. [Online]. Available: https://www.researchgate.net/publication/309469896_ Biometrics_for_Electronic_Eyes_System_Authentication_ with_Embedded_CMOS_Image_Sensor (accessed Feb. 7, 2022).