SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013

AN ELECTRONIC SWITCH SENSOR WITH A POINTTO-POINT INTRUSIVE MONITORING SYSTEM
Adamu Murtala Zungeru, Haruna Isah, Paul Obafemi Abraham-Attah and Ahmad
Abubakar Sadiq
Department of Electrical and Electronics Engineering, Federal University of Technology,
Nigeria

ABSTRACT
Sophistications in theft and other criminal damages necessitates for the symbiotic blending of technology
with security needs. In this research, electronic switches in the form of sensors were used to implement a
point-to point intrusive monitoring system for the detection of an unauthorized access to commercial and
residential buildings. The system is a simple and reliable security system and uses switch sensor technology
to revolutionize the standards of living. The system is also simple, adaptable and cost-effective. It is
designed in six major units which include; the power supply, the input/sensor micro-switches, the
monitoring and indicator, the timing, the tone generation and output units. To ensure steady power supply
in the circuit, the power unit constitutes both the mains and DC supplies. The alarm unit are being
activated by the normally closed sensor micro-switches unit which is connected in an electronic/door mat
at both the entrance and exit of buildings. In order to facilitate easy location of the intruder, the exact point
of intrusion is being determined by the monitoring and indicator unit which constitutes the quad R/S flipflop IC and LED’s. The timing/tone generation unit is built on the 555 timer IC, in the Astable mode, which
output keeps changing as far as there is a breakage of the sensors. The output of the system is mainly the
LEDs and buzzer, which gives electrical light and audio signal to notify the owner of an intruder in the
building. Major design issues considered include; efficiency, portability, cost-effectiveness, durability,
compatibility as well as the availability of required materials. This system works on the principle of the
micro-switch sensor and dependent on the condition that an intruder entered through the door and stepped
in any one of the switches under the mat. Verification and validation of the system indicate compliances to
design specification hence the output requirements were met.

KEYWORDS
Security system, Automation, Electronic Switch, Sensors, Room Light, Electronic Circuit Design.

1. INTRODUCTION
Theft and criminal damage is a threat and cost to home and business. Hence, the need to protect
our homes, offices and business environment. Improvement in technology by man has shown that
knowledge and experience can be harmonized and refined to assist man to observe, perceive,
communicate, remember, calculate, reason, and protect himself.
Electronics, electrical, mechanical and/or chemical materials can be designed to serve or function
as detectors of intruder to our homes. Among these, Electronic intruder detection systems were
found to be the best that can provide cost-effective protection and act as a deterrent to intruders
while alerting household, staff and/or police depending on the design. Electronic systems can
function in two states. They are either analog or digital [1-3].
DOI : 10.5121/ijitmc.2013.1410

89
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013

Analog and digital systems can be differentiated by their output representations; while the signal
output is behaving linearly with the input in analog systems, and can be represented by a pointer
on a scale, digital systems represent their output in discrete levels either as up or down, „1‟ or „0‟
and on or off and their output can display numeric or alphabetically [3-5]. The digital state of
electronics is preferred and widely in use today.
Even with insurance cover, the real cost of a break-in can be detrimental and should not be
ignored. Disruption may lead to lost of lives in homes, delays and inefficiencies in business
activities or even lost customers. The major components of an electronic intruder alarm system
include detection, control and signaling devices. Every part of this equipment will be developed
to fulfill a specific task within the system. These components are strategically placed in the
building to be protected, with an assurance of constant, reliable and disturbance-free functioning.
Alarm or intruder detectors come in many forms depending on the purpose it is meant for and has
been in existence for some time. The most common security sensors indicate the opening of a
door or window or detect motion via passive infrared (PIR). Some alarm systems are meant for
single mission, while others handle fire, intrusion, and safety alarms simultaneously.
Sophistication ranges from small, self-contained noisemakers, to complicated, multi-zoned
systems with color-coded computer monitor outputs. Many of these concepts also apply to
portable alarms for protecting cars, trucks or other vehicles and their contents.
Two options are much prevalent in the choice of an alarm system. These include, (1) An audible
alarm sounds at the premises or home it is protecting only. This requires someone to immediately
contact and report the incident to the police too. (2) A Monitored alarm sounds at the premises
then a signal is sent to an alarm receiving center through a phone line or mobile network [4-7].
The alarm receiving center (ARC) is usually law enforcement agencies e.g. police.
There are also the choices of either hard wired or wire free systems. Comparison between the two
indicates that the Hardwired is more reliable and cheaper but takes longer to install. Most
commercial alarms are wired. Wire free is easy to install but are more expensive than a wired
system and are mostly used in homes or small business premises.
Alarm intrusion detectors can also be classified as Point detectors and Area detectors. While point
detectors indicate an intrusion at a specific point, area detectors indicate an intruder's presence
within the protected area. Point detector types include mechanical or magnetic contacts on doors
and windows, photocell or microwave beams across pathways, pressure-sensitive mats, fiberoptic bend or stress sensors, proximity switches that detect humans and vibration sensors among
others. Area detectors use such technologies like the infrared (heat) detectors ultrasonic
transducers, and microwave transducers, sometimes in combination within one sensor. In general,
area detectors detect a sudden change in an environment being protected and trigger at some
predetermined threshold. Often because of improper aiming or other adjustments, they are much
more prone to false alarms than Point detectors. But interested readers can see [8-11] for theory of
other components and methods adopted for this work.

2. SYSTEM DESIGN METHODOLOGY, ANALYSIS, AND CALCULATIONS
This section will discuss the design procedure and the analysis of the components used for this
work and generally deals with the design of the individual stages of the electronic security alarm
System, which consist of the following units:
I.
II.
III.

The power supply unit
Input/sensor micro-switches
Monitoring and indicator unit
90
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013

IV.
V.
VI.

Timing unit
Tone generator unit
Output unit

2.1. Design Methodology
The design of this work and principle of operation was demonstrated using the prototype of a
building. In the design, four (4) entrances were selected to be monitored and protected by the
alarm. An integrated circuit (I.C) that has four (4) set and reset pins was employed for the
purpose of demonstrating the principle of operation of the intruder alarm system. Micro
switches were used as detectors. The Micro-switches detectors were connected in electronic
mats placed at the doorsteps of each of the four entrances to be protected and finally connected to
the system. The monitoring and indicator unit serves as an output of the system. Each LED is
labeled to correspond to a switching point and indicates which switch is tripped ON. These
micro switches and infrared sensors can either be connected to door entrances or windows.
Below (Fig. 1), is the complete block diagram of the system.

Fig. 1:Schematic block diagram of electronic alarm system

The electronic circuit was powered by a 12 volt direct current from a full wave rectified voltage.
To ensure stability of power supply of the equipment, a 12volt battery backup was designed into
it and connected in parallel to serve as an alternative power source. With this a 24 hour
protection is guaranteed.
Micro switches connected to the four (4) doormats and/or windows are in a normally open
condition. When they are stepped on, it closes sending a signal to the circuit thus triggering the
alarm. Each micro switch is connected to the memory module and the LED indicators
connected to the memory unit.When an intruder steps on the mat thus opening the micro
switch, pulses are generated. These pulses generated are responsible for the activation of the
tone generator connected in an astable mode on a timing unit. The tone generator and timing
unit were both built on an integrated circuit called 555 timer but the timing unit was connected
in a monostable mode.

91
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013

2.2. The Power Supply Unit
In this sub-section, we describe and explain the design of the power supply unit. For the circuit
we would require a 7812-voltage regulator as shown in the Fig. 2 below, which gives the required
output of +12V. The voltage regulator regulates input voltages above its required output voltage.
If the input voltage is below its required output voltage, it would be passed out without being
regulated. To achieve this, the following steps were undergone.
•
•
•
•
•

Stepping down the A C supply with a transformer
Full wave rectification
Removal of ripple from the rectified waveform
Voltage regulation to desired value
Power display LED

The power unit involves the transformer-bridge rectifier circuit. A 24V transformer is used to
provide power to 7812 regulators, which produce, regulated 12V.

1 7812 3

V+

2

C1

C2

R

Fig. 2: The power supply unit

The common bridge rectifier, comprising four rectifying diodes, is used for converting the 24V
AC power supply into corresponding roughly 24V DC voltage. The involved ripple at the output
of the bridge rectifier is filtered through a 2200F, 35V capacitor. The voltage rating of the
capacitor is about twice the expected output voltage of the rectifier, to protect the device from the
effect of the high voltage supply.A power switch was used to open and close the complete circuit
when required. The 7812-voltage regulator is connected in parallel across the rectified voltage
output. The devices are aimed for the stability of the complete circuit. The 12V power supply
from the 7812 is connected to the main circuit.
2.2.1. Analysis of the Power Supply Unit
If the input to the 7812 is greater than the required output by saying, a factor of 4, the voltage
regulator IC will start getting hot and will then eventually be damaged. As such an input of
approximately 16V (i.e 12+4) is required. Recall that diode drops 0.6V and there are 4 rectifying
diodes constituting a full wave bridge, we will then have a voltage drop of 0.6 x 4 = 2.4V
92
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013

Considering a peak voltage of 16+2.4=18.4V peak.
Also considering an r.m.s voltage =

18.4 18.4
=
= 13.143V
2 1 .4

Therefore a transformer of a preferred value of 15V was employed. i.e. 220V/15V transformer.
Assuming a ripple voltage of 15%
dv =

and

C1 =

15
×18.4V = 2.76
100
dt =

1
1
=
= 0.01
100
2f

1 0.01
= 3.623 × 10-3F
2.76

C1 = 3300µF
A preferred value of 3300µF was however employed.
A compensating capacitor C2 was used To reduce the ripple left in the system and a 4065µF was
employed.
2.2.2. Power Indicator
A power indicator circuit comprising of a resistor and Light Emitting Diode (LED) shows the
presence of power in the circuit.

RL

5V

2.7V

Fig. 3: The Power Indicator Circuit
93
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013

A voltage of around 2.7V is expected across the diode with a current of roughly 2mA.





A resistor of 1k is used instead for more practical importance and availability. It was also
chosen to limit the power of the light emitting diode, LED. The power dissipated by the resistor is
given by P = V2/R. - I22/I000-0.I44W

2.3. Micro-Switches Input/Sensor Unit
The Intrusion sensor detectors used in this project are micro-switches in normally close-mode.
The switches are connected in an electronic mat which could be used as a door mat at the
entrance and exit to buildings or the switches could also be fixed to the windows in a normally
close-mode. Any pressure of the heel or sole of a shoe as it steps on the mat or an attempt at
opening the window causes the switches to open hence, triggering the alarm system.

2.4. Monitoring and Indicator Unit
The monitoring and indicator unit is used in determining the exact point of intrusion hence,
facilitating easy location of the intruder. The Unit is built on a 4044 (Quad R/S Flip-flop) IC. This
package contains 4 independent Set/Reset flip-flops sharing a common output Tristate enable
control. On any one flip-flop Set and Reset should normally be a high. If Set (S) is made low,
as when the input switch is triggered, the Q output goes and stays high. If Reset (R) is made low;
the Q output goes and stays low, hence clearing the memory. If both S and R go low, the output
goes low. This is a normally disallowed state and the last input to go high determines the final
state of the flip-flop.
The outputs Qs are seen via LEDs. Each LED is connected to a separate output pin, while the
Set pins are triggered via the input switches separately so that the point of intrusion that is, the
switch triggered can be determined by the LED indicator that comes on. The circuit diagram
below (Fig. 4), shows the connection of the monitoring and indicator unit.
12V

L ED 1
R1

R2

R3

R4

R5

10kohm

10kohm

10kohm

10kohm

10kohm

U1
13

3
~S 0

4

~S 1

6

L ED 2
9
O1

~R 1

11

~S 2

12

10
O2

~R 2

15

~S 3

14

L ED 4
1

O3

~R 3

5

EO

Sw2
Sw3
Sw1

O0

~R 0

7

Sw4

4044BP

L ED 3

R6
33ohm

Sw5

Fig. 4: circuit diagram of the monitoring and indicator unit

94
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013

Sw1, 2, 3, and 4 serve as input switches with 10K pull-up resistors each, while Sw5 is the reset
switch with all reset pins looped together. The LEDs act as output (indicators) when any
corresponding switch is triggered.

2.5. The Tone Generator Unit
An Astable mode 555 timer IC is the “backbone” of the Tone Generator Unit; therefore it has
no stable state as in the case of the monostable state, therefore the output is continually
changing between 'low' and 'high‟.
VC C

12V

R4
8

8.2kohm

R2

8

68kohm

IC 1

3

7
6

R1
2

D IS

R5

O UT

8.2kohm

6

R3
2

TH R

B U Z Z ER

TH R

100uF
20Hz

5
C ON
G ND

5
C ON

1

G ND

LM555CN

C2
1

C1
1uF

D IS

O UT

TR I

1kohm

TR I

68kohm

3

7

R ST

C4

R ST

V CC

4

IC 2

V CC

4

C3

LM555CN
0.1uF

47uF

Fig. 5: circuit diagram of the tone generation unit

2.5.1. Astable Operation
The capacitor C 2 is charged by the current flowing through R1 and R2, with the output high
(+Vs).). The output becomes low and the discharge pin (pin7) is connected to 0V when the
capacitor voltage reaches 2/3 VS (threshold voltage). The threshold and trigger inputs monitor
the capacitor voltage.
With current flowing through R2 in the discharge pin, the capacitor now begins to discharge.
The output becomes high again when the voltage falls to 1/3Vs (trigger voltage) and the
discharge pin is then disconnected, allowing the capacitor to start charging again. The cycle
keeps repeating continuously unless the reset input is connected to 0V which forces the output
low while, a reset is 0V.
Calculation
(1)
And

(2)

Where, T = time period in seconds (s) = TON + TOFF
With R 1 =R 2 =68K, and C 2 = luF,
95
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013

With R3 = 8.2KΩ and C3 = 47uF

Therefore,

⁄

The tone generator unit is controlled by the timing unit via a transistor (BC 108), which acts
as a switch to trigger the generator unit ON. Hence, once the timing period is elapsed the
generated tone also ceases.
2.5.2. Monostable Operation
When the trigger input (555 pin 2) is less than 1/3 Vs the timing period is started. Therefore
making the output high (+Vs) and the capacitor C1 begins to charge through resistor R1. Further
trigger pulses are ignored once the time period has started.
When the voltage across C1 reaches 1/3 Vs, the time period is over and the output becomes low.
The threshold input (555 pin 6) monitors the voltage across C1. At the same instant, discharge
(555 pin 7) is connected to 0V, discharging the capacitor and ready for the next trigger.

2.6. Output Unit
The output of this system are LEDs and a buzzer. The output of the LEDs has been discussed
earlier. Any light of the LEDs that shows tells us which of the entrance is being burgled.
The other output used to sound was a buzzer. The one used has the following specifications from
data sheets:
Frequency = 15 Hz
Impedance = 300
Voltage rating = 12V

96
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013
VCC

12V

R7
10kohm

R4
8

8.2kohm
8

R8

IC1

R2

100kohm VCC
4

8

68kohm
4

RST

6
2

OU T

DIS

2

R6

CON
GN D

R5

3
DIS

8.2kohm

OU T

R3

6
2

LM555CN
10uF

1uF

C6

20Hz

1

LM555CN
0.1uF

100uF

LM555CN
1

C1

THR

CON
GN D

5

C2
BC109

BUZZER

5

CON
GN D
1

DIS

OU T

TRI

1kohm

THR

C4
3

7

TRI

68kohm
4.7kohm

5

C5

6

R1

TRI

VCC

7

THR

IC3

VCC
RST

RST

3

7

4

IC2

C3
47uF

10nF

J1
Key = Space

TIMING UNIT

TONE GENERATION UNIT

Fig. 6:Combination of the timing and tone generation unit

2.7. Principle of Operation
This system has four micro switches detectors that sense an intruder independently. The micro
switches are either laid under the carpets, foot mats or window hinges. When an intruder steps on
any of the switches in any of the four/all entrances or attempt to open the window, the switch
closes and sends a signal through the circuitry that triggers the flip-flop.

Fig. 7: Complete circuit diagram of the electronic switch sensor with a point-to-point intrusive monitoring
system

97
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013

3. SYSTEM CONSTRUCTION, TESTING AND DISCUSSIONS
3.1. Testing
It is one thing to develop and construct a system, but the beauty of it is for the construction to
pass all tests and work to specification. The project was physically and functionally realized.
After the paper design and analysis, the different stages of the circuit were constructed and tested
to ensure error free system and was finally coupled together to meet the desired specifications.
The process of testing and troubleshooting required the use of some of the equipment as:
Digital Multimeter: The digital Multimeter basically measures voltages, resistance, continuity,
current, frequency, temperature and transistor. Measurement of parameters like, voltages,
continuity, resistance values of the components and in some cases frequency measurement are
required in the implementation of the design on the board. The digital Multimeter was used to
check the various voltage drops at all stages in the project. It is almost the most useful tools for
troubleshooting during construction and coupling.
Electronic Workbench: The design and simulation of this project were carried out first using a
Computer Aided Software known as Electronic Workbench, with each block designed and
tested, where upon getting the required output results, the test was carried out on a breadboard.
The specified components were obtained and test was carried out stage by stage and it was
found to be functional on the breadboard within the design specifications.
The entire components were then transferred onto a Vero board. Before soldering the
components on the Vero board, the strip lines of the Vero board were cleaned with a
methylated spirit in order to remove any form of conductor or dirt on it.
Integrated Circuit bases were soldered on the Vero board instead of the ICs themselves
directly to avoid over-heating them during soldering and for easy replacement when necessary.
Great care was taken in handling CMOS ICs because any form of static discharge or heat
during soldering could easily damage them.
Holes were then bore through the prototype base at the four entrances where the micro switches were installed to protrude just for slight contact. The LEDs that serve as indicators
were mounted at the center of the building where it will be conspicuous to all households.

3.2

Result Analysis

After simulation using computer software (Multisim Electronic Workbench) to test the
operation of the project, the result below was obtained from the timing circuit. The below
graph (Fig. 8), shows the simulated result gotten from the operation of the timing and tone
generation unit, hence the result conformed to the stipulated output result. The test was then
carried out with the specified components on the breadboard, and found to have worked
satisfactorily according to the specifications of the design.

98
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013

Fig. 8: Waveform generated

4. CONCLUSION
The aim and objective of the electronic security alarm system design were achieved,
constructed and tested to work according to specifications.It is a known fact that even the
highest fences, coupled with efficient security guards and dogs cannot make a home
impenetrable. The use of this Electronics security alarm system whose operation is not based
on sentiments is our best option today. At this time of insecure society this design work is the
best for all homes and offices that needs to know when there is an intruder to unauthorized
places.The micro switches used for this project as detectors are very sensitive and
inconspicuous. Even when an intruder detects it and tries to disconnect it, the alarm will still
be triggered because they were genuinely sensitive. Availability of components and their costeffectiveness will go a long way in making this system stand the test of time. This system works
on the principle of the micro-switch sensor and dependent on the condition that an intruder
entered through the door and stepped in any one of the switches under the mat. All constructs
were deliberate and carefully carried out with effective troubleshooting and maintenance criteria.
The design of this security system involves; research in both analog and digital electronics.
Research was done on timers and logic control circuits,as well as with relays and Opto-devices
(e.g. Photodiodes, photo cells etc.). The implemented system was a typical prototype of the
model.
There are areas that need improvements on this design such as if the purpose is not to scare
away intruders but to catch them, then the alarm portion should be removed and be replaced
with a special signal. This signal can be hidden bulbs or the signal can be wired to the security
service unit. A hidden digital camera can also be incorporated into the system to take pictures
of intruders without their knowledge at the point of intrusion.

ACKNOWLEDGEMENTS
The authors would like to thank Col. Muhammed Sani Bello (RTD), OON, Vice Chairman of
MTN Nigeria Communications Limited for supporting the research.

99
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013

REFERENCES
Alkar, A. Z., &Buhur, U. (2005),“An Internet Based Wireless Home Automation System for
Multifunctional Devices”,IEEE Consumer Electronics, 51(4), pp. 1169-1174.
[2] Ciubotaru-Petrescu, B., Chiciudean, D., Cioarga, R., &Stanescu, D. (2006),“Wireless Solutions for
Telemetry in Civil Equipment and Infrastructure Monitoring”,3rd Romanian-Hungarian Joint
Symposiumon Applied Computational Intelligence (SACI) May 25-26, 2006.
[3] Potamitis, I., Georgila, K., Fakotakis, N., &Kokkinakis, G. (2003),“An integrated system for smarthome control of appliances based on remote speech interaction”,EUROSPEECH 2003, 8th European
Conferenceon Speech Communication and Technology, Geneva, Switzerland, Sept. 1-4, 2003,pp.
2197-2200.
[4] Zungeru, A..M., Kolo, J.G.,&Olumide, I.(2012), “A Simple and Reliable Touch sensitive security
System”, International Journal of Network Security & Its Applications (IJNSA), 4(5), pp. 149–165.
[5] Max, L., Thiringer, T.,Undeland, T., &Karlsson, R., (2009). Power electronics design laboratory
exercise for final-year M.Sc. Students. IEEE Transaction on Education, 52(4), pp. 524-531.
[6] Lionel Warnes. Electronic and Electrical Engineering. Principles and practice Macmillan Press Ltd.
London 1994 pp 145 – 220.
[7] Robert L. Boylestad and Louis NashelskyElectronic devices and circuit theoryEighteditions. Prentice
Hall (Pearson Education Inc.) 2002 pp 875
[8] Theraja, B. L.,& Theraja, B.K (2002),“A textbook of Electrical Technology”, S. Chand and Company
Ltd. New Delhi, India 2002, pp. 220, 920, 924, 1712 – 1716.
[9] Bernard, G., &Mitton, S. K.(1985), “Application of electronics”, Syed Sons Printer. Lahore, pp. 162167, 171, 174.
[10] Thomas, E. N. (1995), “Electricity and Electronics”, Glencoe McGraw Hill, pp. 280 – 281, 414.
[11]Weber, &Thad-L. (1985),“Alarm Systems and Theft Protection”, 2ndedition,Stoncham,
MA:Uutterworth,pp. 7-8.
[1]

Authors
Engr. Dr. Adamu Murtala Zungeru received his BEng degree in electrical and
computer engineering from the Federal University of Technology (FUT) Minna,
Nigeria in 2004, MSc in electronic and telecommunication engineering from the
Ahmadu Bello University (ABU) Zaria, Nigeria in 2009 and his PhD in Engineering
from the University of Nottingham. He is currently a lecturer two (LII) at the FUT
Minna, Nigeria, a position which he started in 2009. He is a registered engineer with
the Council for the Regulation of Engineering in Nigeria (COREN), a professional member of the
Institute of Electrical and Electronics Engineers (IEEE), and a professional member of the Association for
Computing Machinery (ACM). His research interests are in the fields of swarm intelligence, routing
algorithms, wireless sensor networks, energy harvesting, automation, home and industrial security
system.
Haruna Isah obtained a Bachelor of Engineering (B. Eng.) Degree, from the
department of Electrical and Electronics Engineering, University of Maiduguri in
2008; Masters of Science (MSc.), Software Engineering in 2012 from the School of
Computing Informatics and Media (SCIM) University of Bradford, United
Kingdom. Haruna Isah is also a Professional Member of the Association for
Computing Machinery (ACM), IEEE and the Computer Society of IEEE. He is
currently an Assistant Lecturer with the Electrical and Electronics Engineering
Department of the Federal University of Technology Minna, Nigeria. His research interest includes
Embedded Systems, Machine Learning, Data mining, Artificial Intelligence, Software Reuse, Web
Technologies, and the Social Web.
Ahmad Abubakar Sadiq received the BEng degree in electrical and computer
engineering from Federal university of Technology, Minna in 2008 and MEng in
Electric power and machine in 2013 from same university. He is currently an
assistant lecturer in the department of electrical and electronic engineering, Federal
university of Technology, Minna. His research interest is in power system planning
and operations with specifics in Transfer capability assessment.
100

Más contenido relacionado

La actualidad más candente

Report on automatic door
Report on automatic doorReport on automatic door
Report on automatic door
Indira Kundu
 
Ubiquitous home control and monitoring system using android based smart phone
Ubiquitous home control and monitoring system using android based smart phoneUbiquitous home control and monitoring system using android based smart phone
Ubiquitous home control and monitoring system using android based smart phone
Rajeev Piyare
 
Arduino Based Home Lighting Control by Android Phone
Arduino Based Home Lighting Control by Android PhoneArduino Based Home Lighting Control by Android Phone
Arduino Based Home Lighting Control by Android Phone
ijtsrd
 
Wireless home security system
Wireless home security systemWireless home security system
Wireless home security system
Infort Technology
 

La actualidad más candente (20)

Report on automatic door
Report on automatic doorReport on automatic door
Report on automatic door
 
Home Automation
Home AutomationHome Automation
Home Automation
 
IJISET_V2_I6_90
IJISET_V2_I6_90IJISET_V2_I6_90
IJISET_V2_I6_90
 
Automated home secuirty project
Automated home secuirty projectAutomated home secuirty project
Automated home secuirty project
 
Ubiquitous home control and monitoring system using android based smart phone
Ubiquitous home control and monitoring system using android based smart phoneUbiquitous home control and monitoring system using android based smart phone
Ubiquitous home control and monitoring system using android based smart phone
 
Thesis - Voice Control Home Automation
Thesis - Voice Control Home AutomationThesis - Voice Control Home Automation
Thesis - Voice Control Home Automation
 
Home automation
Home    automationHome    automation
Home automation
 
Smart home automation system
Smart home automation systemSmart home automation system
Smart home automation system
 
Automatic door using arduino
Automatic door using arduinoAutomatic door using arduino
Automatic door using arduino
 
Presentation Smart Home With Home Automation
Presentation Smart Home With Home AutomationPresentation Smart Home With Home Automation
Presentation Smart Home With Home Automation
 
Access control basics-3
Access control basics-3Access control basics-3
Access control basics-3
 
Smart and Secure Home using IoT
Smart and Secure Home using IoTSmart and Secure Home using IoT
Smart and Secure Home using IoT
 
Gsm based home security system
Gsm based home security systemGsm based home security system
Gsm based home security system
 
Home security system using iot
Home security system using iotHome security system using iot
Home security system using iot
 
Home automation & security system
Home automation & security systemHome automation & security system
Home automation & security system
 
Arduino Based Home Lighting Control by Android Phone
Arduino Based Home Lighting Control by Android PhoneArduino Based Home Lighting Control by Android Phone
Arduino Based Home Lighting Control by Android Phone
 
Wireless home security system
Wireless home security systemWireless home security system
Wireless home security system
 
Home automation
Home automationHome automation
Home automation
 
Password based door locking system
Password based door locking systemPassword based door locking system
Password based door locking system
 
Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...
 

Destacado

I will be showing you the way in
I will be showing you the way inI will be showing you the way in
I will be showing you the way in
Jordan Booker
 
Oriental recipe cards
Oriental recipe cardsOriental recipe cards
Oriental recipe cards
charliepawson
 
Initial ideas and feedback
Initial ideas and feedbackInitial ideas and feedback
Initial ideas and feedback
charliepawson
 
ทำความรู้จัก ระบบปฏิบัติการ
ทำความรู้จัก ระบบปฏิบัติการทำความรู้จัก ระบบปฏิบัติการ
ทำความรู้จัก ระบบปฏิบัติการ
30082527
 
7 สามัญ ฟิสิกส์
7 สามัญ ฟิสิกส์7 สามัญ ฟิสิกส์
7 สามัญ ฟิสิกส์
Joesys Suwanichkul
 
Beameruse theme Purdue University
Beameruse theme Purdue UniversityBeameruse theme Purdue University
Beameruse theme Purdue University
Hirwanto Iwan
 

Destacado (20)

I will be showing you the way in
I will be showing you the way inI will be showing you the way in
I will be showing you the way in
 
Workshop Social media: effectief & meetbaar
Workshop Social media: effectief & meetbaarWorkshop Social media: effectief & meetbaar
Workshop Social media: effectief & meetbaar
 
Admit card
Admit cardAdmit card
Admit card
 
Oriental recipe cards
Oriental recipe cardsOriental recipe cards
Oriental recipe cards
 
Initial ideas and feedback
Initial ideas and feedbackInitial ideas and feedback
Initial ideas and feedback
 
En İyi Arkadaşım
En İyi ArkadaşımEn İyi Arkadaşım
En İyi Arkadaşım
 
Ministriju iesniegtie jauno politikas iniciatīvu pasākumi 2014., 2015. un 201...
Ministriju iesniegtie jauno politikas iniciatīvu pasākumi 2014., 2015. un 201...Ministriju iesniegtie jauno politikas iniciatīvu pasākumi 2014., 2015. un 201...
Ministriju iesniegtie jauno politikas iniciatīvu pasākumi 2014., 2015. un 201...
 
Boisik
BoisikBoisik
Boisik
 
Joyjoy
JoyjoyJoyjoy
Joyjoy
 
Westlight industries
Westlight industriesWestlight industries
Westlight industries
 
GC3 Beamer
GC3 BeamerGC3 Beamer
GC3 Beamer
 
Vin fb2
Vin fb2Vin fb2
Vin fb2
 
ทำความรู้จัก ระบบปฏิบัติการ
ทำความรู้จัก ระบบปฏิบัติการทำความรู้จัก ระบบปฏิบัติการ
ทำความรู้จัก ระบบปฏิบัติการ
 
ความหมาย
ความหมายความหมาย
ความหมาย
 
Kohēzijas politikas ES fondu un ārvalstu finanšu palīdzības investīciju progr...
Kohēzijas politikas ES fondu un ārvalstu finanšu palīdzības investīciju progr...Kohēzijas politikas ES fondu un ārvalstu finanšu palīdzības investīciju progr...
Kohēzijas politikas ES fondu un ārvalstu finanšu palīdzības investīciju progr...
 
Magic math
Magic mathMagic math
Magic math
 
7 สามัญ ฟิสิกส์
7 สามัญ ฟิสิกส์7 สามัญ ฟิสิกส์
7 สามัญ ฟิสิกส์
 
DISCOVER MIKE
DISCOVER MIKEDISCOVER MIKE
DISCOVER MIKE
 
Google glass
Google glassGoogle glass
Google glass
 
Beameruse theme Purdue University
Beameruse theme Purdue UniversityBeameruse theme Purdue University
Beameruse theme Purdue University
 

Similar a An electronic switch sensor with a point to-point intrusive monitoring system

A Simple and Reliable Touch Sensitive Security System
A Simple and Reliable Touch Sensitive Security SystemA Simple and Reliable Touch Sensitive Security System
A Simple and Reliable Touch Sensitive Security System
IJNSA Journal
 
Smart home project technical paper
Smart home project technical paperSmart home project technical paper
Smart home project technical paper
Anwar Al Ahdab
 

Similar a An electronic switch sensor with a point to-point intrusive monitoring system (20)

Electronic security system
Electronic security systemElectronic security system
Electronic security system
 
A Simple and Reliable Touch Sensitive Security System
A Simple and Reliable Touch Sensitive Security SystemA Simple and Reliable Touch Sensitive Security System
A Simple and Reliable Touch Sensitive Security System
 
FIRE ALARM SYSTEM BASED ON MCU FOR INDUSTRY APPLICATION
FIRE ALARM SYSTEM BASED ON MCU FOR INDUSTRY APPLICATIONFIRE ALARM SYSTEM BASED ON MCU FOR INDUSTRY APPLICATION
FIRE ALARM SYSTEM BASED ON MCU FOR INDUSTRY APPLICATION
 
Burglar Alarm Micro Project
Burglar Alarm Micro ProjectBurglar Alarm Micro Project
Burglar Alarm Micro Project
 
Smart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSMSmart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSM
 
Control and indicating equipment communicating via the peripheral component i...
Control and indicating equipment communicating via the peripheral component i...Control and indicating equipment communicating via the peripheral component i...
Control and indicating equipment communicating via the peripheral component i...
 
Effective Human Detection & Tracking Security Using Machine Vision
Effective Human Detection & Tracking Security Using Machine VisionEffective Human Detection & Tracking Security Using Machine Vision
Effective Human Detection & Tracking Security Using Machine Vision
 
Integrated Security System With Remot Controlling Of Appliances
Integrated Security System With Remot Controlling Of AppliancesIntegrated Security System With Remot Controlling Of Appliances
Integrated Security System With Remot Controlling Of Appliances
 
Project ppt
Project   pptProject   ppt
Project ppt
 
Smart home project technical paper
Smart home project technical paperSmart home project technical paper
Smart home project technical paper
 
protection on lineman while working on transmission line report
 protection on lineman while working on transmission line report protection on lineman while working on transmission line report
protection on lineman while working on transmission line report
 
Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 9030844877Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 9030844877
 
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
 
IR and Metal senosors Based Product Sorting.docx
IR and Metal senosors Based Product Sorting.docxIR and Metal senosors Based Product Sorting.docx
IR and Metal senosors Based Product Sorting.docx
 
Smart digital and analogue ambience control and
Smart digital and analogue ambience control andSmart digital and analogue ambience control and
Smart digital and analogue ambience control and
 
DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES
DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES
DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES
 
DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES
DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES
DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES
 
Message based home automation & security system
Message based home automation  & security systemMessage based home automation  & security system
Message based home automation & security system
 
To design low
To design lowTo design low
To design low
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptx
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 

An electronic switch sensor with a point to-point intrusive monitoring system

  • 1. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013 AN ELECTRONIC SWITCH SENSOR WITH A POINTTO-POINT INTRUSIVE MONITORING SYSTEM Adamu Murtala Zungeru, Haruna Isah, Paul Obafemi Abraham-Attah and Ahmad Abubakar Sadiq Department of Electrical and Electronics Engineering, Federal University of Technology, Nigeria ABSTRACT Sophistications in theft and other criminal damages necessitates for the symbiotic blending of technology with security needs. In this research, electronic switches in the form of sensors were used to implement a point-to point intrusive monitoring system for the detection of an unauthorized access to commercial and residential buildings. The system is a simple and reliable security system and uses switch sensor technology to revolutionize the standards of living. The system is also simple, adaptable and cost-effective. It is designed in six major units which include; the power supply, the input/sensor micro-switches, the monitoring and indicator, the timing, the tone generation and output units. To ensure steady power supply in the circuit, the power unit constitutes both the mains and DC supplies. The alarm unit are being activated by the normally closed sensor micro-switches unit which is connected in an electronic/door mat at both the entrance and exit of buildings. In order to facilitate easy location of the intruder, the exact point of intrusion is being determined by the monitoring and indicator unit which constitutes the quad R/S flipflop IC and LED’s. The timing/tone generation unit is built on the 555 timer IC, in the Astable mode, which output keeps changing as far as there is a breakage of the sensors. The output of the system is mainly the LEDs and buzzer, which gives electrical light and audio signal to notify the owner of an intruder in the building. Major design issues considered include; efficiency, portability, cost-effectiveness, durability, compatibility as well as the availability of required materials. This system works on the principle of the micro-switch sensor and dependent on the condition that an intruder entered through the door and stepped in any one of the switches under the mat. Verification and validation of the system indicate compliances to design specification hence the output requirements were met. KEYWORDS Security system, Automation, Electronic Switch, Sensors, Room Light, Electronic Circuit Design. 1. INTRODUCTION Theft and criminal damage is a threat and cost to home and business. Hence, the need to protect our homes, offices and business environment. Improvement in technology by man has shown that knowledge and experience can be harmonized and refined to assist man to observe, perceive, communicate, remember, calculate, reason, and protect himself. Electronics, electrical, mechanical and/or chemical materials can be designed to serve or function as detectors of intruder to our homes. Among these, Electronic intruder detection systems were found to be the best that can provide cost-effective protection and act as a deterrent to intruders while alerting household, staff and/or police depending on the design. Electronic systems can function in two states. They are either analog or digital [1-3]. DOI : 10.5121/ijitmc.2013.1410 89
  • 2. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013 Analog and digital systems can be differentiated by their output representations; while the signal output is behaving linearly with the input in analog systems, and can be represented by a pointer on a scale, digital systems represent their output in discrete levels either as up or down, „1‟ or „0‟ and on or off and their output can display numeric or alphabetically [3-5]. The digital state of electronics is preferred and widely in use today. Even with insurance cover, the real cost of a break-in can be detrimental and should not be ignored. Disruption may lead to lost of lives in homes, delays and inefficiencies in business activities or even lost customers. The major components of an electronic intruder alarm system include detection, control and signaling devices. Every part of this equipment will be developed to fulfill a specific task within the system. These components are strategically placed in the building to be protected, with an assurance of constant, reliable and disturbance-free functioning. Alarm or intruder detectors come in many forms depending on the purpose it is meant for and has been in existence for some time. The most common security sensors indicate the opening of a door or window or detect motion via passive infrared (PIR). Some alarm systems are meant for single mission, while others handle fire, intrusion, and safety alarms simultaneously. Sophistication ranges from small, self-contained noisemakers, to complicated, multi-zoned systems with color-coded computer monitor outputs. Many of these concepts also apply to portable alarms for protecting cars, trucks or other vehicles and their contents. Two options are much prevalent in the choice of an alarm system. These include, (1) An audible alarm sounds at the premises or home it is protecting only. This requires someone to immediately contact and report the incident to the police too. (2) A Monitored alarm sounds at the premises then a signal is sent to an alarm receiving center through a phone line or mobile network [4-7]. The alarm receiving center (ARC) is usually law enforcement agencies e.g. police. There are also the choices of either hard wired or wire free systems. Comparison between the two indicates that the Hardwired is more reliable and cheaper but takes longer to install. Most commercial alarms are wired. Wire free is easy to install but are more expensive than a wired system and are mostly used in homes or small business premises. Alarm intrusion detectors can also be classified as Point detectors and Area detectors. While point detectors indicate an intrusion at a specific point, area detectors indicate an intruder's presence within the protected area. Point detector types include mechanical or magnetic contacts on doors and windows, photocell or microwave beams across pathways, pressure-sensitive mats, fiberoptic bend or stress sensors, proximity switches that detect humans and vibration sensors among others. Area detectors use such technologies like the infrared (heat) detectors ultrasonic transducers, and microwave transducers, sometimes in combination within one sensor. In general, area detectors detect a sudden change in an environment being protected and trigger at some predetermined threshold. Often because of improper aiming or other adjustments, they are much more prone to false alarms than Point detectors. But interested readers can see [8-11] for theory of other components and methods adopted for this work. 2. SYSTEM DESIGN METHODOLOGY, ANALYSIS, AND CALCULATIONS This section will discuss the design procedure and the analysis of the components used for this work and generally deals with the design of the individual stages of the electronic security alarm System, which consist of the following units: I. II. III. The power supply unit Input/sensor micro-switches Monitoring and indicator unit 90
  • 3. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013 IV. V. VI. Timing unit Tone generator unit Output unit 2.1. Design Methodology The design of this work and principle of operation was demonstrated using the prototype of a building. In the design, four (4) entrances were selected to be monitored and protected by the alarm. An integrated circuit (I.C) that has four (4) set and reset pins was employed for the purpose of demonstrating the principle of operation of the intruder alarm system. Micro switches were used as detectors. The Micro-switches detectors were connected in electronic mats placed at the doorsteps of each of the four entrances to be protected and finally connected to the system. The monitoring and indicator unit serves as an output of the system. Each LED is labeled to correspond to a switching point and indicates which switch is tripped ON. These micro switches and infrared sensors can either be connected to door entrances or windows. Below (Fig. 1), is the complete block diagram of the system. Fig. 1:Schematic block diagram of electronic alarm system The electronic circuit was powered by a 12 volt direct current from a full wave rectified voltage. To ensure stability of power supply of the equipment, a 12volt battery backup was designed into it and connected in parallel to serve as an alternative power source. With this a 24 hour protection is guaranteed. Micro switches connected to the four (4) doormats and/or windows are in a normally open condition. When they are stepped on, it closes sending a signal to the circuit thus triggering the alarm. Each micro switch is connected to the memory module and the LED indicators connected to the memory unit.When an intruder steps on the mat thus opening the micro switch, pulses are generated. These pulses generated are responsible for the activation of the tone generator connected in an astable mode on a timing unit. The tone generator and timing unit were both built on an integrated circuit called 555 timer but the timing unit was connected in a monostable mode. 91
  • 4. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013 2.2. The Power Supply Unit In this sub-section, we describe and explain the design of the power supply unit. For the circuit we would require a 7812-voltage regulator as shown in the Fig. 2 below, which gives the required output of +12V. The voltage regulator regulates input voltages above its required output voltage. If the input voltage is below its required output voltage, it would be passed out without being regulated. To achieve this, the following steps were undergone. • • • • • Stepping down the A C supply with a transformer Full wave rectification Removal of ripple from the rectified waveform Voltage regulation to desired value Power display LED The power unit involves the transformer-bridge rectifier circuit. A 24V transformer is used to provide power to 7812 regulators, which produce, regulated 12V. 1 7812 3 V+ 2 C1 C2 R Fig. 2: The power supply unit The common bridge rectifier, comprising four rectifying diodes, is used for converting the 24V AC power supply into corresponding roughly 24V DC voltage. The involved ripple at the output of the bridge rectifier is filtered through a 2200F, 35V capacitor. The voltage rating of the capacitor is about twice the expected output voltage of the rectifier, to protect the device from the effect of the high voltage supply.A power switch was used to open and close the complete circuit when required. The 7812-voltage regulator is connected in parallel across the rectified voltage output. The devices are aimed for the stability of the complete circuit. The 12V power supply from the 7812 is connected to the main circuit. 2.2.1. Analysis of the Power Supply Unit If the input to the 7812 is greater than the required output by saying, a factor of 4, the voltage regulator IC will start getting hot and will then eventually be damaged. As such an input of approximately 16V (i.e 12+4) is required. Recall that diode drops 0.6V and there are 4 rectifying diodes constituting a full wave bridge, we will then have a voltage drop of 0.6 x 4 = 2.4V 92
  • 5. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013 Considering a peak voltage of 16+2.4=18.4V peak. Also considering an r.m.s voltage = 18.4 18.4 = = 13.143V 2 1 .4 Therefore a transformer of a preferred value of 15V was employed. i.e. 220V/15V transformer. Assuming a ripple voltage of 15% dv = and C1 = 15 ×18.4V = 2.76 100 dt = 1 1 = = 0.01 100 2f 1 0.01 = 3.623 × 10-3F 2.76 C1 = 3300µF A preferred value of 3300µF was however employed. A compensating capacitor C2 was used To reduce the ripple left in the system and a 4065µF was employed. 2.2.2. Power Indicator A power indicator circuit comprising of a resistor and Light Emitting Diode (LED) shows the presence of power in the circuit. RL 5V 2.7V Fig. 3: The Power Indicator Circuit 93
  • 6. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013 A voltage of around 2.7V is expected across the diode with a current of roughly 2mA.   A resistor of 1k is used instead for more practical importance and availability. It was also chosen to limit the power of the light emitting diode, LED. The power dissipated by the resistor is given by P = V2/R. - I22/I000-0.I44W 2.3. Micro-Switches Input/Sensor Unit The Intrusion sensor detectors used in this project are micro-switches in normally close-mode. The switches are connected in an electronic mat which could be used as a door mat at the entrance and exit to buildings or the switches could also be fixed to the windows in a normally close-mode. Any pressure of the heel or sole of a shoe as it steps on the mat or an attempt at opening the window causes the switches to open hence, triggering the alarm system. 2.4. Monitoring and Indicator Unit The monitoring and indicator unit is used in determining the exact point of intrusion hence, facilitating easy location of the intruder. The Unit is built on a 4044 (Quad R/S Flip-flop) IC. This package contains 4 independent Set/Reset flip-flops sharing a common output Tristate enable control. On any one flip-flop Set and Reset should normally be a high. If Set (S) is made low, as when the input switch is triggered, the Q output goes and stays high. If Reset (R) is made low; the Q output goes and stays low, hence clearing the memory. If both S and R go low, the output goes low. This is a normally disallowed state and the last input to go high determines the final state of the flip-flop. The outputs Qs are seen via LEDs. Each LED is connected to a separate output pin, while the Set pins are triggered via the input switches separately so that the point of intrusion that is, the switch triggered can be determined by the LED indicator that comes on. The circuit diagram below (Fig. 4), shows the connection of the monitoring and indicator unit. 12V L ED 1 R1 R2 R3 R4 R5 10kohm 10kohm 10kohm 10kohm 10kohm U1 13 3 ~S 0 4 ~S 1 6 L ED 2 9 O1 ~R 1 11 ~S 2 12 10 O2 ~R 2 15 ~S 3 14 L ED 4 1 O3 ~R 3 5 EO Sw2 Sw3 Sw1 O0 ~R 0 7 Sw4 4044BP L ED 3 R6 33ohm Sw5 Fig. 4: circuit diagram of the monitoring and indicator unit 94
  • 7. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013 Sw1, 2, 3, and 4 serve as input switches with 10K pull-up resistors each, while Sw5 is the reset switch with all reset pins looped together. The LEDs act as output (indicators) when any corresponding switch is triggered. 2.5. The Tone Generator Unit An Astable mode 555 timer IC is the “backbone” of the Tone Generator Unit; therefore it has no stable state as in the case of the monostable state, therefore the output is continually changing between 'low' and 'high‟. VC C 12V R4 8 8.2kohm R2 8 68kohm IC 1 3 7 6 R1 2 D IS R5 O UT 8.2kohm 6 R3 2 TH R B U Z Z ER TH R 100uF 20Hz 5 C ON G ND 5 C ON 1 G ND LM555CN C2 1 C1 1uF D IS O UT TR I 1kohm TR I 68kohm 3 7 R ST C4 R ST V CC 4 IC 2 V CC 4 C3 LM555CN 0.1uF 47uF Fig. 5: circuit diagram of the tone generation unit 2.5.1. Astable Operation The capacitor C 2 is charged by the current flowing through R1 and R2, with the output high (+Vs).). The output becomes low and the discharge pin (pin7) is connected to 0V when the capacitor voltage reaches 2/3 VS (threshold voltage). The threshold and trigger inputs monitor the capacitor voltage. With current flowing through R2 in the discharge pin, the capacitor now begins to discharge. The output becomes high again when the voltage falls to 1/3Vs (trigger voltage) and the discharge pin is then disconnected, allowing the capacitor to start charging again. The cycle keeps repeating continuously unless the reset input is connected to 0V which forces the output low while, a reset is 0V. Calculation (1) And (2) Where, T = time period in seconds (s) = TON + TOFF With R 1 =R 2 =68K, and C 2 = luF, 95
  • 8. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013 With R3 = 8.2KΩ and C3 = 47uF Therefore, ⁄ The tone generator unit is controlled by the timing unit via a transistor (BC 108), which acts as a switch to trigger the generator unit ON. Hence, once the timing period is elapsed the generated tone also ceases. 2.5.2. Monostable Operation When the trigger input (555 pin 2) is less than 1/3 Vs the timing period is started. Therefore making the output high (+Vs) and the capacitor C1 begins to charge through resistor R1. Further trigger pulses are ignored once the time period has started. When the voltage across C1 reaches 1/3 Vs, the time period is over and the output becomes low. The threshold input (555 pin 6) monitors the voltage across C1. At the same instant, discharge (555 pin 7) is connected to 0V, discharging the capacitor and ready for the next trigger. 2.6. Output Unit The output of this system are LEDs and a buzzer. The output of the LEDs has been discussed earlier. Any light of the LEDs that shows tells us which of the entrance is being burgled. The other output used to sound was a buzzer. The one used has the following specifications from data sheets: Frequency = 15 Hz Impedance = 300 Voltage rating = 12V 96
  • 9. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013 VCC 12V R7 10kohm R4 8 8.2kohm 8 R8 IC1 R2 100kohm VCC 4 8 68kohm 4 RST 6 2 OU T DIS 2 R6 CON GN D R5 3 DIS 8.2kohm OU T R3 6 2 LM555CN 10uF 1uF C6 20Hz 1 LM555CN 0.1uF 100uF LM555CN 1 C1 THR CON GN D 5 C2 BC109 BUZZER 5 CON GN D 1 DIS OU T TRI 1kohm THR C4 3 7 TRI 68kohm 4.7kohm 5 C5 6 R1 TRI VCC 7 THR IC3 VCC RST RST 3 7 4 IC2 C3 47uF 10nF J1 Key = Space TIMING UNIT TONE GENERATION UNIT Fig. 6:Combination of the timing and tone generation unit 2.7. Principle of Operation This system has four micro switches detectors that sense an intruder independently. The micro switches are either laid under the carpets, foot mats or window hinges. When an intruder steps on any of the switches in any of the four/all entrances or attempt to open the window, the switch closes and sends a signal through the circuitry that triggers the flip-flop. Fig. 7: Complete circuit diagram of the electronic switch sensor with a point-to-point intrusive monitoring system 97
  • 10. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013 3. SYSTEM CONSTRUCTION, TESTING AND DISCUSSIONS 3.1. Testing It is one thing to develop and construct a system, but the beauty of it is for the construction to pass all tests and work to specification. The project was physically and functionally realized. After the paper design and analysis, the different stages of the circuit were constructed and tested to ensure error free system and was finally coupled together to meet the desired specifications. The process of testing and troubleshooting required the use of some of the equipment as: Digital Multimeter: The digital Multimeter basically measures voltages, resistance, continuity, current, frequency, temperature and transistor. Measurement of parameters like, voltages, continuity, resistance values of the components and in some cases frequency measurement are required in the implementation of the design on the board. The digital Multimeter was used to check the various voltage drops at all stages in the project. It is almost the most useful tools for troubleshooting during construction and coupling. Electronic Workbench: The design and simulation of this project were carried out first using a Computer Aided Software known as Electronic Workbench, with each block designed and tested, where upon getting the required output results, the test was carried out on a breadboard. The specified components were obtained and test was carried out stage by stage and it was found to be functional on the breadboard within the design specifications. The entire components were then transferred onto a Vero board. Before soldering the components on the Vero board, the strip lines of the Vero board were cleaned with a methylated spirit in order to remove any form of conductor or dirt on it. Integrated Circuit bases were soldered on the Vero board instead of the ICs themselves directly to avoid over-heating them during soldering and for easy replacement when necessary. Great care was taken in handling CMOS ICs because any form of static discharge or heat during soldering could easily damage them. Holes were then bore through the prototype base at the four entrances where the micro switches were installed to protrude just for slight contact. The LEDs that serve as indicators were mounted at the center of the building where it will be conspicuous to all households. 3.2 Result Analysis After simulation using computer software (Multisim Electronic Workbench) to test the operation of the project, the result below was obtained from the timing circuit. The below graph (Fig. 8), shows the simulated result gotten from the operation of the timing and tone generation unit, hence the result conformed to the stipulated output result. The test was then carried out with the specified components on the breadboard, and found to have worked satisfactorily according to the specifications of the design. 98
  • 11. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013 Fig. 8: Waveform generated 4. CONCLUSION The aim and objective of the electronic security alarm system design were achieved, constructed and tested to work according to specifications.It is a known fact that even the highest fences, coupled with efficient security guards and dogs cannot make a home impenetrable. The use of this Electronics security alarm system whose operation is not based on sentiments is our best option today. At this time of insecure society this design work is the best for all homes and offices that needs to know when there is an intruder to unauthorized places.The micro switches used for this project as detectors are very sensitive and inconspicuous. Even when an intruder detects it and tries to disconnect it, the alarm will still be triggered because they were genuinely sensitive. Availability of components and their costeffectiveness will go a long way in making this system stand the test of time. This system works on the principle of the micro-switch sensor and dependent on the condition that an intruder entered through the door and stepped in any one of the switches under the mat. All constructs were deliberate and carefully carried out with effective troubleshooting and maintenance criteria. The design of this security system involves; research in both analog and digital electronics. Research was done on timers and logic control circuits,as well as with relays and Opto-devices (e.g. Photodiodes, photo cells etc.). The implemented system was a typical prototype of the model. There are areas that need improvements on this design such as if the purpose is not to scare away intruders but to catch them, then the alarm portion should be removed and be replaced with a special signal. This signal can be hidden bulbs or the signal can be wired to the security service unit. A hidden digital camera can also be incorporated into the system to take pictures of intruders without their knowledge at the point of intrusion. ACKNOWLEDGEMENTS The authors would like to thank Col. Muhammed Sani Bello (RTD), OON, Vice Chairman of MTN Nigeria Communications Limited for supporting the research. 99
  • 12. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013 REFERENCES Alkar, A. Z., &Buhur, U. (2005),“An Internet Based Wireless Home Automation System for Multifunctional Devices”,IEEE Consumer Electronics, 51(4), pp. 1169-1174. [2] Ciubotaru-Petrescu, B., Chiciudean, D., Cioarga, R., &Stanescu, D. (2006),“Wireless Solutions for Telemetry in Civil Equipment and Infrastructure Monitoring”,3rd Romanian-Hungarian Joint Symposiumon Applied Computational Intelligence (SACI) May 25-26, 2006. [3] Potamitis, I., Georgila, K., Fakotakis, N., &Kokkinakis, G. (2003),“An integrated system for smarthome control of appliances based on remote speech interaction”,EUROSPEECH 2003, 8th European Conferenceon Speech Communication and Technology, Geneva, Switzerland, Sept. 1-4, 2003,pp. 2197-2200. [4] Zungeru, A..M., Kolo, J.G.,&Olumide, I.(2012), “A Simple and Reliable Touch sensitive security System”, International Journal of Network Security & Its Applications (IJNSA), 4(5), pp. 149–165. [5] Max, L., Thiringer, T.,Undeland, T., &Karlsson, R., (2009). Power electronics design laboratory exercise for final-year M.Sc. Students. IEEE Transaction on Education, 52(4), pp. 524-531. [6] Lionel Warnes. Electronic and Electrical Engineering. Principles and practice Macmillan Press Ltd. London 1994 pp 145 – 220. [7] Robert L. Boylestad and Louis NashelskyElectronic devices and circuit theoryEighteditions. Prentice Hall (Pearson Education Inc.) 2002 pp 875 [8] Theraja, B. L.,& Theraja, B.K (2002),“A textbook of Electrical Technology”, S. Chand and Company Ltd. New Delhi, India 2002, pp. 220, 920, 924, 1712 – 1716. [9] Bernard, G., &Mitton, S. K.(1985), “Application of electronics”, Syed Sons Printer. Lahore, pp. 162167, 171, 174. [10] Thomas, E. N. (1995), “Electricity and Electronics”, Glencoe McGraw Hill, pp. 280 – 281, 414. [11]Weber, &Thad-L. (1985),“Alarm Systems and Theft Protection”, 2ndedition,Stoncham, MA:Uutterworth,pp. 7-8. [1] Authors Engr. Dr. Adamu Murtala Zungeru received his BEng degree in electrical and computer engineering from the Federal University of Technology (FUT) Minna, Nigeria in 2004, MSc in electronic and telecommunication engineering from the Ahmadu Bello University (ABU) Zaria, Nigeria in 2009 and his PhD in Engineering from the University of Nottingham. He is currently a lecturer two (LII) at the FUT Minna, Nigeria, a position which he started in 2009. He is a registered engineer with the Council for the Regulation of Engineering in Nigeria (COREN), a professional member of the Institute of Electrical and Electronics Engineers (IEEE), and a professional member of the Association for Computing Machinery (ACM). His research interests are in the fields of swarm intelligence, routing algorithms, wireless sensor networks, energy harvesting, automation, home and industrial security system. Haruna Isah obtained a Bachelor of Engineering (B. Eng.) Degree, from the department of Electrical and Electronics Engineering, University of Maiduguri in 2008; Masters of Science (MSc.), Software Engineering in 2012 from the School of Computing Informatics and Media (SCIM) University of Bradford, United Kingdom. Haruna Isah is also a Professional Member of the Association for Computing Machinery (ACM), IEEE and the Computer Society of IEEE. He is currently an Assistant Lecturer with the Electrical and Electronics Engineering Department of the Federal University of Technology Minna, Nigeria. His research interest includes Embedded Systems, Machine Learning, Data mining, Artificial Intelligence, Software Reuse, Web Technologies, and the Social Web. Ahmad Abubakar Sadiq received the BEng degree in electrical and computer engineering from Federal university of Technology, Minna in 2008 and MEng in Electric power and machine in 2013 from same university. He is currently an assistant lecturer in the department of electrical and electronic engineering, Federal university of Technology, Minna. His research interest is in power system planning and operations with specifics in Transfer capability assessment. 100