Sophistications in theft and other criminal damages necessitates for the symbiotic blending of technology with security needs. In this research, electronic switches in the form of sensors were used to implement a point-to point intrusive monitoring system for the detection of an unauthorized access to commercial and residential buildings. The system is a simple and reliable security system and uses switch sensor technology to revolutionize the standards of living. The system is also simple, adaptable and cost-effective. It is designed in six major units which include; the power supply, the input/sensor micro-switches, the monitoring and indicator, the timing, the tone generation and output units. To ensure steady power supply in the circuit, the power unit constitutes both the mains and DC supplies. The alarm unit are being activated by the normally closed sensor micro-switches unit which is connected in an electronic/door mat at both the entrance and exit of buildings. In order to facilitate easy location of the intruder, the exact point of intrusion is being determined by the monitoring and indicator unit which constitutes the quad R/S flip-flop IC and LED’s. The timing/tone generation unit is built on the 555 timer IC, in the Astable mode, which output keeps changing as far as there is a breakage of the sensors. The output of the system is mainly the LEDs and buzzer, which gives electrical light and audio signal to notify the owner of an intruder in the building. Major design issues considered include; efficiency, portability, cost-effectiveness, durability, compatibility as well as the availability of required materials. This system works on the principle of the micro-switch sensor and dependent on the condition that an intruder entered through the door and stepped in any one of the switches under the mat. Verification and validation of the system indicate compliances to design specification hence the output requirements were met.
The objective of this project is to design and develop a wireless communication link to monitor our organizations that require high security like Banks , Offices etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The objective of this project is to design and develop a wireless communication link to monitor our organizations that require high security like Banks , Offices etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Developed a home security system to protect occupants from fire and intrusion. The device sends SMS to the emergency number provided to it via GSM (Global System for Mobile communications) module. Led my group and implemented the device successfully.
Thesis - Voice Control Home AutomationAbhishek Neb
Voice is used in this project for the controlling switches. Reason for choosing voice is because it is easily being reproduced by human. Besides that, usage of voice gives a control system that can be effective and convenient to be used. The application of this system involve modifying the switching system from the traditional way which is physical contact with the switch to a safer way where the usage of voice to replace all the physical contact. This project involve a simple switching system that used the transistor along with relay to do all the connecting of the power to the devices, a voice recognition system that consists of voice recognition chip AT89C51, and the AT89C51 microcontroller to build up the system. The ULN2003 serves as the ear that will listen and interpret the command by the given while the AT89C51 serve as the brain of the system that will coordinate the correct output with the input command given. This project able to recognition the command trained by the user and successfully to execute the correct output. This project is a small scale design which consists of 8 commands that will used to control three different switches. The command is able to individually switch on and switch off each of the switch. Besides that, the command also able to switch on all and off all the switch at the same time.
The smart home automated control system is an integrated system to facilitate elderly and disabled people with an easy-to-use home automation system that can be fully operated based on android application. The system is portable and constructed in a way that is easy to install, configure, run, and maintain. A typical wireless smart home automation system allows one to control house hold appliances centralize control unit which is wireless.
The Home Automation & Security system is a basic model created using Arduino, Raspberry Pi and Relays to Automate the house. It is very basic in nature and is completed as a part of my internship project
Arduino Based Home Lighting Control by Android Phoneijtsrd
Energy Conservation is the effort made to reduce the consumption of energy by using energy more efficiently. Energy can be conserved by reducing wastage and losses, improving efficiency through technological upgrades. In this thesis, Bluetooth based home lighting control system using Arduino UNO is presented as the good example for energy conservation by applying updated technologies. Bluetooth Module, relays, bulbs, android phone, ardudroid application and power supply are used to complete this system. Not only lighting but also any home appliance can be controlled through the customized smartphone application thanks to the advantages of Bluetooth Wireless Technology. Remote controlled Bluetooth based home lighting control system provides a most modern solution with smartphones. The design is based on mainly a stand alone Arduino BT Board to which home appliances are connected via relays. Password protection is added to protect unauthorized access making a perfect system. Dr. Thida Aung "Arduino Based Home Lighting Control by Android Phone" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26779.pdf Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/26779/arduino-based-home-lighting-control-by-android-phone/dr-thida-aung
Developed a home security system to protect occupants from fire and intrusion. The device sends SMS to the emergency number provided to it via GSM (Global System for Mobile communications) module. Led my group and implemented the device successfully.
Thesis - Voice Control Home AutomationAbhishek Neb
Voice is used in this project for the controlling switches. Reason for choosing voice is because it is easily being reproduced by human. Besides that, usage of voice gives a control system that can be effective and convenient to be used. The application of this system involve modifying the switching system from the traditional way which is physical contact with the switch to a safer way where the usage of voice to replace all the physical contact. This project involve a simple switching system that used the transistor along with relay to do all the connecting of the power to the devices, a voice recognition system that consists of voice recognition chip AT89C51, and the AT89C51 microcontroller to build up the system. The ULN2003 serves as the ear that will listen and interpret the command by the given while the AT89C51 serve as the brain of the system that will coordinate the correct output with the input command given. This project able to recognition the command trained by the user and successfully to execute the correct output. This project is a small scale design which consists of 8 commands that will used to control three different switches. The command is able to individually switch on and switch off each of the switch. Besides that, the command also able to switch on all and off all the switch at the same time.
The smart home automated control system is an integrated system to facilitate elderly and disabled people with an easy-to-use home automation system that can be fully operated based on android application. The system is portable and constructed in a way that is easy to install, configure, run, and maintain. A typical wireless smart home automation system allows one to control house hold appliances centralize control unit which is wireless.
The Home Automation & Security system is a basic model created using Arduino, Raspberry Pi and Relays to Automate the house. It is very basic in nature and is completed as a part of my internship project
Arduino Based Home Lighting Control by Android Phoneijtsrd
Energy Conservation is the effort made to reduce the consumption of energy by using energy more efficiently. Energy can be conserved by reducing wastage and losses, improving efficiency through technological upgrades. In this thesis, Bluetooth based home lighting control system using Arduino UNO is presented as the good example for energy conservation by applying updated technologies. Bluetooth Module, relays, bulbs, android phone, ardudroid application and power supply are used to complete this system. Not only lighting but also any home appliance can be controlled through the customized smartphone application thanks to the advantages of Bluetooth Wireless Technology. Remote controlled Bluetooth based home lighting control system provides a most modern solution with smartphones. The design is based on mainly a stand alone Arduino BT Board to which home appliances are connected via relays. Password protection is added to protect unauthorized access making a perfect system. Dr. Thida Aung "Arduino Based Home Lighting Control by Android Phone" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26779.pdf Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/26779/arduino-based-home-lighting-control-by-android-phone/dr-thida-aung
Bu hikaye kitabı engelli bir insanın yaşadıkları ya da yaşayamadıklarından çok, diğer insanların ona karşı bakış açısını anlatıyor aslında. Ne yazık ki ülkemizde görmezden gelinen 8,5 milyon engelli var. Onları görünür kılmak, sorunlarını azaltmak, arada sırada yapılan para yardımları ya da onlara acımayla değil, yeni gelen nesillere onların varlığını ve onlarla birlikte yaşamanın gerçeğini bilinçlendirmektir.
Özürlüler Vakfı Çocuk Yayınları
Ministriju iesniegtie jauno politikas iniciatīvu pasākumi 2014., 2015. un 201...Finanšu ministrija
Otrdien, 30. jūlijā, Ministru kabinetā (MK) tika izskatīts informatīvais ziņojums par ministriju iesniegtajiem jauno politikas iniciatīvu (JPI) pasākumiem 2014., 2015. un 2016. gadam. Lai nodrošinātu 2014. gada valsts budžeta sagatavošanu, ministrijas sagatavoja un iesniedza Finanšu ministrijā (FM) un Pārresoru koordinācijas centrā JPI pieprasījumus, kurām tika vērtēta atbilstība attīstības plānošanas dokumentiem. FM tika iesniegtas arī pārējās JPI – pieteikumi administratīvās kapacitātes stiprināšanas pasākumiem.
We are renowned manufacturers, wholesalers and suppliers of a comprehensive range of CFL Lights and Energy Saving lamps. We provide timely delivery of our products and also customize our offerings, if required.
Kohēzijas politikas ES fondu un ārvalstu finanšu palīdzības investīciju progr...Finanšu ministrija
Otrdien, 16. septembrī, Ministru kabinetā (MK) tika izskatīts Finanšu ministrijas (FM) sagatavotais informatīvais ziņojums par Eiropas Savienības (ES) struktūrfondu un Kohēzijas fonda, Eiropas Ekonomikas zonas (EEZ) finanšu instrumenta, Norvēģijas finanšu instrumenta un Latvijas un Šveices sadarbības programmas apguvi līdz 2014. gada 30. jūnijam. Šādu ziņojumu FM iesniedz MK reizi ceturksnī.
A Simple and Reliable Touch Sensitive Security SystemIJNSA Journal
This research focuses on detection of unauthorized access to residential and commercial buildings when the residents are far away from the access gate of the house. The system is a simple and reliable touch activated security system and uses sensor technology to revolutionize the standards of living. The system provides a best solution to most of the problems faced by house owners in their daily life. Due to its simple electronic components nature, it is more adaptable and cost-effective. The system is divided into three units; the power supply unit which employs the use of both DC battery and mains supply to ensure constant power supply to the circuit, the trigger unit which is responsible for activating the alarm unit and designed to have much time and period and moderate sensitivity in order to reduce the rate of false alarm, and the alarm amplitude unit which main function is to produce amplitude alarm sound when triggered by the trigger unit with the aim of producing a large audible sound that can alert the entire neighborhood or scare an intruder away. The design of the system was achieved by
considering some factors such as economy, availability of components and research materials, efficiency, compatibility and portability and also durability in the design process. The performance of the system after test met design
specifications. This system works on the principle of touch sensor.The general operation of the system and performance is dependent on the presence of an intruder entering through the door and touching any part of the door. The overall system was constructed and tested and it work perfectly.
A Burglar alarm is a system designed to detect intrusion – unauthorized entry – into a building or other area. Security alarms are used in residential, commercial, industrial, and military properties for protection against burglary (theft) or property damage, as well as personal protection against intruders. Security alarms in residential areas show a correlation with decreased theft. Car alarms likewise help protect vehicles and their contents. Prisons also use security systems for the control of inmates.
Some alarm systems serve a single purpose of burglary protection; combination systems provide both fire and intrusion protection. Intrusion alarm systems may also be combined with closed-circuit television surveillance (CCTV) systems to automatically record the activities of intruders and may interface to access control systems for electrically locked doors. Systems range from small, self-contained noisemakers, to complicated, multiarea systems with computer monitoring and control. It may even include a two-way voice which allows communication between the panel and Monitoring station.
Control and indicating equipment communicating via the peripheral component i...journalBEEI
Nowadays, the Intruder Alarm system is commonly used to protect the life, health and the possession of people in big companies. However, these systems have limited options for managing and remote control. This lack is very often criticized by big companies which want to use the Intruder Alarm System with other applications like Access and Attendance control. The aim of this article is to design a Control and Indicating Equipment which can be implemented into commercially made Personal Computer as expansion card. The designed card provides the main function of the Intruder Alarm system which can be further extended by other applications. The system consists of external communication like Universal Serial Bus, Ethernet and General Packet Radio Service interface. Each individual part of the system is driven by a single microcontroller ATmega328P which can handle communication and evaluation of the current state obtained by devices connected to it. The design can offer all alarm and non-alarm visualization of smart control like irrigation, lights control, audio system, etc. The whole design is driven by the proper standardization and the design consists of every schematic which comes with the explanation
Effective Human Detection & Tracking Security Using Machine Visionmarshallbutler
The Newton Security Inc. product line delivers scalable levels of tailgating and piggybacking protection, ranging from basic single-person entry detection and alarm, to the highest precision of detection and entry prevention.
Electronic eye for security system @1000KV Technologies 90308448771000kv technologies
electronics engineering live projects abstracts
electronics projects, electronics projects for engineering final year students, electronics and communication engineering projects for final year students,100kv,1000kv,1000kv technologies,1000kv projects,technologies,live projects,Hyderabad live projects,live projects in, diploma low cost projects,1000kv projects, , academic projects,btech live projects,Hyderabad,1000kilovolts,1000kilovolts technologies ,btech main projects ,
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES ijesajournal
A design of simple hardware circuit with different kind of fire sensors enables every user to use this
wireless fire security system. The challenges in designing the nodes with various types of fire sensors are
discussed and the methods to overcome design problems are also analyzed. The circuit is interfaced with
the different types of sensor to sense different fire sources such as gas leakage, smoke, and heat. The cost,
circuit components, design requirements, power requirements of sensor node are minimized. The methods
to improve the quality of system to detect fire are analyzed. The system is fully controlled by the PIC
microcontroller.
DESIGN CHALLENGES IN WIRELESS FIRE SECURITY SENSOR NODES ijesajournal
A design of simple hardware circuit with different kind of fire sensors enables every user to use this wireless fire security system. The challenges in designing the nodes with various types of fire sensors are
discussed and the methods to overcome design problems are also analyzed. The circuit is interfaced with
the different types of sensor to sense different fire sources such as gas leakage, smoke, and heat. The cost,
circuit components, design requirements, power requirements of sensor node are minimized. The methods
to improve the quality of system to detect fire are analyzed. The system is fully controlled by the PIC
microcontroller. All the sensors and detectors are interconnected to PIC microcontroller by using various
types of interface circuits. The PIC microcontroller will continuously monitor all the sensors and if it senses
any security problem then the microcontroller will send the information to the PC central monitoring station wirelessly for a short distance of 300m indoor/1500m outdoor using zigbee technology. The gas
sensor, light sensor, smoke detector sensor, IR sensor, temperature & humidity sensor, fire sensor are interfaced with microcontroller to detect abnormal fire conditions in the environment in all possible ways.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
When stars align: studies in data quality, knowledge graphs, and machine lear...
An electronic switch sensor with a point to-point intrusive monitoring system
1. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013
AN ELECTRONIC SWITCH SENSOR WITH A POINTTO-POINT INTRUSIVE MONITORING SYSTEM
Adamu Murtala Zungeru, Haruna Isah, Paul Obafemi Abraham-Attah and Ahmad
Abubakar Sadiq
Department of Electrical and Electronics Engineering, Federal University of Technology,
Nigeria
ABSTRACT
Sophistications in theft and other criminal damages necessitates for the symbiotic blending of technology
with security needs. In this research, electronic switches in the form of sensors were used to implement a
point-to point intrusive monitoring system for the detection of an unauthorized access to commercial and
residential buildings. The system is a simple and reliable security system and uses switch sensor technology
to revolutionize the standards of living. The system is also simple, adaptable and cost-effective. It is
designed in six major units which include; the power supply, the input/sensor micro-switches, the
monitoring and indicator, the timing, the tone generation and output units. To ensure steady power supply
in the circuit, the power unit constitutes both the mains and DC supplies. The alarm unit are being
activated by the normally closed sensor micro-switches unit which is connected in an electronic/door mat
at both the entrance and exit of buildings. In order to facilitate easy location of the intruder, the exact point
of intrusion is being determined by the monitoring and indicator unit which constitutes the quad R/S flipflop IC and LED’s. The timing/tone generation unit is built on the 555 timer IC, in the Astable mode, which
output keeps changing as far as there is a breakage of the sensors. The output of the system is mainly the
LEDs and buzzer, which gives electrical light and audio signal to notify the owner of an intruder in the
building. Major design issues considered include; efficiency, portability, cost-effectiveness, durability,
compatibility as well as the availability of required materials. This system works on the principle of the
micro-switch sensor and dependent on the condition that an intruder entered through the door and stepped
in any one of the switches under the mat. Verification and validation of the system indicate compliances to
design specification hence the output requirements were met.
KEYWORDS
Security system, Automation, Electronic Switch, Sensors, Room Light, Electronic Circuit Design.
1. INTRODUCTION
Theft and criminal damage is a threat and cost to home and business. Hence, the need to protect
our homes, offices and business environment. Improvement in technology by man has shown that
knowledge and experience can be harmonized and refined to assist man to observe, perceive,
communicate, remember, calculate, reason, and protect himself.
Electronics, electrical, mechanical and/or chemical materials can be designed to serve or function
as detectors of intruder to our homes. Among these, Electronic intruder detection systems were
found to be the best that can provide cost-effective protection and act as a deterrent to intruders
while alerting household, staff and/or police depending on the design. Electronic systems can
function in two states. They are either analog or digital [1-3].
DOI : 10.5121/ijitmc.2013.1410
89
2. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013
Analog and digital systems can be differentiated by their output representations; while the signal
output is behaving linearly with the input in analog systems, and can be represented by a pointer
on a scale, digital systems represent their output in discrete levels either as up or down, „1‟ or „0‟
and on or off and their output can display numeric or alphabetically [3-5]. The digital state of
electronics is preferred and widely in use today.
Even with insurance cover, the real cost of a break-in can be detrimental and should not be
ignored. Disruption may lead to lost of lives in homes, delays and inefficiencies in business
activities or even lost customers. The major components of an electronic intruder alarm system
include detection, control and signaling devices. Every part of this equipment will be developed
to fulfill a specific task within the system. These components are strategically placed in the
building to be protected, with an assurance of constant, reliable and disturbance-free functioning.
Alarm or intruder detectors come in many forms depending on the purpose it is meant for and has
been in existence for some time. The most common security sensors indicate the opening of a
door or window or detect motion via passive infrared (PIR). Some alarm systems are meant for
single mission, while others handle fire, intrusion, and safety alarms simultaneously.
Sophistication ranges from small, self-contained noisemakers, to complicated, multi-zoned
systems with color-coded computer monitor outputs. Many of these concepts also apply to
portable alarms for protecting cars, trucks or other vehicles and their contents.
Two options are much prevalent in the choice of an alarm system. These include, (1) An audible
alarm sounds at the premises or home it is protecting only. This requires someone to immediately
contact and report the incident to the police too. (2) A Monitored alarm sounds at the premises
then a signal is sent to an alarm receiving center through a phone line or mobile network [4-7].
The alarm receiving center (ARC) is usually law enforcement agencies e.g. police.
There are also the choices of either hard wired or wire free systems. Comparison between the two
indicates that the Hardwired is more reliable and cheaper but takes longer to install. Most
commercial alarms are wired. Wire free is easy to install but are more expensive than a wired
system and are mostly used in homes or small business premises.
Alarm intrusion detectors can also be classified as Point detectors and Area detectors. While point
detectors indicate an intrusion at a specific point, area detectors indicate an intruder's presence
within the protected area. Point detector types include mechanical or magnetic contacts on doors
and windows, photocell or microwave beams across pathways, pressure-sensitive mats, fiberoptic bend or stress sensors, proximity switches that detect humans and vibration sensors among
others. Area detectors use such technologies like the infrared (heat) detectors ultrasonic
transducers, and microwave transducers, sometimes in combination within one sensor. In general,
area detectors detect a sudden change in an environment being protected and trigger at some
predetermined threshold. Often because of improper aiming or other adjustments, they are much
more prone to false alarms than Point detectors. But interested readers can see [8-11] for theory of
other components and methods adopted for this work.
2. SYSTEM DESIGN METHODOLOGY, ANALYSIS, AND CALCULATIONS
This section will discuss the design procedure and the analysis of the components used for this
work and generally deals with the design of the individual stages of the electronic security alarm
System, which consist of the following units:
I.
II.
III.
The power supply unit
Input/sensor micro-switches
Monitoring and indicator unit
90
3. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013
IV.
V.
VI.
Timing unit
Tone generator unit
Output unit
2.1. Design Methodology
The design of this work and principle of operation was demonstrated using the prototype of a
building. In the design, four (4) entrances were selected to be monitored and protected by the
alarm. An integrated circuit (I.C) that has four (4) set and reset pins was employed for the
purpose of demonstrating the principle of operation of the intruder alarm system. Micro
switches were used as detectors. The Micro-switches detectors were connected in electronic
mats placed at the doorsteps of each of the four entrances to be protected and finally connected to
the system. The monitoring and indicator unit serves as an output of the system. Each LED is
labeled to correspond to a switching point and indicates which switch is tripped ON. These
micro switches and infrared sensors can either be connected to door entrances or windows.
Below (Fig. 1), is the complete block diagram of the system.
Fig. 1:Schematic block diagram of electronic alarm system
The electronic circuit was powered by a 12 volt direct current from a full wave rectified voltage.
To ensure stability of power supply of the equipment, a 12volt battery backup was designed into
it and connected in parallel to serve as an alternative power source. With this a 24 hour
protection is guaranteed.
Micro switches connected to the four (4) doormats and/or windows are in a normally open
condition. When they are stepped on, it closes sending a signal to the circuit thus triggering the
alarm. Each micro switch is connected to the memory module and the LED indicators
connected to the memory unit.When an intruder steps on the mat thus opening the micro
switch, pulses are generated. These pulses generated are responsible for the activation of the
tone generator connected in an astable mode on a timing unit. The tone generator and timing
unit were both built on an integrated circuit called 555 timer but the timing unit was connected
in a monostable mode.
91
4. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013
2.2. The Power Supply Unit
In this sub-section, we describe and explain the design of the power supply unit. For the circuit
we would require a 7812-voltage regulator as shown in the Fig. 2 below, which gives the required
output of +12V. The voltage regulator regulates input voltages above its required output voltage.
If the input voltage is below its required output voltage, it would be passed out without being
regulated. To achieve this, the following steps were undergone.
•
•
•
•
•
Stepping down the A C supply with a transformer
Full wave rectification
Removal of ripple from the rectified waveform
Voltage regulation to desired value
Power display LED
The power unit involves the transformer-bridge rectifier circuit. A 24V transformer is used to
provide power to 7812 regulators, which produce, regulated 12V.
1 7812 3
V+
2
C1
C2
R
Fig. 2: The power supply unit
The common bridge rectifier, comprising four rectifying diodes, is used for converting the 24V
AC power supply into corresponding roughly 24V DC voltage. The involved ripple at the output
of the bridge rectifier is filtered through a 2200F, 35V capacitor. The voltage rating of the
capacitor is about twice the expected output voltage of the rectifier, to protect the device from the
effect of the high voltage supply.A power switch was used to open and close the complete circuit
when required. The 7812-voltage regulator is connected in parallel across the rectified voltage
output. The devices are aimed for the stability of the complete circuit. The 12V power supply
from the 7812 is connected to the main circuit.
2.2.1. Analysis of the Power Supply Unit
If the input to the 7812 is greater than the required output by saying, a factor of 4, the voltage
regulator IC will start getting hot and will then eventually be damaged. As such an input of
approximately 16V (i.e 12+4) is required. Recall that diode drops 0.6V and there are 4 rectifying
diodes constituting a full wave bridge, we will then have a voltage drop of 0.6 x 4 = 2.4V
92
5. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013
Considering a peak voltage of 16+2.4=18.4V peak.
Also considering an r.m.s voltage =
18.4 18.4
=
= 13.143V
2 1 .4
Therefore a transformer of a preferred value of 15V was employed. i.e. 220V/15V transformer.
Assuming a ripple voltage of 15%
dv =
and
C1 =
15
×18.4V = 2.76
100
dt =
1
1
=
= 0.01
100
2f
1 0.01
= 3.623 × 10-3F
2.76
C1 = 3300µF
A preferred value of 3300µF was however employed.
A compensating capacitor C2 was used To reduce the ripple left in the system and a 4065µF was
employed.
2.2.2. Power Indicator
A power indicator circuit comprising of a resistor and Light Emitting Diode (LED) shows the
presence of power in the circuit.
RL
5V
2.7V
Fig. 3: The Power Indicator Circuit
93
6. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013
A voltage of around 2.7V is expected across the diode with a current of roughly 2mA.
A resistor of 1k is used instead for more practical importance and availability. It was also
chosen to limit the power of the light emitting diode, LED. The power dissipated by the resistor is
given by P = V2/R. - I22/I000-0.I44W
2.3. Micro-Switches Input/Sensor Unit
The Intrusion sensor detectors used in this project are micro-switches in normally close-mode.
The switches are connected in an electronic mat which could be used as a door mat at the
entrance and exit to buildings or the switches could also be fixed to the windows in a normally
close-mode. Any pressure of the heel or sole of a shoe as it steps on the mat or an attempt at
opening the window causes the switches to open hence, triggering the alarm system.
2.4. Monitoring and Indicator Unit
The monitoring and indicator unit is used in determining the exact point of intrusion hence,
facilitating easy location of the intruder. The Unit is built on a 4044 (Quad R/S Flip-flop) IC. This
package contains 4 independent Set/Reset flip-flops sharing a common output Tristate enable
control. On any one flip-flop Set and Reset should normally be a high. If Set (S) is made low,
as when the input switch is triggered, the Q output goes and stays high. If Reset (R) is made low;
the Q output goes and stays low, hence clearing the memory. If both S and R go low, the output
goes low. This is a normally disallowed state and the last input to go high determines the final
state of the flip-flop.
The outputs Qs are seen via LEDs. Each LED is connected to a separate output pin, while the
Set pins are triggered via the input switches separately so that the point of intrusion that is, the
switch triggered can be determined by the LED indicator that comes on. The circuit diagram
below (Fig. 4), shows the connection of the monitoring and indicator unit.
12V
L ED 1
R1
R2
R3
R4
R5
10kohm
10kohm
10kohm
10kohm
10kohm
U1
13
3
~S 0
4
~S 1
6
L ED 2
9
O1
~R 1
11
~S 2
12
10
O2
~R 2
15
~S 3
14
L ED 4
1
O3
~R 3
5
EO
Sw2
Sw3
Sw1
O0
~R 0
7
Sw4
4044BP
L ED 3
R6
33ohm
Sw5
Fig. 4: circuit diagram of the monitoring and indicator unit
94
7. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013
Sw1, 2, 3, and 4 serve as input switches with 10K pull-up resistors each, while Sw5 is the reset
switch with all reset pins looped together. The LEDs act as output (indicators) when any
corresponding switch is triggered.
2.5. The Tone Generator Unit
An Astable mode 555 timer IC is the “backbone” of the Tone Generator Unit; therefore it has
no stable state as in the case of the monostable state, therefore the output is continually
changing between 'low' and 'high‟.
VC C
12V
R4
8
8.2kohm
R2
8
68kohm
IC 1
3
7
6
R1
2
D IS
R5
O UT
8.2kohm
6
R3
2
TH R
B U Z Z ER
TH R
100uF
20Hz
5
C ON
G ND
5
C ON
1
G ND
LM555CN
C2
1
C1
1uF
D IS
O UT
TR I
1kohm
TR I
68kohm
3
7
R ST
C4
R ST
V CC
4
IC 2
V CC
4
C3
LM555CN
0.1uF
47uF
Fig. 5: circuit diagram of the tone generation unit
2.5.1. Astable Operation
The capacitor C 2 is charged by the current flowing through R1 and R2, with the output high
(+Vs).). The output becomes low and the discharge pin (pin7) is connected to 0V when the
capacitor voltage reaches 2/3 VS (threshold voltage). The threshold and trigger inputs monitor
the capacitor voltage.
With current flowing through R2 in the discharge pin, the capacitor now begins to discharge.
The output becomes high again when the voltage falls to 1/3Vs (trigger voltage) and the
discharge pin is then disconnected, allowing the capacitor to start charging again. The cycle
keeps repeating continuously unless the reset input is connected to 0V which forces the output
low while, a reset is 0V.
Calculation
(1)
And
(2)
Where, T = time period in seconds (s) = TON + TOFF
With R 1 =R 2 =68K, and C 2 = luF,
95
8. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013
With R3 = 8.2KΩ and C3 = 47uF
Therefore,
⁄
The tone generator unit is controlled by the timing unit via a transistor (BC 108), which acts
as a switch to trigger the generator unit ON. Hence, once the timing period is elapsed the
generated tone also ceases.
2.5.2. Monostable Operation
When the trigger input (555 pin 2) is less than 1/3 Vs the timing period is started. Therefore
making the output high (+Vs) and the capacitor C1 begins to charge through resistor R1. Further
trigger pulses are ignored once the time period has started.
When the voltage across C1 reaches 1/3 Vs, the time period is over and the output becomes low.
The threshold input (555 pin 6) monitors the voltage across C1. At the same instant, discharge
(555 pin 7) is connected to 0V, discharging the capacitor and ready for the next trigger.
2.6. Output Unit
The output of this system are LEDs and a buzzer. The output of the LEDs has been discussed
earlier. Any light of the LEDs that shows tells us which of the entrance is being burgled.
The other output used to sound was a buzzer. The one used has the following specifications from
data sheets:
Frequency = 15 Hz
Impedance = 300
Voltage rating = 12V
96
9. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013
VCC
12V
R7
10kohm
R4
8
8.2kohm
8
R8
IC1
R2
100kohm VCC
4
8
68kohm
4
RST
6
2
OU T
DIS
2
R6
CON
GN D
R5
3
DIS
8.2kohm
OU T
R3
6
2
LM555CN
10uF
1uF
C6
20Hz
1
LM555CN
0.1uF
100uF
LM555CN
1
C1
THR
CON
GN D
5
C2
BC109
BUZZER
5
CON
GN D
1
DIS
OU T
TRI
1kohm
THR
C4
3
7
TRI
68kohm
4.7kohm
5
C5
6
R1
TRI
VCC
7
THR
IC3
VCC
RST
RST
3
7
4
IC2
C3
47uF
10nF
J1
Key = Space
TIMING UNIT
TONE GENERATION UNIT
Fig. 6:Combination of the timing and tone generation unit
2.7. Principle of Operation
This system has four micro switches detectors that sense an intruder independently. The micro
switches are either laid under the carpets, foot mats or window hinges. When an intruder steps on
any of the switches in any of the four/all entrances or attempt to open the window, the switch
closes and sends a signal through the circuitry that triggers the flip-flop.
Fig. 7: Complete circuit diagram of the electronic switch sensor with a point-to-point intrusive monitoring
system
97
10. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013
3. SYSTEM CONSTRUCTION, TESTING AND DISCUSSIONS
3.1. Testing
It is one thing to develop and construct a system, but the beauty of it is for the construction to
pass all tests and work to specification. The project was physically and functionally realized.
After the paper design and analysis, the different stages of the circuit were constructed and tested
to ensure error free system and was finally coupled together to meet the desired specifications.
The process of testing and troubleshooting required the use of some of the equipment as:
Digital Multimeter: The digital Multimeter basically measures voltages, resistance, continuity,
current, frequency, temperature and transistor. Measurement of parameters like, voltages,
continuity, resistance values of the components and in some cases frequency measurement are
required in the implementation of the design on the board. The digital Multimeter was used to
check the various voltage drops at all stages in the project. It is almost the most useful tools for
troubleshooting during construction and coupling.
Electronic Workbench: The design and simulation of this project were carried out first using a
Computer Aided Software known as Electronic Workbench, with each block designed and
tested, where upon getting the required output results, the test was carried out on a breadboard.
The specified components were obtained and test was carried out stage by stage and it was
found to be functional on the breadboard within the design specifications.
The entire components were then transferred onto a Vero board. Before soldering the
components on the Vero board, the strip lines of the Vero board were cleaned with a
methylated spirit in order to remove any form of conductor or dirt on it.
Integrated Circuit bases were soldered on the Vero board instead of the ICs themselves
directly to avoid over-heating them during soldering and for easy replacement when necessary.
Great care was taken in handling CMOS ICs because any form of static discharge or heat
during soldering could easily damage them.
Holes were then bore through the prototype base at the four entrances where the micro switches were installed to protrude just for slight contact. The LEDs that serve as indicators
were mounted at the center of the building where it will be conspicuous to all households.
3.2
Result Analysis
After simulation using computer software (Multisim Electronic Workbench) to test the
operation of the project, the result below was obtained from the timing circuit. The below
graph (Fig. 8), shows the simulated result gotten from the operation of the timing and tone
generation unit, hence the result conformed to the stipulated output result. The test was then
carried out with the specified components on the breadboard, and found to have worked
satisfactorily according to the specifications of the design.
98
11. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013
Fig. 8: Waveform generated
4. CONCLUSION
The aim and objective of the electronic security alarm system design were achieved,
constructed and tested to work according to specifications.It is a known fact that even the
highest fences, coupled with efficient security guards and dogs cannot make a home
impenetrable. The use of this Electronics security alarm system whose operation is not based
on sentiments is our best option today. At this time of insecure society this design work is the
best for all homes and offices that needs to know when there is an intruder to unauthorized
places.The micro switches used for this project as detectors are very sensitive and
inconspicuous. Even when an intruder detects it and tries to disconnect it, the alarm will still
be triggered because they were genuinely sensitive. Availability of components and their costeffectiveness will go a long way in making this system stand the test of time. This system works
on the principle of the micro-switch sensor and dependent on the condition that an intruder
entered through the door and stepped in any one of the switches under the mat. All constructs
were deliberate and carefully carried out with effective troubleshooting and maintenance criteria.
The design of this security system involves; research in both analog and digital electronics.
Research was done on timers and logic control circuits,as well as with relays and Opto-devices
(e.g. Photodiodes, photo cells etc.). The implemented system was a typical prototype of the
model.
There are areas that need improvements on this design such as if the purpose is not to scare
away intruders but to catch them, then the alarm portion should be removed and be replaced
with a special signal. This signal can be hidden bulbs or the signal can be wired to the security
service unit. A hidden digital camera can also be incorporated into the system to take pictures
of intruders without their knowledge at the point of intrusion.
ACKNOWLEDGEMENTS
The authors would like to thank Col. Muhammed Sani Bello (RTD), OON, Vice Chairman of
MTN Nigeria Communications Limited for supporting the research.
99
12. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1,No.4, November 2013
REFERENCES
Alkar, A. Z., &Buhur, U. (2005),“An Internet Based Wireless Home Automation System for
Multifunctional Devices”,IEEE Consumer Electronics, 51(4), pp. 1169-1174.
[2] Ciubotaru-Petrescu, B., Chiciudean, D., Cioarga, R., &Stanescu, D. (2006),“Wireless Solutions for
Telemetry in Civil Equipment and Infrastructure Monitoring”,3rd Romanian-Hungarian Joint
Symposiumon Applied Computational Intelligence (SACI) May 25-26, 2006.
[3] Potamitis, I., Georgila, K., Fakotakis, N., &Kokkinakis, G. (2003),“An integrated system for smarthome control of appliances based on remote speech interaction”,EUROSPEECH 2003, 8th European
Conferenceon Speech Communication and Technology, Geneva, Switzerland, Sept. 1-4, 2003,pp.
2197-2200.
[4] Zungeru, A..M., Kolo, J.G.,&Olumide, I.(2012), “A Simple and Reliable Touch sensitive security
System”, International Journal of Network Security & Its Applications (IJNSA), 4(5), pp. 149–165.
[5] Max, L., Thiringer, T.,Undeland, T., &Karlsson, R., (2009). Power electronics design laboratory
exercise for final-year M.Sc. Students. IEEE Transaction on Education, 52(4), pp. 524-531.
[6] Lionel Warnes. Electronic and Electrical Engineering. Principles and practice Macmillan Press Ltd.
London 1994 pp 145 – 220.
[7] Robert L. Boylestad and Louis NashelskyElectronic devices and circuit theoryEighteditions. Prentice
Hall (Pearson Education Inc.) 2002 pp 875
[8] Theraja, B. L.,& Theraja, B.K (2002),“A textbook of Electrical Technology”, S. Chand and Company
Ltd. New Delhi, India 2002, pp. 220, 920, 924, 1712 – 1716.
[9] Bernard, G., &Mitton, S. K.(1985), “Application of electronics”, Syed Sons Printer. Lahore, pp. 162167, 171, 174.
[10] Thomas, E. N. (1995), “Electricity and Electronics”, Glencoe McGraw Hill, pp. 280 – 281, 414.
[11]Weber, &Thad-L. (1985),“Alarm Systems and Theft Protection”, 2ndedition,Stoncham,
MA:Uutterworth,pp. 7-8.
[1]
Authors
Engr. Dr. Adamu Murtala Zungeru received his BEng degree in electrical and
computer engineering from the Federal University of Technology (FUT) Minna,
Nigeria in 2004, MSc in electronic and telecommunication engineering from the
Ahmadu Bello University (ABU) Zaria, Nigeria in 2009 and his PhD in Engineering
from the University of Nottingham. He is currently a lecturer two (LII) at the FUT
Minna, Nigeria, a position which he started in 2009. He is a registered engineer with
the Council for the Regulation of Engineering in Nigeria (COREN), a professional member of the
Institute of Electrical and Electronics Engineers (IEEE), and a professional member of the Association for
Computing Machinery (ACM). His research interests are in the fields of swarm intelligence, routing
algorithms, wireless sensor networks, energy harvesting, automation, home and industrial security
system.
Haruna Isah obtained a Bachelor of Engineering (B. Eng.) Degree, from the
department of Electrical and Electronics Engineering, University of Maiduguri in
2008; Masters of Science (MSc.), Software Engineering in 2012 from the School of
Computing Informatics and Media (SCIM) University of Bradford, United
Kingdom. Haruna Isah is also a Professional Member of the Association for
Computing Machinery (ACM), IEEE and the Computer Society of IEEE. He is
currently an Assistant Lecturer with the Electrical and Electronics Engineering
Department of the Federal University of Technology Minna, Nigeria. His research interest includes
Embedded Systems, Machine Learning, Data mining, Artificial Intelligence, Software Reuse, Web
Technologies, and the Social Web.
Ahmad Abubakar Sadiq received the BEng degree in electrical and computer
engineering from Federal university of Technology, Minna in 2008 and MEng in
Electric power and machine in 2013 from same university. He is currently an
assistant lecturer in the department of electrical and electronic engineering, Federal
university of Technology, Minna. His research interest is in power system planning
and operations with specifics in Transfer capability assessment.
100