A Microcontroller based Intrusion Detection System is designed and implemented. Rampant, Okintrusion to
restricted zones have highlighted the need for embedded systems that can effectively monitor, instantly alert
personnel of any breach in security and retrieve graphic evidence of any such activity in the secured area. At the
heart of the intrusion detection system is the PIC 168F77A Microcontroller that transmits pulses at 38 KHz. It is
suitably interfaced to a GSM modem that can send SMS on sight of infringement and a webcam that can take
snapshots. The report also presents the system software which has been developed in two parts: one in C++
Language using MPLAB KIT and the other written in AT COMMAND resident in the GSM modem. The
system is very cost-effective, uses easily available components and is adaptable to control systems.
This document describes a smart household touch sensitive locker security system based on GSM technology. The system includes a handcrafted touch sensitive box connected to a microcontroller. If an unauthorized user touches the box, an alarm system is activated and an SMS is sent to the property holder via a GSM module. The system aims to provide reliable security, easy installation and portability without needing internet connection once programmed. The design combines a microcontroller with a GSM module to monitor the security system and send alerts when the touch sensitive box is activated by unexpected contact.
The document provides an overview of embedded systems, including their definition, characteristics, and application areas. Some key points:
- Embedded systems are computing devices that perform specific tasks, unlike general purpose computers. They have limited resources and fixed functionality.
- Embedded systems are widely used in consumer electronics, industrial automation, medical devices, networking equipment, wireless technologies, testing/measurement, security, and finance. Nearly all processors are used in embedded systems.
- The typical architecture of an embedded system includes a central processing unit, memory, input/output devices, communication interfaces, and application-specific circuitry running embedded software. Smaller systems may not require an operating system.
This document provides an introduction and overview of an embedded systems project that uses a fingerprint module, GSM module, and keypad with an XMEGA 256A3BU microcontroller for high security applications. The main objectives of the project are to design an intelligent and programmable security system that only allows authorized persons to enter a room using three modes of access: fingerprint, keypad, or GSM-activated keypad. The document then provides background information on embedded systems, their applications in various sectors such as automotive, aerospace, telecommunications, consumer electronics, railroads, and electronic payment solutions.
This training report provides an introduction to embedded systems and microcontrollers. It discusses key concepts such as the definition of embedded systems and how they differ from general purpose computers. Microcontrollers are described as integrated circuits that combine a processor core with memory and peripherals. The 8051 microcontroller architecture is then explained in detail, covering its features, pinouts and programming. Examples of embedded applications are also provided. Overall, the document serves as an introductory guide to embedded systems and microcontrollers for educational purposes.
This document provides an introduction and overview of embedded systems. It discusses that embedded systems use microprocessors or microcontrollers to perform dedicated functions, unlike general purpose computers. The key aspects covered include:
- Embedded systems integrate hardware and software to perform specific tasks, with optimization for cost, size and performance.
- Examples of embedded systems include appliances, vehicles, network devices, medical equipment, and more.
- Embedded systems have constraints of limited resources, real-time performance, low power usage, and reliability.
- The document classifies embedded systems and discusses their components and features. Stand-alone, real-time, networked, and mobile embedded systems are described.
This document provides an introduction to an anti-theft control system project for automobiles. The system uses an embedded chip with an inductive proximity sensor that senses when a key is inserted and sends a text message to the owner. If an unknown person enters the vehicle, the doors will lock using a motor connection. The system aims to protect vehicles from increasing theft. It is developed as a low-cost solution using a microcontroller with GSM and GPS technology. The document then provides details on embedded systems, microcontrollers, and the AT89C51 microcontroller that will be used in this project.
Design and implement a smart system to detect intruders and firing using IoT IJECEIAES
The security system is essential for occupants' convenience and protection from intruders and fire. Theft and fire are the most important requirement for the security system. The advancement of wireless sensor networks using IoTs increased the features in a security system and play an important role in daily life. In this paper, the proposed system is divided into two units. The first one about security which use to take snapshots by a camera whenever there is fire or intruders in the security zone and mail it to the owner every three seconds by using Arduino configured with MATLAB program. MATLAB program plays the main role to coordinate between sensors and to turn on/off the cameras. The second unit is about controlling the appliances and also the main door by using AVR microcontroller configured by CVAVR software that connected with Bluetooth sensor and controlled by a smartphone by using the implementation software built-up in the smartphone. To arrival of the control unit, the user should send code from the software implementation to the framework that use to turn on/off the devices or open/close the door. This proposed system is designed and implemented in details in this paper.
The document provides definitions and descriptions related to information and communication technology (ICT). It defines ICT as the use of electronics, computers, and communication devices to process and transmit information. The brief evolution of computers is then described from first to fourth generations, noting the replacement of vacuum tubes with transistors and integrated circuits. The usage of ICT in everyday life such as education, banking, and e-commerce is listed. The document then discusses computer ethics and legal issues, defining terms like computer ethics, intellectual property, privacy, computer crime, and cyber law. It differentiates between ethics and law, and states the need for intellectual property laws. Finally, it lists ways to protect privacy and describes authentication and verification methods and technologies.
This document describes a smart household touch sensitive locker security system based on GSM technology. The system includes a handcrafted touch sensitive box connected to a microcontroller. If an unauthorized user touches the box, an alarm system is activated and an SMS is sent to the property holder via a GSM module. The system aims to provide reliable security, easy installation and portability without needing internet connection once programmed. The design combines a microcontroller with a GSM module to monitor the security system and send alerts when the touch sensitive box is activated by unexpected contact.
The document provides an overview of embedded systems, including their definition, characteristics, and application areas. Some key points:
- Embedded systems are computing devices that perform specific tasks, unlike general purpose computers. They have limited resources and fixed functionality.
- Embedded systems are widely used in consumer electronics, industrial automation, medical devices, networking equipment, wireless technologies, testing/measurement, security, and finance. Nearly all processors are used in embedded systems.
- The typical architecture of an embedded system includes a central processing unit, memory, input/output devices, communication interfaces, and application-specific circuitry running embedded software. Smaller systems may not require an operating system.
This document provides an introduction and overview of an embedded systems project that uses a fingerprint module, GSM module, and keypad with an XMEGA 256A3BU microcontroller for high security applications. The main objectives of the project are to design an intelligent and programmable security system that only allows authorized persons to enter a room using three modes of access: fingerprint, keypad, or GSM-activated keypad. The document then provides background information on embedded systems, their applications in various sectors such as automotive, aerospace, telecommunications, consumer electronics, railroads, and electronic payment solutions.
This training report provides an introduction to embedded systems and microcontrollers. It discusses key concepts such as the definition of embedded systems and how they differ from general purpose computers. Microcontrollers are described as integrated circuits that combine a processor core with memory and peripherals. The 8051 microcontroller architecture is then explained in detail, covering its features, pinouts and programming. Examples of embedded applications are also provided. Overall, the document serves as an introductory guide to embedded systems and microcontrollers for educational purposes.
This document provides an introduction and overview of embedded systems. It discusses that embedded systems use microprocessors or microcontrollers to perform dedicated functions, unlike general purpose computers. The key aspects covered include:
- Embedded systems integrate hardware and software to perform specific tasks, with optimization for cost, size and performance.
- Examples of embedded systems include appliances, vehicles, network devices, medical equipment, and more.
- Embedded systems have constraints of limited resources, real-time performance, low power usage, and reliability.
- The document classifies embedded systems and discusses their components and features. Stand-alone, real-time, networked, and mobile embedded systems are described.
This document provides an introduction to an anti-theft control system project for automobiles. The system uses an embedded chip with an inductive proximity sensor that senses when a key is inserted and sends a text message to the owner. If an unknown person enters the vehicle, the doors will lock using a motor connection. The system aims to protect vehicles from increasing theft. It is developed as a low-cost solution using a microcontroller with GSM and GPS technology. The document then provides details on embedded systems, microcontrollers, and the AT89C51 microcontroller that will be used in this project.
Design and implement a smart system to detect intruders and firing using IoT IJECEIAES
The security system is essential for occupants' convenience and protection from intruders and fire. Theft and fire are the most important requirement for the security system. The advancement of wireless sensor networks using IoTs increased the features in a security system and play an important role in daily life. In this paper, the proposed system is divided into two units. The first one about security which use to take snapshots by a camera whenever there is fire or intruders in the security zone and mail it to the owner every three seconds by using Arduino configured with MATLAB program. MATLAB program plays the main role to coordinate between sensors and to turn on/off the cameras. The second unit is about controlling the appliances and also the main door by using AVR microcontroller configured by CVAVR software that connected with Bluetooth sensor and controlled by a smartphone by using the implementation software built-up in the smartphone. To arrival of the control unit, the user should send code from the software implementation to the framework that use to turn on/off the devices or open/close the door. This proposed system is designed and implemented in details in this paper.
The document provides definitions and descriptions related to information and communication technology (ICT). It defines ICT as the use of electronics, computers, and communication devices to process and transmit information. The brief evolution of computers is then described from first to fourth generations, noting the replacement of vacuum tubes with transistors and integrated circuits. The usage of ICT in everyday life such as education, banking, and e-commerce is listed. The document then discusses computer ethics and legal issues, defining terms like computer ethics, intellectual property, privacy, computer crime, and cyber law. It differentiates between ethics and law, and states the need for intellectual property laws. Finally, it lists ways to protect privacy and describes authentication and verification methods and technologies.
The Internet-based security Soft-i-Robot is modeled using Soft computing paradigms for problem solving and decision-making in complex and ill-structured situations. Soft-i-Robot monitors the workspace with multimedia devices and sensor using an Internet application program. The model has sensory subsystems such as Intruder detection which, detects intruder, captures image and sends to server, and an Obstacle Avoidance Unit to detect the objects in the path of the mobile robot. These multiple features with hybrid Soft computing techniques depart the developed Soft-i-Robot from the existing developments, proving that the streaming technology-based approach greatly improves the sensibility of robot tele-operation. The relatively powerful online robots available today provoke the simple question, in terms of two competing goals: recognition accuracy and computing time. Improved recognition accuracy and reduced computing time for face recognition of the intruder is obtained using Morphological Shared Weight Neural Network. To obtain a collision-free optimized path, Soft-i-Robot uses derivative free Genetic Algorithm. With rapid expansion of Robotics and Soft computing paradigms, robotic technology touches upon self-understanding of humans, socio-economic, legal and ethical issues leading to improved performance rate and information processing capabilities.
This document provides an overview of embedded systems and trends in three paragraphs:
It defines an embedded system as any electronic device that incorporates a microprocessor to perform dedicated tasks. It discusses the history of embedded systems from early military and calculator applications to today where they are ubiquitous. It lists some common applications of embedded systems like ATMs, phones, vehicles, industrial equipment, and medical devices.
This document discusses M2M and IoT design methodologies. It begins with an overview of M2M architecture, including the key components of an M2M area network, M2M core network, M2M gateways, and M2M applications. It then contrasts M2M and IoT, noting differences in communication protocols, types of connected devices, emphasis on hardware vs software, how data is collected and analyzed, and applications. The document also introduces software-defined networking (SDN) and network function virtualization (NFV) as approaches to address limitations of conventional network architectures for IoT.
Development of wireless and intelligent home automation systemTELKOMNIKA JOURNAL
The Intelligent Home Automation System (IHAS) is usually a cell phone web-based application that enables end users in order to keep track of in addition to manage home/office appliance using their mobile system. The main objective of this system is developed to facilitate home users, especially domestic electrical appliances with simple controls. In addition, it can save the cost of electricity for lighting can be controlled to suit the user. Generally, most home appliances controlled from a distance using a remote control. Has created a system for controlling home lighting from a certain distance, which replaces the remote control using mobile smartphone. To make the smartphone to function as a remote control, an application was developed using Android technology. App Inventor software used for designing applications intended. Hardware microcontroller Arduino UNO R3 which is used to connect the smartphone to the electrical equipment. The system has been tested by developing a mini model and take into account the situation in the domestic home. The test is based on the level of control for wirelessly using Bluetooth and the distance between the lamp and the smartphone. The results of this test, the system can be used on equipment or other home appliances for the purpose of controlling or adjustment. In addition, the security system was also highlighted in a typical system, using the global system for mobile (GSM), it can be warned and notified to the consumer where there is a gas leak or the presence of a person in the vicinity of the residence.
Virtual Teratak: A 3D Home Control and Entertainment SystemWaqas Tariq
Virtual Teratak, a 3D virtual home navigation and control system is designed and developed to complement or replace existing remote controls, allowing home users to control network-connectable devices such as controllable lights, televisions, fans, etc. easily and conveniently with Android-based smartphones. The system is augmented with actual photos of the home so that users can control home devices more intuitively. A 3D virtual home navigation interface is also implemented with WebGL and HTML5 running on web browsers, which enable the users to have a more immersive experience in controlling their home appliances. Users can thus navigate the 3D virtual home, touch the 3D virtual appliances and control the actual appliances easily. Virtual Teratak has been successfully implemented and integrated into the Digital Home located within Multimedia University, Malaysia.
Future Trends of Embedded Systems - Technical Paper PresentationKaushik Gupta
Runner-Up for the State Level Technical Paper Presentation
Certification: Indian Society for Technical Education
More Details on https://www.kaushikgupta.in
The document describes a wireless notice board system using Zigbee technology. The system allows messages to be wirelessly transmitted from a transmitter connected to a PC to multiple receiver displays. The messages are stored in EEPROM memory on the receiver boards so they can still be displayed after a power failure. This overcomes issues with existing wired and GSM-based notice boards by providing a reliable wireless solution.
An embedded system is a computer system designed to perform specific tasks, often with real-time processing constraints. Embedded systems control many common devices and range from simple to very complex. They are designed to optimize for tasks like size, cost, reliability and performance. Common embedded systems include consumer electronics, appliances, vehicles, medical equipment, network infrastructure and more.
A Security Approach for Wireless Sensor Network in Agriculture Industrydrboon
An overview of agriculture industry is involved with large area, farmers and agriculture products. A large scale of area requires time consuming for collecting data to make decision on agriculture (e.g. watering, pruning and harvesting.). From these requirements, wireless sensor network can be a supported technology because it can deploy distributed and construct network sharing among their group. In general, security solution needs an experienced and skilled specialist to set up, maintain and troubleshoot. This is a challenge for wireless sensor network to implement in agriculture industry. Our security approach is presented related factors and customized configuration for the process of deployment, maintenance, information feedback. This paper presents the security mechanism to support the needs of self-setup and minimum operation for wireless sensor network in agriculture industry. The security module has automated initiate key by HKD protocol and has Adaptive IDS to alert when threat is detected via speaker. This system is also simplified the configuration, deployment and maintenance by only powering on and system will then initiate the key among the agents. As a result, this security module is proposed to balance between the moderate security with the limited resource and technician.
Smart security door system using SMS based energy harvestIJECEIAES
Over the last decade, different studies have been conducted to increase security to identify sensor technology and provide alternative energy with other energy harvest techniques such as vibration energy harvester and sun energy harvester. There is no combinational approach to utilize the door to create energy and use it for security measures in the literature, making our system different and unique. This proposed system comprises the security and the energy harvest; the security section utilizes a motion detector sensor to detect intruders. For instance, the magnetic door lock type firmly locks the door, which can only open with a generated password. On the other side, the energy harvest section utilizes the door motion to generate electricity for the system, which solves power shortage and limited battery life issues. Moreover, this study includes a GSM module that allows authorized owners to receive a generated password as a security enhancement. This design mainly focuses on improving or optimizing the conventional security doors' overall performance as sliding door, panel door, or revolving door. The experimental results show the system efficiency in terms of power generation and the time needed to authenticate the property owner. Notably, the power generator can generate electricity more rapidly, while the needed time to receive the mobile device's security code is around 3.6 seconds.
This document discusses trends in embedded systems. It outlines that embedded systems integrate computer hardware and software onto a single microprocessor board. Key trends in embedded systems include systems-on-a-chip (SoC), wireless technology, multi-core processors, support for multiple languages, improved user interfaces, use of open source technologies, interoperability, automation, enhanced security, and reduced power consumption. SoCs integrate all system components onto a single chip to reduce power usage. Wireless connectivity and multi-core processors improve performance. Embedded systems also support multiple languages and have improved user interfaces.
1. The document provides an overview of an introductory lesson on information technology.
2. It defines key terms like hardware, software, and services.
3. It outlines the objectives of the lesson which are to explain IT, identify its components, describe a computer system, and define input, processing, output, memory and control.
An Architecture for the Development of Ambient Intelligence Systems Managed b...Carlos Eduardo Pantoja
Presented at 30th International Conference on Software Engineering & Knowledge Engineering (SEKE) at San Francisco (USA).
1st July, 2018
Instagram: @prof.pantoja
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...IRJET Journal
This document describes a home appliance controlling and monitoring system using an IoT mobile application. The system allows users to control home appliances like fans, lights, and AC remotely via an Android app connected to a microcontroller over WiFi. Sensors like a DHT11 temperature and humidity sensor are connected to the microcontroller to monitor environmental conditions. The microcontroller is programmed to connect to the local WiFi router and send messages to the Android app. Relays connect appliances to the microcontroller so they can be turned on/off remotely. The system provides convenience, energy savings, and increased home security by allowing remote monitoring and control of appliances via a mobile device connected to the IoT network.
Ch 1 introduction to Embedded Systems (AY:2018-2019--> First Semester)Moe Moe Myint
This document provides an introduction to embedded systems for a course at Mandalay Technological University. It includes chapters on what embedded systems are, their typical applications and domains, characteristics, designing systems with microcontrollers, hardware and software co-design, real-time operating systems, and product development processes. The document outlines learning objectives for understanding fundamentals of embedded systems and being able to recognize, comprehend, implement, practice, develop familiarity with tools, and perform lab work related to embedded systems. It also provides an overview of key topics in each chapter and keywords to note related to embedded systems.
This document provides an overview of an introductory lesson on information technology (IT). It defines IT, outlines the objectives of the lesson, and describes the major components of a computer system including input, processing, output, memory, and control. It also defines common hardware, software, and IT terms. The document includes examples of different types of computers and uses of each. It concludes with a quick quiz to test understanding of key concepts covered.
Energy Management with Disaster Intimation and Control using IoTIJEACS
In the area of digitization and automation, the life of
human being is getting simpler as almost everything is
automated. Nowadays humans have made internet an integral
part of their everyday life without which they are helpless.
Internet of things (IoT) gives a platform which allows different
devices to inter-connect, sense and control the things remotely
across a network infrastructure without any limitation to the
coverage area. In our proposed work, we stress on Wireless-
Home-Automation-System (WHAS) using IoT, it is a system uses
computers or smart phone to control basic home functions and
features automatically through internet from anywhere around
the world, an automated home is sometimes called a smart home.
The proposed system is able to monitor the entire things
connected to the internet and also to be maintaining the status of
individual devices for further action. We have built the home
automation with several devices and sensors, here sensor help to
monitor the device status and intimate the authorized person to
take particular action.
New Interaction Styles for domotic systemsVitor Pedro
The document discusses new interaction styles for domotic (home automation) systems. It analyzes touch-based, button-based, and motion-based interfaces like the Wii, Kinect, and iPad. A solution is proposed using gesture recognition like the Kinect combined with an iPad-like portable device for remote control from anywhere via the internet. Novel applications discussed include automated lighting control by gesture or activity, remote temperature control, automated security features, integrated home entertainment streaming, and integrated home intercom systems.
This document discusses light pollution, defining it as the alteration of natural light levels due to artificial light sources. It is most severe in densely populated, industrialized areas of North America, Europe, Japan, and major Middle Eastern and North African cities. Light pollution comes from various exterior and interior lighting sources and has negative effects on the natural environment, humans, and animals. It disrupts ecosystems, increases greenhouse gases, and harms wildlife navigation, behaviors, and food sources. The document recommends reducing light pollution by using dimmer, targeted lighting and motion sensors to turn off unnecessary fixtures.
The Internet-based security Soft-i-Robot is modeled using Soft computing paradigms for problem solving and decision-making in complex and ill-structured situations. Soft-i-Robot monitors the workspace with multimedia devices and sensor using an Internet application program. The model has sensory subsystems such as Intruder detection which, detects intruder, captures image and sends to server, and an Obstacle Avoidance Unit to detect the objects in the path of the mobile robot. These multiple features with hybrid Soft computing techniques depart the developed Soft-i-Robot from the existing developments, proving that the streaming technology-based approach greatly improves the sensibility of robot tele-operation. The relatively powerful online robots available today provoke the simple question, in terms of two competing goals: recognition accuracy and computing time. Improved recognition accuracy and reduced computing time for face recognition of the intruder is obtained using Morphological Shared Weight Neural Network. To obtain a collision-free optimized path, Soft-i-Robot uses derivative free Genetic Algorithm. With rapid expansion of Robotics and Soft computing paradigms, robotic technology touches upon self-understanding of humans, socio-economic, legal and ethical issues leading to improved performance rate and information processing capabilities.
This document provides an overview of embedded systems and trends in three paragraphs:
It defines an embedded system as any electronic device that incorporates a microprocessor to perform dedicated tasks. It discusses the history of embedded systems from early military and calculator applications to today where they are ubiquitous. It lists some common applications of embedded systems like ATMs, phones, vehicles, industrial equipment, and medical devices.
This document discusses M2M and IoT design methodologies. It begins with an overview of M2M architecture, including the key components of an M2M area network, M2M core network, M2M gateways, and M2M applications. It then contrasts M2M and IoT, noting differences in communication protocols, types of connected devices, emphasis on hardware vs software, how data is collected and analyzed, and applications. The document also introduces software-defined networking (SDN) and network function virtualization (NFV) as approaches to address limitations of conventional network architectures for IoT.
Development of wireless and intelligent home automation systemTELKOMNIKA JOURNAL
The Intelligent Home Automation System (IHAS) is usually a cell phone web-based application that enables end users in order to keep track of in addition to manage home/office appliance using their mobile system. The main objective of this system is developed to facilitate home users, especially domestic electrical appliances with simple controls. In addition, it can save the cost of electricity for lighting can be controlled to suit the user. Generally, most home appliances controlled from a distance using a remote control. Has created a system for controlling home lighting from a certain distance, which replaces the remote control using mobile smartphone. To make the smartphone to function as a remote control, an application was developed using Android technology. App Inventor software used for designing applications intended. Hardware microcontroller Arduino UNO R3 which is used to connect the smartphone to the electrical equipment. The system has been tested by developing a mini model and take into account the situation in the domestic home. The test is based on the level of control for wirelessly using Bluetooth and the distance between the lamp and the smartphone. The results of this test, the system can be used on equipment or other home appliances for the purpose of controlling or adjustment. In addition, the security system was also highlighted in a typical system, using the global system for mobile (GSM), it can be warned and notified to the consumer where there is a gas leak or the presence of a person in the vicinity of the residence.
Virtual Teratak: A 3D Home Control and Entertainment SystemWaqas Tariq
Virtual Teratak, a 3D virtual home navigation and control system is designed and developed to complement or replace existing remote controls, allowing home users to control network-connectable devices such as controllable lights, televisions, fans, etc. easily and conveniently with Android-based smartphones. The system is augmented with actual photos of the home so that users can control home devices more intuitively. A 3D virtual home navigation interface is also implemented with WebGL and HTML5 running on web browsers, which enable the users to have a more immersive experience in controlling their home appliances. Users can thus navigate the 3D virtual home, touch the 3D virtual appliances and control the actual appliances easily. Virtual Teratak has been successfully implemented and integrated into the Digital Home located within Multimedia University, Malaysia.
Future Trends of Embedded Systems - Technical Paper PresentationKaushik Gupta
Runner-Up for the State Level Technical Paper Presentation
Certification: Indian Society for Technical Education
More Details on https://www.kaushikgupta.in
The document describes a wireless notice board system using Zigbee technology. The system allows messages to be wirelessly transmitted from a transmitter connected to a PC to multiple receiver displays. The messages are stored in EEPROM memory on the receiver boards so they can still be displayed after a power failure. This overcomes issues with existing wired and GSM-based notice boards by providing a reliable wireless solution.
An embedded system is a computer system designed to perform specific tasks, often with real-time processing constraints. Embedded systems control many common devices and range from simple to very complex. They are designed to optimize for tasks like size, cost, reliability and performance. Common embedded systems include consumer electronics, appliances, vehicles, medical equipment, network infrastructure and more.
A Security Approach for Wireless Sensor Network in Agriculture Industrydrboon
An overview of agriculture industry is involved with large area, farmers and agriculture products. A large scale of area requires time consuming for collecting data to make decision on agriculture (e.g. watering, pruning and harvesting.). From these requirements, wireless sensor network can be a supported technology because it can deploy distributed and construct network sharing among their group. In general, security solution needs an experienced and skilled specialist to set up, maintain and troubleshoot. This is a challenge for wireless sensor network to implement in agriculture industry. Our security approach is presented related factors and customized configuration for the process of deployment, maintenance, information feedback. This paper presents the security mechanism to support the needs of self-setup and minimum operation for wireless sensor network in agriculture industry. The security module has automated initiate key by HKD protocol and has Adaptive IDS to alert when threat is detected via speaker. This system is also simplified the configuration, deployment and maintenance by only powering on and system will then initiate the key among the agents. As a result, this security module is proposed to balance between the moderate security with the limited resource and technician.
Smart security door system using SMS based energy harvestIJECEIAES
Over the last decade, different studies have been conducted to increase security to identify sensor technology and provide alternative energy with other energy harvest techniques such as vibration energy harvester and sun energy harvester. There is no combinational approach to utilize the door to create energy and use it for security measures in the literature, making our system different and unique. This proposed system comprises the security and the energy harvest; the security section utilizes a motion detector sensor to detect intruders. For instance, the magnetic door lock type firmly locks the door, which can only open with a generated password. On the other side, the energy harvest section utilizes the door motion to generate electricity for the system, which solves power shortage and limited battery life issues. Moreover, this study includes a GSM module that allows authorized owners to receive a generated password as a security enhancement. This design mainly focuses on improving or optimizing the conventional security doors' overall performance as sliding door, panel door, or revolving door. The experimental results show the system efficiency in terms of power generation and the time needed to authenticate the property owner. Notably, the power generator can generate electricity more rapidly, while the needed time to receive the mobile device's security code is around 3.6 seconds.
This document discusses trends in embedded systems. It outlines that embedded systems integrate computer hardware and software onto a single microprocessor board. Key trends in embedded systems include systems-on-a-chip (SoC), wireless technology, multi-core processors, support for multiple languages, improved user interfaces, use of open source technologies, interoperability, automation, enhanced security, and reduced power consumption. SoCs integrate all system components onto a single chip to reduce power usage. Wireless connectivity and multi-core processors improve performance. Embedded systems also support multiple languages and have improved user interfaces.
1. The document provides an overview of an introductory lesson on information technology.
2. It defines key terms like hardware, software, and services.
3. It outlines the objectives of the lesson which are to explain IT, identify its components, describe a computer system, and define input, processing, output, memory and control.
An Architecture for the Development of Ambient Intelligence Systems Managed b...Carlos Eduardo Pantoja
Presented at 30th International Conference on Software Engineering & Knowledge Engineering (SEKE) at San Francisco (USA).
1st July, 2018
Instagram: @prof.pantoja
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...IRJET Journal
This document describes a home appliance controlling and monitoring system using an IoT mobile application. The system allows users to control home appliances like fans, lights, and AC remotely via an Android app connected to a microcontroller over WiFi. Sensors like a DHT11 temperature and humidity sensor are connected to the microcontroller to monitor environmental conditions. The microcontroller is programmed to connect to the local WiFi router and send messages to the Android app. Relays connect appliances to the microcontroller so they can be turned on/off remotely. The system provides convenience, energy savings, and increased home security by allowing remote monitoring and control of appliances via a mobile device connected to the IoT network.
Ch 1 introduction to Embedded Systems (AY:2018-2019--> First Semester)Moe Moe Myint
This document provides an introduction to embedded systems for a course at Mandalay Technological University. It includes chapters on what embedded systems are, their typical applications and domains, characteristics, designing systems with microcontrollers, hardware and software co-design, real-time operating systems, and product development processes. The document outlines learning objectives for understanding fundamentals of embedded systems and being able to recognize, comprehend, implement, practice, develop familiarity with tools, and perform lab work related to embedded systems. It also provides an overview of key topics in each chapter and keywords to note related to embedded systems.
This document provides an overview of an introductory lesson on information technology (IT). It defines IT, outlines the objectives of the lesson, and describes the major components of a computer system including input, processing, output, memory, and control. It also defines common hardware, software, and IT terms. The document includes examples of different types of computers and uses of each. It concludes with a quick quiz to test understanding of key concepts covered.
Energy Management with Disaster Intimation and Control using IoTIJEACS
In the area of digitization and automation, the life of
human being is getting simpler as almost everything is
automated. Nowadays humans have made internet an integral
part of their everyday life without which they are helpless.
Internet of things (IoT) gives a platform which allows different
devices to inter-connect, sense and control the things remotely
across a network infrastructure without any limitation to the
coverage area. In our proposed work, we stress on Wireless-
Home-Automation-System (WHAS) using IoT, it is a system uses
computers or smart phone to control basic home functions and
features automatically through internet from anywhere around
the world, an automated home is sometimes called a smart home.
The proposed system is able to monitor the entire things
connected to the internet and also to be maintaining the status of
individual devices for further action. We have built the home
automation with several devices and sensors, here sensor help to
monitor the device status and intimate the authorized person to
take particular action.
New Interaction Styles for domotic systemsVitor Pedro
The document discusses new interaction styles for domotic (home automation) systems. It analyzes touch-based, button-based, and motion-based interfaces like the Wii, Kinect, and iPad. A solution is proposed using gesture recognition like the Kinect combined with an iPad-like portable device for remote control from anywhere via the internet. Novel applications discussed include automated lighting control by gesture or activity, remote temperature control, automated security features, integrated home entertainment streaming, and integrated home intercom systems.
This document discusses light pollution, defining it as the alteration of natural light levels due to artificial light sources. It is most severe in densely populated, industrialized areas of North America, Europe, Japan, and major Middle Eastern and North African cities. Light pollution comes from various exterior and interior lighting sources and has negative effects on the natural environment, humans, and animals. It disrupts ecosystems, increases greenhouse gases, and harms wildlife navigation, behaviors, and food sources. The document recommends reducing light pollution by using dimmer, targeted lighting and motion sensors to turn off unnecessary fixtures.
High step up switched capacitor inductor dc voltage regulatorIAEME Publication
This document summarizes a proposed high step-up switched capacitor inductor (SCI) DC voltage regulator. The SCI converter uses one switched capacitor and one switched inductor to directly transfer energy from the input to the output in a single stage, achieving high efficiency. It consists of two energy storage components (capacitor and inductor) that are alternately connected in parallel and series. Simulation and experimental results validated the converter's ability to achieve high voltage gain with good performance and high efficiency using simple components. The proposed SCI converter and voltage regulator system could enable applications like battery chargers and UPS systems that require high step-up regulation from renewable energy sources.
Dokumen ini merupakan profil perusahaan IDcaster yang bergerak dalam bidang penyiaran digital. IDcaster menyediakan jasa pembuatan dan pengelolaan website serta webTV secara langsung (livestreaming) dengan kualitas prima beserta layanan pemasaran seperti optimasi mesin pencari dan aplikasi seluler. Perusahaan ini telah membantu beberapa lembaga dan acara dalam penyiaran acara mereka secara online.
Stand alone regulated single phase five level inverter with coupled inductorIAEME Publication
This document summarizes a research paper presented at the International Conference on Emerging Trends in Engineering and Management in 2014. The paper proposes a stand-alone regulated single phase five level inverter with a coupled inductor. It includes a high step-up DC-DC converter as a front-end stage to stabilize the output voltage from a variable DC source. The converter uses a coupled inductor to attain high voltage gain. The inverter can produce a five level AC output without variation in amplitude. The operation of the DC-DC converter and inverter are explained. Simulation and experimental results demonstrate the circuit can provide a constant output voltage waveform from different DC input voltages.
Amin Nawahda is an Assistant Professor of Civil/Environmental Engineering with a PhD from Kyoto University and experience working in Japan, Palestine, and Oman on air pollution monitoring and modeling projects. He has published over 20 papers on topics related to ozone, PM2.5, and their health impacts in East Asia. Nawahda currently works at Sohar University in Oman where he leads an air pollution monitoring and management project funded by the Omani government.
Bab 2 membahas standar kompetensi dan kompetensi dasar mengenal perangkat keras dan sistem presentasi, dengan indikator pembuatan dokumen baru power point, memilih layout slide, menggunakan tema slide, dan bekerja dengan teks. Materi meliputi cara membuat dokumen dan slide baru, mengubah layout dan tema slide, serta menambahkan dan mengedit teks.
Analytical study on soil pile interaction effect in the variation of natural ...IAEME Publication
This document summarizes an analytical study on how the natural frequency of a single pile foundation varies with soil-pile interaction effects. It presents the theoretical formulation for calculating the depth of fixity and natural frequency of a pile based on the soil modulus and pile diameter. A finite difference method and MATLAB code were used to model the soil-pile system and conduct a parametric study. The results show that the natural frequency non-linearly decreases with lower soil modulus and smaller pile diameter. An equation was developed through regression analysis to predict the natural frequency based on the soil and pile properties. Understanding how natural frequency varies with soil-pile interaction is important for designing foundations subjected to dynamic loads.
The document is written by Marinah Khekma Sari. It does not provide any other details about its content within the given text. The document only states the author as Marinah Khekma Sari but does not give any other information about the topic or main ideas being discussed.
A secured data transmission system by reversible data hiding with scalable co...IAEME Publication
The document describes a method for secure image transmission that combines reversible data hiding, encryption, compression, and steganography. It involves three main steps:
1. Reversible data hiding is used to embed the original image data by reserving room before encryption. Some pixel least significant bit values are embedded in other pixels.
2. Scalable compression is then applied to further secure the image.
3. The compressed, encrypted image then has additional data hidden within it using steganography techniques for transmission.
The receiving end performs the inverse processes of extracting the data, decompressing the image, and recovering the original embedded image in a lossless and secure manner. The method aims to achieve high quality encrypted
Dokumen ini membahas tentang topologi jaringan bus yang merupakan topologi pertama yang digunakan dalam jaringan komputer. Topologi ini menghubungkan semua komputer ke satu kabel utama dengan terminator di ujung kabel. Topologi ini memiliki kelemahan seperti rawan terjadinya tabrakan data dan gangguan pada satu komputer akan mempengaruhi seluruh jaringan.
Evaluating android antimalware against transformation attacksIAEME Publication
This document summarizes a study that evaluated the effectiveness of 10 popular commercial Android antimalware products against common malware transformation techniques. The researchers developed a framework called DroidChameleon that applied various obfuscation techniques to known malware samples to generate new variants. They found that none of the antimalware products were resistant to these basic transformations, and many could be trivially defeated. The researchers hope their findings will motivate the security community to improve current mobile malware detection capabilities.
Home Automation using Arduino IOT CloudIRJET Journal
The document describes a home automation system using Arduino and the IOT cloud. The system uses hardware components like an ESP32 module, PIR motion sensor, temperature/humidity sensor, smoke sensor, relays, and wall sockets to automate and monitor devices in the home. The ESP32 connects to the IOT cloud to allow remote control and monitoring of sensors and appliances from anywhere using an app. The system aims to provide convenience, energy efficiency, and security for homeowners.
This document describes the design and implementation of a voice activated, programmable, multipurpose robot. The robot uses a microcontroller and various integrated circuits to enable voice control and wireless control via dual-tone multi-frequency signaling. The document provides details on the circuit design and components, software design in C and Assembly languages, and concludes the robot demonstrates satisfactory performance for applications such as guiding visitors or patients.
This document describes the design and implementation of a voice activated, programmable, multipurpose robot. The robot uses a microcontroller and various integrated circuits to enable voice control and wireless control via dual-tone multi-frequency signaling. The document provides details on the circuit design and components, software design in C and Assembly languages, and concludes the robot demonstrates satisfactory performance for applications such as guiding visitors or patients.
Smart Sensors: Analyzing Efficiency of Smart Sensors in Public DomainDr. Amarjeet Singh
The paper gives the brief idea of smart sensors,
structure and its application. Smart sensor as compare to
other sensors can sensor anything with the special computing
devices connected with each other in sensor network. These
smart sensors first convert the digital signals to analog signals
and then communicate the message to the device. Now a days
smart sensors are used almost everywhere around us but very
few people know its working and future applications. So here
is a small review on smart sensors. This paper will help you
gain knowledge and its applications in daily life.
This document summarizes and reviews several models for ubiquitous computing systems. It begins by defining ubiquitous computing and describing the need for context awareness, wireless networks, and mobility in ubiquitous environments. It then examines three specific models:
1) SenSay, a context-aware mobile phone that adapts its behavior based on the user's environment and state.
2) HOMEROS, a middleware architecture that allows flexibility for heterogeneous devices and users across three layers.
3) Mobile Gaia, a middleware for ad-hoc pervasive computing networks.
AN OVERVIEW OF MICROPROCESSORS AND ASSEMBLY LANGUAGE PROGRAMMINGDarian Pruitt
The document provides an overview of microprocessors and assembly language programming. It discusses the evolution of microprocessors from early 4-bit designs to modern 64-bit designs containing millions of transistors. It describes the basic components of a microprocessor including the arithmetic logic unit, control unit, registers, and bus. It also discusses instruction execution in fetch and execute cycles and how microprocessors are classified based on capabilities and characteristics such as RISC vs CISC designs. Assembly language programming allows microprocessors to receive instructions in machine-readable form.
Intellectual Bank Locker Security SystemIJERA Editor
In today's modern world, security plays an important role. Every person has precious accessories like gold,
documents or cash. The main goal of this project is to design and implement a bank locker security system
based on fingerprint and GSM technology. It reduces wastage of time for both banker as well as customer and
provides advanced security. In this system, only authentic persons can recover money or accessories from bank
locker. In this system the user’s name, fingerprint and mobile number are enrolled. If the fingerprint matches,
then four digit code will be sent to the authorized person’s mobile through GSM modem and the locker door
will be opened then, otherwise it will be in locked position and gives an alarm when any mismatch occurs. The
sensors will be active during night times to provide security against thefts.
Intellectual Bank Locker Security SystemIJERA Editor
In today's modern world, security plays an important role. Every person has precious accessories like gold,
documents or cash. The main goal of this project is to design and implement a bank locker security system
based on fingerprint and GSM technology. It reduces wastage of time for both banker as well as customer and
provides advanced security. In this system, only authentic persons can recover money or accessories from bank
locker. In this system the user’s name, fingerprint and mobile number are enrolled. If the fingerprint matches,
then four digit code will be sent to the authorized person’s mobile through GSM modem and the locker door
will be opened then, otherwise it will be in locked position and gives an alarm when any mismatch occurs. The
sensors will be active during night times to provide security against thefts.
Design and implementation of microcontroller in fpga for io tIJARIIT
This document discusses the design and implementation of a microcontroller in an FPGA for Internet of Things applications. It begins with an introduction to sensor nodes, microcontrollers and FPGAs. It then reviews literature on microcontroller architectures and FPGA design. The paper describes developing a behavioral model of an 8-bit microcontroller in VHDL and synthesizing it for the Xilinx Spartan 3E FPGA. Simulation results showed the basic functionality of the microcontroller was achieved. The modular VHDL design allows expanding it to develop more advanced microcontrollers.
Design and implementation of a smart home system with two levels of security ...nooriasukmaningtyas
Besides the development of technology in recent years, there has been an
effective tendency to construct smart cities and homes. Whereas the smart
home control system components can be incorporated with the existing home
appliances to eliminate the need for human intervention, save electricity,
protect homes from accidents as well as the theft, and provide home residents
with comfort. This work comprises the utilising of the internet of things (IoT)
technology to build the proposed design for the smart home. The proposed
design includes many subsystems as well as several types of sensors, such as
the passive infrared (PIR) sensor, the gas sensor, the soil moisture sensor, the
water level sensor, the temperature sensor, the light dependent resistance
(LDR), and the flame sensor. Each sensor will be connected to the Arduino
Nano for the data processing purpose, after which the Arduino Nano will be
connected to the NodeMCU module via the digital pins to implement the IoT
subsystem. The proposed system also includes a smart garage gate based on
Bluetooth HC-05 module with a specially programmed android app.
The document discusses the Cortex-A11 multicore processor and its components. It describes the processor's architecture including the snoop control unit, accelerator coherence port, generic interrupt controller, advanced bus interface unit, floating point unit, NEON media processing engine, L2 cache controller, program trace macrocell, and memory management unit. The purpose of these components is to provide efficient performance, low power consumption, and scalability for applications such as mobile devices and infotainment systems.
Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular DiseasesBHAVANA KONERU
This article proposes an ultra-low power and secure IoT platform for predicting cardiovascular diseases using ECG signals. The platform can predict the onset of critical cardiovascular events up to 3 hours in advance with 86% accuracy while consuming 62.2% less power and occupying 16% less area than state-of-the-art approaches. It extracts a chip-specific ECG key to enable secure communication and integrates this key with an existing design-for-trust solution to provide multi-layered security, thwarting hardware attacks like reverse engineering and counterfeiting, with only 9.5% area and 0.7% power overhead and no speed impact.
Design and Implementation of Smart Bell Notification System using IoTIJRTEMJOURNAL
This document describes the design and implementation of a smart bell notification system using IoT. The system uses a camera to capture an image of a visitor when the doorbell is pressed and sends the image to the owner via SMS along with an alert. It also saves the images to a Google Drive folder. The system aims to provide home security and convenience by allowing owners to see who is at the door and take appropriate action. It uses an ARM-7 microcontroller, GSM modem, camera and cloud storage to enable this smart doorbell notification feature.
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
This document describes the design and implementation of a smart bell notification system using IoT. The system uses a camera to capture an image of a visitor when the doorbell is pressed and sends the image to the owner via SMS along with an alert. It also saves the images to a Google Drive folder. The system aims to provide home security and convenience by allowing owners to see who is at the door and take appropriate action. It uses an ARM-7 microcontroller, GSM modem, camera and cloud storage to enable this smart doorbell notification feature.
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...IRJET Journal
This document describes a smart switch that can connect and disconnect electrical devices at home using the internet. Specifically, it discusses:
- Developing a smart switch using a GPRS-enabled smartphone that can control household items via an LC2148 microcontroller and KEIL software.
- How internet of things (IoT) technologies allow objects to sense, communicate and interact wirelessly, enabling remote decision making and control of operations.
- The hardware and software components of the smart switch, including the microcontroller, LCD interface, and software used.
The document provides details about Abdul Azeem's 6-week summer training at Electrocus Solution on "Internet of Things (IOT)". It includes a certificate, declaration, acknowledgement, abstract and contents. The training covered embedded system architecture, designing and implementing embedded systems, and fundamentals of Arduino and IOT. Key topics included microcontrollers, sensors like ultrasonic and soil moisture, programming with Arduino IDE, and characteristics and applications of IOT.
The evolution of the microprocessors.pdfpgarg210405
A microprocessor is an essential component of modern computers that carries out instructions from computer programs. It consists of a central processing unit, arithmetic logic unit, registers, and buses that work together to execute instructions and perform computational tasks. Microprocessors have evolved significantly since the first commercially available model in 1971 and now power a wide range of technologies from smartphones to industrial automation systems.
Introduction to Embedded System Architecture and Design.docx.pdfArshak28
Embedded system architecture and design refers to the process of developing hardware and software components that are specifically designed to perform dedicated functions within a larger system. The architecture of an embedded system includes the selection and integration of microprocessors, microcontrollers, memory, and various peripherals to meet specific requirements. Embedded system design involves the creation of software algorithms and coding methodologies that enable the system to perform its intended tasks efficiently and reliably. This field encompasses various disciplines, including electronics, computer architecture, and software engineering, and plays a vital role in the development of a wide range of devices, from smartphones and appliances to automotive systems and industrial equipment.
For more visit : https://iies.in/
This document discusses a research paper on home automation systems using the Internet of Things (IoT). It begins with an introduction to IoT, defining it as a network of everyday objects that can share information and complete tasks. It then discusses how IoT is enabling home automation through technologies like smart lights, door sensors, and webcams. The paper also outlines the key components of an IoT system, including hardware, middleware, and interfaces. It describes several enabling technologies used in IoT, such as RFID, wireless sensor networks, and addressing schemes. Finally, it discusses reference architectures for IoT from standards bodies like ITU and WSO2.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to A Microcontroller Based Intrusion Detection System (20)
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
A Microcontroller Based Intrusion Detection System
1. Ewunonu Toochi et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 11(Version 3), November 2014, pp. 69-79
www.ijera.com 69 | P a g e
A Microcontroller Based Intrusion Detection System Ewunonu Toochi, Okwe Gerald Ibe, Iwuchukwu U.C,Uzuegbu C.J Department of, Electrical and Electronics Department, Federal University of Technology Owerri Imo State Nigeria ABSTRACT A Microcontroller based Intrusion Detection System is designed and implemented. Rampant, Okintrusion to restricted zones have highlighted the need for embedded systems that can effectively monitor, instantly alert personnel of any breach in security and retrieve graphic evidence of any such activity in the secured area. At the heart of the intrusion detection system is the PIC 168F77A Microcontroller that transmits pulses at 38 KHz. It is suitably interfaced to a GSM modem that can send SMS on sight of infringement and a webcam that can take snapshots. The report also presents the system software which has been developed in two parts: one in C++ Language using MPLAB KIT and the other written in AT COMMAND resident in the GSM modem. The system is very cost-effective, uses easily available components and is adaptable to control systems. Keywords: Microcontroller, Microprocessor, C++ language, Embedded system, intrusion detection
I. Introduction
In Africa today, especially Nigeria, there are contentions as to the effective functionality of National Security systems. Security is an encompassing phenomenon that is paramount to individuals, entities, communities and even nations. Security has to do with self-preservation which is the first law of existence. It implies a stable, relatively predictable environment in which an individual or group may pursue its ends or objectives without disruption, harm, danger or fear of disturbance or injury. A country’s national security is therefore concerned with the well-being, welfare and interest of her citizens. It is also concerned with the preservation of her sovereignty and territorial integrity against external aggression. The importance of security to the economic well-being of a country and her citizens was amply highlighted by a former American Secretary of Defense, Robert McNamara, when he stated that security is development and development is security. This means that, “without security there cannot be any development” (Guèhenno, 2004).The importance attached to security was well captured in the Nigerian Constitution of 1999: Section 14 (2) (b) where it is stated that: “The security and welfare of the people shall be the primary purpose of Government”. Invariably, the Constitution has saddled the Government with the responsibility of safeguarding lives, property and welfare of Nigerians against both internal and external threats including other forms of danger.
However, everybody has a role to play at enhancing our National security as security is and should be everybody’s business. Security is both a prerequisite for and a critical aspect of development. At high levels of insecurity, development is impossible; Economies fail, States go into negative economic growth; societies lose cohesion while health and education status drop (Paul, 2004). Security has become a very worrisome situation in our contemporary society. Items worth millions are reportedly lost or stolen regularly. People have become more aware of the unreliability of Government-provided security operatives. They are also aware that developed countries where technology-based Security systems are in use, suffer less loss than developing countries like Nigeria and many other African countries.
II. Literature Review
All Engineering products need Control Systems. Incorporating a computer within that product to undertake the control makes the entire system embedded. At the heart of embedded systems is a microprocessor chip or microcontroller chip. An embedded system could be said to be a computer system with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints (Heath, 2003; Barr, 2007). These devices are programmed to perform one or more tasks (Wilmshurst, 2007). It is embedded as part of a complete device that often has mechanical parts. Embedded system controls are in almost all the devices in common use today (Michael and Massa, 2006). Embedded systems are in existence almost everywhere: in our homes, offices, factories, hospitals, etc. They do not have, in most cases, general purpose devices such as hard drives, video controllers, printers and network cards. Embedded systems contain processing cores that are either microcontrollers or DSPs (Digital Signal Processors) (Giovino, 2008). Typical examples of systems with embedded system applications include the microwave
RESEARCH ARTICLE OPEN ACCESS
2. Ewunonu Toochi et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 11(Version 3), November 2014, pp. 69-79
www.ijera.com 70 | P a g e
oven, the domestic refrigerator and the electronic Ping-Pong. These systems will be reviewed in the following sections. 2.2 Microprocessors and Microcontrollers The past few decades have ushered in the introduction of a technology that has radically changed the way in which we can analyze our environment. The microprocessor or computer-on-a- chip first became a commercial reality in 1971 with the introduction of the 4-bit Intel 4004 by Intel Corporation. The 1970s saw the growth of the number of PC (Personal Computer) users from a handful of hobbyists and “hackers” to millions of business, industrial, governmental, defense, educational and private users who are now enjoying the advantages of inexpensive computing. Interestingly, one of the by-products of microprocessor development is the microcontroller.
2.2.1Microprocessors: A microprocessor is a general-purpose digital computer Central Processing Unit (CPU) on an integrated circuit chip (Kenneth, 1991). It is an important unit in the embedded system hardware. It is the heart of the embedded system (Raj, 2008). A microprocessor incorporates the functions of a computer's central processing unit (CPU) on a single integrated circuit (IC) (Osborne, 1980; Krishana, 2007). It is a multipurpose programmable device that accepts digital data as input processes according to instructions stored in its memory and provides results as output. It is an example of sequential digital logic, as it has internal memory. Microprocessors operate on numbers and symbols represented in the binary numeral system. The first single-chip microprocessor was the 4-bit Intel 4004 released in 1971 with the Intel 8008 and other more capable microprocessors becoming available over the next several years., “TI (Texas Instruments) Engineers, Gary Boone and Michael Cochran were the first to successfully create the first microcontroller in 1971”. The result of their work was the TMS 1000 which went commercial in 1974. This combined a ROM (Read-Only Memory) unit, a RAM (Random Access Memory) unit, a processor and a clock on one chip and was targeted at embedded systems (Augarten, 1983). A block diagram of a microprocessor is shown in Figure 2.1. It contains an ALU (Arithmetic and Logic Unit), a PC (Program Counter), an SP (Stack Pointer), some working registers, a clock timing circuit and an interrupt circuit. The key term in describing the design of the microprocessor is “General-purpose”. The hardware design of a microprocessor is arranged such that a small or very large system can be configured around it. The prime use of a microprocessor is to fetch data, perform extensive calculations on that data and store the results of these calculations on a mass storage device or display the result for human use (Ray, Bhurchand, 2008).
Figure 2.1: Block diagram of a microprocessor.
2.2.2 Microcontrollers
A microcontroller can be considered to be a self- contained system comprising a processor, memory modules and peripherals. Hence, a microcontroller can be used as an embedded system. The majority of microcontrollers in use today are embedded in other machinery such as automobiles, telephones, appliances and peripherals for computer systems. Embedded systems usually have no keyboards, display units, disks, printers or other recognizable PC (Personal Computer) I/O vices and may lack devices for human interaction of any kind (Heath, 2003). The block diagram of a microcontroller in Figure 2.2 depicts and incorporates all the features found in a microprocessor including the ALU, PC, SP and the registers but has added features like ROM, RAM, Parallel I/O, Serial I/O, counters and a clock circuit.
3. Ewunonu Toochi et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 11(Version 3), November 2014, pp. 69-79
www.ijera.com 71 | P a g e
Figure 2.2: Block Diagram of an 8-bit Microcontroller
Thus, the main use of a microcontroller could be said to control the operations of a machine using a fixed program that is stored in the ROM. This does not change throughout the life time of the system. The microcontroller design uses a much more limited set of single-byte and double-byte instructions that are used to move the code and data from internal memory to the ALU. The instructions are coupled with pins on the IC (Integrated Circuit) package. These pins are “programmable” i.e. they are capable of having several different functions depending upon the wishes of the programmer (Kenneth, 1991). Explicitly, the microprocessor is concerned with rapid movement of code and data from external addresses to the chip, while the microcontroller is concerned with rapid movement of bits within the chip. The microcontroller can function as a computer with the addition of no external digital parts while the microprocessor must have many additional parts to be operated. The generic view of a microcontroller in Figure 2.3 shows that it contains a simple microprocessor core, along with necessary data and program memory to this which adds all the peripherals that allow it to do the interfacing. These include digital and analog input and output, or counting and timing elements. Like all other electronic circuits, the microcontroller needs power and requires a clock signal sometimes generated internally to drive the circuit. Figure 2.3: Generic view of a microcontroller
2.2.3 Microcontroller Families There are thousands of different microcontroller types in the world today that are made by different manufacturers. A microcontroller family is built around a fixed microprocessor core. Different family members are then replicated by using the same core, with different combinations of peripherals and memory sizes. 2.2.4 PIC Microcontrollers
PIC is a family of modified Harvard architecture microcontrollers made by Microchip Technology, derived from the PIC1650 originally developed by General Instrument's Microelectronics Division. The name PIC is referred to as “Peripheral Interface Controller" (General Instrument Databook, 1976). This was originally, a design of the company, General Instruments. PIC is popularly called Peripheral Interface Controller produced as PIC® in the 1970s by General Instruments as PIC® 1650 and 1655 processors (Wilmshurst, 2007). Its outstanding trademark qualities were simplicity, standalone, high speed and low cost. In many cases, they ran faster, required a simpler chipset and were quicker to prototype than their competitors. Moreover, Microchip stayed firmly entrenched in the 8-bit world. The ranges of PIC microcontrollers comprise different devices offered in different packages and for different applications. It should be noted that all PIC microcontrollers have these qualities in common: low cost, self-contained, 8 bits hardware structures, pipelining, RISC structure, single accumulator with fixed reset and interrupt vectors. Recently, Microchip has offered five (5) main families of microcontrollers as shown in the Table 2.1. Every member of any one family shares the same core architecture and instruction set. 2.2.9 The PIC 16F87XA
The PIC 16F87XA generically has the 16F873A, 16F874A, 16F876A and 16F877A as family members. Table 2.1 above has summarized the features of this group. The 16F87XA is a unique group: two package sizes and two memory sizes are found. The package size is being driven by the
4. Ewunonu Toochi et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 11(Version 3), November 2014, pp. 69-79
www.ijera.com 72 | P a g e
number of I/O pins that are available. The 40-pin versions have five parallel digital (Input/output) as well as more analog inputs compared to their 28-pin counterparts. Thus, four group members are distinguished by their different memory sizes and different package sizes, while the larger package allows more parallel Input/output ports to be used. The pin connection diagrams are illustrated in Figure 2.6. It is clearly shown that the “extra” pins on the larger devices are enclosed in a dotted line. The 874A/877A has port D and E which is a clear difference. Figure 2.6: Microcontroller pins (FASMICRO, 2013).
Port D has 8 bits while port E has 3 bits. Either port can be used for general purpose I/O, like any of the other ports. The block diagram of port D, when configured for normal digital I/O, is shown (Figure 2.7a). An alternative function for port E is to provide three further analog inputs. So, port E is under the control of one of the registers that control the ADC, ADCONI. The setting of this determines whether the port is used for digital or analog signals. Figure 2.7: Block diagram of port D Pin driver circuit (Wilmshurst, 2007).
Altogether, ports D and E can also form the parallel slave port. The ports are put into this mode by setting the PSPMODE bit in the TRISE register (Wilmshurst, 2007). This allows the microcontroller to interface as a slave to a data bus controlled by a microprocessor. The port E bits must be set as inputs (with digital mode selected in ADCONI); the state of TRIS D is, however, immaterial. Ports D and E are then configured as in Figure 2.8. The diagram shows 1 bit of port D, together with the three control lines: CS, WR and RD. These are the 3 bits of port E contained for this purpose. There is an output latch and an input latch for each port D bit. Illustratively, application for parallel slave port appears as in Figure 2.8, the port is connected to data bus and control lines that form part of a larger system, controlled by a microprocessor. The 16F8744 program can write data to the port in which case bit OBF of TRISE is set. If CS and RD are taken low by the external circuit, then the port outputs the data held on its output latches onto the external bus. This action clears OB. If CS and WR are taken low, the port latches data from the bus into its input latches and bit IBF of TRISE is set.IBF is cleared when the port is read by the microcontroller program if the external circuit writes to the port again, before the previous word has been read, then the IBW bit of TRISE is set. The interrupt flag PSPIF is set when either a slave write or read is completed by the external circuit.
5. Ewunonu Toochi et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 11(Version 3), November 2014, pp. 69-79
www.ijera.com 73 | P a g e
Figure 2.8: Parallel slave port connected to system bus (FASMICRO, 2013.)
2.3 Microcontroller Intrusion Detection Systems According to Hassan (Hassan, 2008), “An intrusion detection system can be defined as the tools, methods and resources to help identify, assess and report unauthorized or unapproved activity”. The efficiency of a security system could be highly improved with an improved number of measures put in place to avoid or detect intrusions. These measures may involve the use of several security networks monitored by a human or a machine. The environmental design refers to the physical structures and personnel’s put in place to monitor and handle physical threats to an area. Such include walls, security officials and security animals. The mechanical and electronic access control refers to the mechanical infrastructure put in place to prevent or disturb attacks. These include doors and locks. Intrusion detection deals with systems put into place to notify instantly obstructions especially at restricted zones. The final layer which is called the video/camera monitoring is a recorded image surveillance system which could range from a camcorder with a memory device to a hidden display unit and system. This provides a means of identifying the culprit in case the intruder is able to escape before a response team arrives. It is important to note that these layers should be able to function independently and also work as a unit.
A number of systems could be integrated for intrusion detection to increasing the level of security in an enclosed area with the use of three or four of these security layers for optimum security. An Automated Intrusion Detection System incorporating an Alarm could be implemented in an enclosed area limited to rooms with only one entrance and exit. Such rooms include stores and vaults, thus all individuals accessing the room can only access the room and leave the room via one door. This makes keeping track of access information very convenient for the user. Hitherto, implementing the only first two layers of a good security system can make the rooms insecure and also very open to attacks from within thus the need for the automated intrusion detection system which will alert the human security of an ongoing attack via the means of an alarm system. Considering the environmental design which refers to the physical structures and personnel’s put in place (such as security agencies and security dogs, a metal detector with electronic locks with identity validation systems) to monitor and handle physical threats to an area, can be employed. Intrusion detection deals with alarm systems put into place to alert security personnels and agencies when the first two stages are bypassed. (Oludele, Ayodele, Oladele & Olurotimi, 2009). Moreover, Microcontroller-based design of some systems like the burglar-alarm-displaying- position is an improvement in the electronics sector. Electronics like this device can be coupled solely via the use of discrete components, moreover the use of a microcontroller for this design can be justified by the reduction in the number of components used in the course of the design which also improves the reliability, durability and flexibility since burglar alarm systems are very imperative in the society, to solve the problem of accurate detection and location of intruders (Oshevire & Oladimeji, 2014). A vehicle compartment occupancy detection system is also operable to detect the presence of a person or animal within a vehicle compartment, such as a vehicle cabin or trunk space, by detecting a change in an electric field within the compartment. The detection system includes an electric field generator and an electric field sensor which is operable to detect changes in the electric field generated within the compartment. The detection system may be operable in response to one or more inputs which are indicative of a hazardous condition within the vehicle compartment (McCarthy, 2004). 2.4 Programming the Embedded System
Embedded system design is made up of two main aspects: the hardware and the software. Embedded system programs are written to run on the target’s system hardware. The idea of computer programming is to recognize each instrument from a computer set and execute its instruction set especially those in the binary called machine code. In other words, the human nature learns the machine code of the computer exactly as the computer would read it. A computer program, (compiler /interpreter) then converts that program into a machine code that the
6. Ewunonu Toochi et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 11(Version 3), November 2014, pp. 69-79
www.ijera.com 74 | P a g e
computer can comprehend. An assembler is introduced, in that every one of the computer’s instructions set is given a mnemonic i.e. a three- or- four-letter word that can be used to represent directly one instruction from the instruction set. The programmer then writes the program using the instruction mnemonics. A special computer program called a cross-assembler, usually running on a PC, converts the code written in mnemonics to the machine code that the computer will see (Wilmshurst, 2001). In the early days, programming was done in assembly language to program almost any type of computer. This helps us to directly work with the resources of the computer efficient code that executes quickly. Working in assembly language helps us to learn the structure of the computer although rather slow, error prone and does not always produce well-structured programs.
III. Methodology
The model and methodology, considerations/ specifications of the intrusion detection system and its functional components are reported. The development stages and modes of operation of the software application developed for the hardware, was also reported here. A summarized version of the user’s manual for the system as well as strategies and plan for testing of the components of the system concludes the chapter. 3.1 Review of existing Detection Systems and their Limitations Several means, ways and systems have been employed to checkmate intrusions both in developed and developing nations. Some of these systems and methods will be reviewed in this section. Electrical Locks Electric locks come in many forms. The most basic is a Magnetic Lock (commonly called a Mag lock). A large electro-magnet is mounted on the door frame and a corresponding armature is mounted on the door. When the magnet is powered and the door is closed, the armature is held fast to the magnet. Mag locks are simple to install and are very attack- resistant. But mag locks are also problematic. Improperly installed or maintained mag locks have fallen on people. In other words, one must unlock the mag lock to both enter and leave. This has caused fire marshals to impose strict codes on the use of mag locks and the access control practice in general. Other problems include a lag time in as the collapsing magnetic field is not instantaneous. This lag time can cause a user to walk into the door. Mag locks by design fail unlocked, that is if power is removed they unlock. This could be a problem where security is a prime concern (Oludele et al., 2009).
Electric Strikes
They replace a standard strike mounted on the door frame and receive the latch and latch bolt. Electric strikes can be simple to install when they are designed for drop-in replacement of a standard strike. But some electric strikes require that the door frame be heavily modified. Electric strikes allow mechanical free egress: As a user leaves, he operates the lockset in the door, not the electric strike in the door frame. Electric strikes can also be either fail unlocked, as a mag lock, or the more secure fail locked. Electric strikes are easier to attack than a mag lock. It is simple to lever the door open at the strike. Often, there is an increased gap between the strike and the door latch (Oludele et al., 2009) Electric Mortise and Cylindrical Locks These are drop-in replacements for the door mounted mechanical locks. A hole must be drilled in the door for electric power wires. Also a power transfer hinge is used to get the power from the door frame to the door. Electric mortise and cylindrical locks allow mechanical free egress. Electric mortise and cylindrical locks can be either failed unlocked or fail locked. (Oludele et al., 2009) Electrified Exit Hardware
Electric field exit Hardware sometimes called panic hardware or crash bars, are used in fire exit applications. The idea is that one simply pushes against the bar to open it, making it the easiest of mechanically free exit methods. Electrified exit hardware can be either failed unlocked or fail locked. A drawback of electrified exit hardware is their complexity which requires skill to install and maintenance to assure proper function. Motor Operated Locks are used throughout Europe. An European motor operated lock has two modes, day mode where only the latch is electrically operated, and night mode where the more secure deadbolt is electrically operated (Wikipedia, 2009). User Authentication Systems
When implemented with a digital access system, one of the following access systems or digital authentications systems can be with an electric lock. These however are only a few of the numerous authentication devices available; Numerical Codes, Passwords and Passphrases. Perhaps the most prevalent form of electronic lock is that using a numerical code for authentication, the correct code must be entered in order for the lock to deactivate. Such locks typically provide a keypad, and some feature an audible response to each press. Combination lengths are usually between 4 and 6 digits long. A variation on this design involves the user entering the correct password or pass phrase. A major hindrance however is the fact that users are
7. Ewunonu Toochi et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 11(Version 3), November 2014, pp. 69-79
www.ijera.com 75 | P a g e
capable of forgetting their codes. Forgetfulness is especially common in older people and this system will not be convenient for them. These codes are, in some cases, easy to crack. Security Tokens Another means of authenticating users is to require them to scan or "swipe" a security token such as a smart card to have a link between the token and the lock. For example, some locks can access stored credentials on a personal digital assistant using infrared data transfer methods. However, just as in the case of an ATM card, the magnetic tape tends to wear off with time either resulting to time wasting in accessing a room or the inability of the user to access the room at all. Lack of Intrusion Detection Alerts All intrusion alerts are dependent on discovery by individuals i.e. either security personnel’s or students. This delay gives the culprit enough time to dispose of whatever has been stolen and more than enough time to cover his tracks. This leads to a string of an ever increasing number of unsolved cases of theft. A proper intrusion detection system alerts the responsible quarters once an abnormality is discovered in the system. Inefficient Monitoring Method Monitoring one’s belongings are left to the vigilance on the part of the security officials and the owners of such goods. This can prove to be ineffective considering the fact that as human beings, we tend to get bored performing monotonous tasks. This leads to the search of more exciting tasks no matter how irrelevant they might be at such times. There is also the need to take occasional breaks to refresh one. A very observant thief will be able to use such minute details to his advantage. When surveillance is continuous with no visible break, it tends to deter the less desperate thieves and thereby reducing the theft rate. Choice of “C ++” as a Programming Language
For some time in recent past, C++ has overwhelmingly become the language of embedded programmers. “C++” has thrived precisely in the range of projects for both 8- bit and 64- bit processors, in systems with bytes, kilobytes and megabytes of memory. It is simpler to learn, and compilers are available for almost all its processors in use. It has processor independence that allows programmers to concentrate on algorithms and applications rather than on the details of particular processor architecture. The greatest strength of C++ is that it is a very “low level” language that gives embedded programmers an extra ordinary degree of direct hardware control without sacrificing the benefit of high level languages (Van Sickle, 2003). Its low level nature is a clear intention of the language’s creators (Wilmshurst, 2001). C++ is an object-oriented superset of C that has spread widely amongst embedded programmers. It has almost all the core features of C but adds new functionalities for better data abstractions and a more object-oriented style of programming. Certainly, C has become the centerpiece of embedded programming and everything said about C equally applies to C++. Choice of MPLAB IDE kit as a design tool This is a Windows development environment specifically made for PIC microcontroller. It has all the tools used to design and deploy embedded systems. Figure 3.14 depicts a Prototype MPLAB PIC Development Kit. Advantages abounds using MPLAB KIT for designing and maintaining embedded systems. Some of these advantages especially those relating to its choice in the design of this project include:
Ease and speed in building and compiling projects. This is very much evident because its User Interface allows for simultaneous designing, coding and debugging.
It allows for dynamic features to be added to the environment.
Its interface allows the designer to quickly build a project and then refine/repair it in coding view.
MPLAB KIT is customizable. The designer can easily set preferences controlling how and to what extent accessibility is coded. The code, fonts, colour, highlighting modes etc with which to preview a page can be adjusted.
Choice of AT COMMAND as a Communication Language “AT” command was developed by AT&T Wireless systems communication for effective communication between a DCE (fax) and a DTE (computer). It is popularly referred to as AT command because every of its syntax starts with the letters AT. Simcom Wireless (Simcom Wireless, 2010), in their publications, made clear the numerous merits of AT COMMAND. It was stated that it was the best open source communication link between a DCE and DTE. Also, it was stated that AT COMMAND offers excellent performance, portability, reliability and can be learnt with relative ease. It also offered an improvement to data integrity and is more searchable and allows for concurrent users. 3.4 Flow Chart Description
Figure 3.0 is the operational flow chart which shows the overall description of how the entire system works.
8. Ewunonu Toochi et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 11(Version 3), November 2014, pp. 69-79
www.ijera.com 76 | P a g e
Fig 3.0 System operational Flowchart 3.5 System Block Diagram
Figure 3.1: Block Diagram of Intrusion Detection System
9. Ewunonu Toochi et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 11(Version 3), November 2014, pp. 69-79
www.ijera.com 77 | P a g e
3.6 Intrusion Detection System Block Diagram Description The entire circuit consists of different blocks or sub-units with each block performing an essential function. The sub-units are interconnected to give the complete system. The different blocks that make up the system are described in details below.
3.6.1 Power Supply Sub-Unit
Every electronic system requires ac power supply to work. The quantity of voltage and current required by each component is specified in its datasheet. Most electronic components and sub systems operate on +5V. This voltage (+5V) is a basis for electronics power supply. The datasheet of the components used in the intrusion detection system also specify a power supply voltage of +5V except for that of the relay which works with +12V. Figure 3.2 shows the power supply sub-unit and its various components. Figure 3.2: Power supply sub-unit
The 7805 is a 5V regulator which ensures an output of +5V and it is connected to the microcontroller. The LM317 is a variable regulator. Its output voltage is varied by varying the 5KΩ variable resistor until the desired voltage is gotten. In this circuit, it is used to provide the needed +12V for the relay power supply. The four diodes, D1 to D4, rectify the ac voltage from the transformer to dc voltage. The capacitor, C1, smoothensfilters the rectified voltage so as to remove ripples. The Transformer, TR1, steps down the ac voltage from 220V ac to 15V ac. 3.6.2 The Microcontroller This is the heart of the Intrusion detection system. The PIC16F877A microcontroller is used. Its presence minimizes component count required to get the circuit working. It also authenticates the device as an embedded electronic system. The pins in the microcontroller are grouped into ports. Hence, we have PORTA, PORTB etc. Figure 3.3 shows the arrangement of a 40-pin PIC 16F877A microcontroller. Figure 3.3: PIC I6F877A microcontroller 3.6.8 Intrusion Detection System Circuit Diagram
The various sub-units discussed were combined to realize the complete circuit diagram shown in Figure 3.12.
10. Ewunonu Toochi et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 11(Version 3), November 2014, pp. 69-79
www.ijera.com 78 | P a g e
3
2
1
4 8
U1:A
TL393
D1
LED
R1
2.2k R2
47k
D2
1N4148
R3
100k
D7
14
D6
13
D5
12
D4
11
D3
10
D2
9
D1
8
D0
7
E
6
RW
5
RS
4
VSS
1
VDD
2
VEE
3
LCD
LM016L
RA0/AN0
2
RA1/AN1
3
RA2/AN2/VREF-/CVREF
4
RA4/T0CKI/C1OUT
6
RA5/AN4/SS/C2OUT
7
RE0/AN5/RD
8
RE1/AN6/WR
9
RE2/AN7/CS
10
OSC1/CLKIN
13
OSC2/CLKOUT
14
RC1/T1OSI/CCP2
16
RC2/CCP1
17
RC3/SCK/SCL
18
RD0/PSP0
19
RD1/PSP1
20
RB7/PGD
40
RB6/PGC
39
RB5
38
RB4
37
RB3/PGM
36
RB2
35
RB1
34
RB0/INT
33
RD7/PSP7
30
RD6/PSP6
29
RD5/PSP5
28
RD4/PSP4
27
RD3/PSP3
22
RD2/PSP2
21
RC7/RX/DT
26
RC6/TX/CK
25
RC5/SDO
24
RC4/SDI/SDA
23
RA3/AN3/VREF+
5
RC0/T1OSO/T1CKI
15
MCLR/Vpp/THV
1
U2
PIC16F877A
T1IN
11
R1OUT
12
T2IN
10
R2OUT
9
T1OUT
14
R1IN
13
T2OUT
7
R2IN
8
C2+
4
C2-
5
C1+
1
C1-
3
VS+
2
VS-
6
U3
MAX232
1
6
2
7
3
8
4
9
5
J1
CONN-D9F
R4
100k
R5
100k
RL1
Q1
BC547
D3
1N4001
RL1
Q1
BC547
D3
1N4001
R7
2.2k
R6
2.2k
D4
D5
D6
C1
1uF
C2
1uF
Figure 3.12: Complete circuit diagram
The interconnections of the various components
form the complete circuit diagram which was used to
achieve our access control. When powered on, the
LED power indicator flashes or comes ON. The PIC
16F877A Microcontroller transmits and receives
infrared pulses at 38 KHz at no line of sight
infringement and obstructions. As the Camera USB
cable is connected to a laptop, the camera software is
run. The LCD, LED and microcontroller are
interfaced to inform the user on the situation report.
Subsequently, the buttons instantly switches ON the
camera to enable the webcam take snapshots and
save the pictures.
IV. RESULTS AND DISCUSSIONS
The prototype were designed and implemented.
The results obtained from the combination of various
intrusion detection system components and
corresponding constructions are evaluated and some
observation were made during the different stages of
testing. Some distances were taken so as to ascertain
the workability of the intrusion detection system. The
best line-of-sight is about 100cm the distance from
the transmitter to the receiver. See the picture of the
completed prototype in fig 4.1
Figure 4.1: Front view of the completed work
showing the picture of a lady that was detected on the
visual display unit
V. Conclusion
In the future, many homes and offices will rely
on the Intrusion Detection System as a means of
effective monitoring and guarding of restricted areas
like armory divisions, bank strong rooms, etc. where
only authorized personnel can be granted access.
They can also be employed to detect theft, leakage of
examination papers and instant reporting of situations
at hand especially when the personnel in charge are
absent.
REFERENCES
[1] Augarten, S. (1983). The Most Widely
Used Computer on a Chip: The TMS
1000"State of the Art: A Photographic
History of the Integrated Circuit (New
Haven and New York: Ticknor & Fields).
ISBN 0-89919-195-9. Retrieved 2009-12-
23.FASMICRO, (2013).
[2] Embedded Systems Overviews. First
Atlantic Semiconductors & Micro
Electronics, Owerri.Giovino, B. (2013).
"Micro Controller.com – Embedded
Systems supersite".
[3] Hassan, M.F (2008). Intelligent Intrusion
Detection System Blog. Retrieved, October,
14 2008.
[4] Hayat Khiyal, M., Khan, A., & Shehzadi,
E. (2009). SMS Based Wireless Home
Appliance Control System for Automating
Appliances and Security. Issues in
Informing Science and Information
Technology, Volume 6, 2009.
[5] Heath, S. (2003). Embedded systems design.
EDN series for design engineers (2 Ed.).
Newness. p. 2. ISBN 978-0-7506-5546-0
11. Ewunonu Toochi et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 11(Version 3), November 2014, pp. 69-79
www.ijera.com 79 | P a g e
[6] Intel 8084, (2008). Oral History on the development and promotion of INTEL 8084 Microcontroller, Computer History Museum Oral History, 2008. p. 4. Retrieved 2011-June- 28
[7] Jean-Marie, G. (2005). Giving Peace a Chance, in the World in 2005 (London: The Economist, 2004), p. 3; Human Security Report 2004 (London: Oxford University Press, forthcoming).
[8] Kenneth, A. (1991). The 8051 Microcontroller, West publishing Company, St Paul, USA.
[9] Krishna, K. (2007). Microprocessors and Microcontrollers: Architecture Programming And System Design PHI Learning Pvt. Ltd., 2007 ISBN 81-203- 3191-5 page 61,
[10] Luo, R.C., Min-Hsiung, Chou, Y.T., Liao, C.T., & Lai, C.C. (2007). An Intelligent Security Robot System; Industrial Electronics Society, 2007. IECON 2007, 33rd Annual Conference of the IEEE. 5-8 Nov. 2007.
[11] McCarthy, C.K (2004). Vehicle compartment occupancy detection system: US 6768420, B2USPTO, USPTO Assignment, Espacenet.
[12] Michael, B. (2007). Embedded Systems Glossary. Neutrino Technical Library. Retrieved 2007-04-21
[13] Michael, B. & Anthony, J. M. (2006). Introduction Programming embedded systems: With C and GNU development tools. O'Reilly. pp. 1–2. ISBN 978-0-596- 00983-0
[14] Microchip Technology, Inc. (2007), PIC18F1220/1320 Data Sheet, retrieved 2012-04-02
[15] MOSDATA, (1976). General Instrument, 1976 Data book.
[16] Oludele, A., Ayodele, O., Oladele, O., &Olurotimi, S. (2009). Design of an Automated Intrusion Detection System incorporating an Alarm: Journal of Computing, volume 1, issue 1,December 2009, ISSN: 2151-9617.
[17] Oshevire, P., & Oladimeji, T. (2014). Design and implementation of a MicroController based burglar Alarm: Journal of Advancement in Engineering and Technology, http://scienceq.org/Journals/ JAET.php Received: January 15, 2013; accepted: January28, 2014, published: January 31, 2014.
[18] Paul, C. & Anke, H. (2004). The Challenges of Reducing the Global
Incidence Of Civil War, Center for the Study of African Economics, Department of Economics, Oxford University, Copenhagen Challenge Paper, April 23, 2004, p. 22.
[19] Raj, K. (2008). Embedded Systems Architecture, Programming and Design. Tata McGraw-Hill. p. 5. ISBN 978-0-07- 066764-8.
[20] Ray, A.K. & Bhurchand, K.M., (2008). Advanced Microprocessors and Peripherals. India: Tata McGraw-Hill.
[21] Van Sickle, E. (2003). Programming Microcontrollers in C, 2nd Ed Elsevier, USA. ISBN 1-878767-57
[22] Wilmshurst, T. (2007). Designining Embedded systems with PIC Microcontrollers, Elsevener Ltd, USA.