An electronic digital combination lock

A precise and reliable security system

Research output: Contribution to journalArticle

Abstract

The increasing rate of crime, attacks by thieves, intruders and vandals, despite all forms of security gadgets and locks still need the attention of researchers to find a permanent solution to the well being of lives and properties of individuals. To this end, we design a cheap and effective security system for buildings, cars, safes, doors and gates, so as to prevent unauthorized person from having access to ones properties through the use of codes, we therefore experiment the application of electronic devices as locks. However, a modular approach was employed in the design in which the combination lock was
divided into units and each unit designed separately before being coupled to form a whole functional
system. During the design, we conducted Twenty tests with the first eight combinations being four in number, the next seven tests being five and the last five combinations being six. This was done because of the incorporation of 2 dummy switches in the combinations. From the result obtained, combinations 8,11, 13 gave the correct output combination. However, 8 being the actual combination gave the required output. The general operation of the system and performance is dependent on the key combinations. The overall system was constructed and tested and it works perfectly.
Original languageEnglish
Pages (from-to)29-41
Number of pages13
JournalInternational Journal of Security, Privacy and Trust Management (IJSPTM)
Volume2
Issue number1
Publication statusPublished - 2013

Fingerprint

Security systems
Crime
Railroad cars
Switches
Experiments

Cite this

@article{cc2e09fed2b9431085e33be5d7223848,
title = "An electronic digital combination lock: A precise and reliable security system",
abstract = "The increasing rate of crime, attacks by thieves, intruders and vandals, despite all forms of security gadgets and locks still need the attention of researchers to find a permanent solution to the well being of lives and properties of individuals. To this end, we design a cheap and effective security system for buildings, cars, safes, doors and gates, so as to prevent unauthorized person from having access to ones properties through the use of codes, we therefore experiment the application of electronic devices as locks. However, a modular approach was employed in the design in which the combination lock wasdivided into units and each unit designed separately before being coupled to form a whole functionalsystem. During the design, we conducted Twenty tests with the first eight combinations being four in number, the next seven tests being five and the last five combinations being six. This was done because of the incorporation of 2 dummy switches in the combinations. From the result obtained, combinations 8,11, 13 gave the correct output combination. However, 8 being the actual combination gave the required output. The general operation of the system and performance is dependent on the key combinations. The overall system was constructed and tested and it works perfectly.",
author = "Zungeru, {Adamu Murtala}",
year = "2013",
language = "English",
volume = "2",
pages = "29--41",
journal = "International Journal of Security, Privacy and Trust Management (IJSPTM)",
issn = "2277-5498",
publisher = "Academy and Industry Research Collaboration Center (AIRCC)",
number = "1",

}

TY - JOUR

T1 - An electronic digital combination lock

T2 - A precise and reliable security system

AU - Zungeru, Adamu Murtala

PY - 2013

Y1 - 2013

N2 - The increasing rate of crime, attacks by thieves, intruders and vandals, despite all forms of security gadgets and locks still need the attention of researchers to find a permanent solution to the well being of lives and properties of individuals. To this end, we design a cheap and effective security system for buildings, cars, safes, doors and gates, so as to prevent unauthorized person from having access to ones properties through the use of codes, we therefore experiment the application of electronic devices as locks. However, a modular approach was employed in the design in which the combination lock wasdivided into units and each unit designed separately before being coupled to form a whole functionalsystem. During the design, we conducted Twenty tests with the first eight combinations being four in number, the next seven tests being five and the last five combinations being six. This was done because of the incorporation of 2 dummy switches in the combinations. From the result obtained, combinations 8,11, 13 gave the correct output combination. However, 8 being the actual combination gave the required output. The general operation of the system and performance is dependent on the key combinations. The overall system was constructed and tested and it works perfectly.

AB - The increasing rate of crime, attacks by thieves, intruders and vandals, despite all forms of security gadgets and locks still need the attention of researchers to find a permanent solution to the well being of lives and properties of individuals. To this end, we design a cheap and effective security system for buildings, cars, safes, doors and gates, so as to prevent unauthorized person from having access to ones properties through the use of codes, we therefore experiment the application of electronic devices as locks. However, a modular approach was employed in the design in which the combination lock wasdivided into units and each unit designed separately before being coupled to form a whole functionalsystem. During the design, we conducted Twenty tests with the first eight combinations being four in number, the next seven tests being five and the last five combinations being six. This was done because of the incorporation of 2 dummy switches in the combinations. From the result obtained, combinations 8,11, 13 gave the correct output combination. However, 8 being the actual combination gave the required output. The general operation of the system and performance is dependent on the key combinations. The overall system was constructed and tested and it works perfectly.

M3 - Article

VL - 2

SP - 29

EP - 41

JO - International Journal of Security, Privacy and Trust Management (IJSPTM)

JF - International Journal of Security, Privacy and Trust Management (IJSPTM)

SN - 2277-5498

IS - 1

ER -