An electronic switch sensor with a point-to-point intrusive monitoring system

Adamu Murtala Zungeru, Haruna Isah, Paul Obafemi Abraham-Attah, Ahmad Abubakar Sadiq

Research output: Contribution to journalArticle

Abstract

Sophistications in theft and other criminal damages necessitates for the symbiotic blending of technology with security needs. In this research, electronic switches in the form of sensors were used to implement a point-to point intrusive monitoring system for the detection of an unauthorized access to commercial and residential buildings. The system is a simple and reliable security system and uses switch sensor technology
to revolutionize the standards of living. The system is also simple, adaptable and cost-effective. It is
designed in six major units which include; the power supply, the input/sensor micro-switches, the
monitoring and indicator, the timing, the tone generation and output units. To ensure steady power supply in the circuit, the power unit constitutes both the mains and DC supplies. The alarm unit are being activated by the normally closed sensor micro-switches unit which is connected in an electronic/door mat
at both the entrance and exit of buildings. In order to facilitate easy location of the intruder, the exact point of intrusion is being determined by the monitoring and indicator unit which constitutes the quad R/S flipflop IC and LED’s. The timing/tone generation unit is built on the 555 timer IC, in the Astable mode, which output keeps changing as far as there is a breakage of the sensors. The output of the system is mainly the
LEDs and buzzer, which gives electrical light and audio signal to notify the owner of an intruder in the building. Major design issues considered include; efficiency, portability, cost-effectiveness, durability, compatibility as well as the availability of required materials. This system works on the principle of the micro-switch sensor and dependent on the condition that an intruder entered through the door and stepped
in any one of the switches under the mat. Verification and validation of the system indicate compliances to design specification hence the output requirements were met.
Original languageEnglish
Pages (from-to)87-98
JournalInternational Journal of Information Technology, Modeling and Computing (IJITMC)
Volume1
Issue number4
Publication statusPublished - 2013

    Fingerprint

Cite this