Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 15

CodeMint Market

Home | Get a Project Topic | New EntriesNew | Payments | Downloads | Hire a Writer | Hire a
Programmer | Contact Us | Login Call: 0906-451-7926

Home ELECTRICAL ENGINEERING DESIGN AND CONSTRUCTION OF GSM BASED INTRUDER LOOP
DETECTOR SYSTEM

DESIGN AND CONSTRUCTION OF GSM BASED INTRUDER LOOP DETECTOR SYSTEM

The Complete Research Material is averagely 52 pages long and it is in Ms Word Format, it has 1-5
Chapters.

Major Attributes are Abstract, All Chapters, Figures, Appendix, References.

Study Level: BTech, BSc, BEng, BA, HND, ND or NCE.

Full Access Fee: ₦5,000

Get the complete project »Instant Download Active

ABSTRACT

The GSM-based home intrusion detection device is a security device that sends a text message to the
owner’s mobile number in case of home intrusion. This is to warn and notify the owner of an impending
attack. It is used when the owner is outside the house, or even when asleep. The device uses a GSM
modem which requires a subscriber identification module (SIM) card to send short message service
(SMS). The device is activated once the door or window is opened and it automatically sends a text
message to the security administrator. The device improves the effectiveness to which possible incidents
of intrusion and robbery are reported to security administrators when he is away from home through
long distance communication using GSM technology. It bridges the gap between the security device and
its administrator when the latter is away.

TABLE OF CONTENTS

CHAPTER TITLE PAGES


Title Page

Declaration - - - - - - i

Certification - - - - - ii

Dedication - - - - - - iii

Acknowledgements - - - - iv

Abstract - - - - - - v

Table of Contents - - - - - vi

List of Tables - - - - - viii

List of Figures - - - - - xi

CHAPTER ONE: INTRODUCTION

1.1 Background of the Study - - - - - - 1

1.2 Statement of the Research Problem - - - - 4

1.3 Objectives of the Study - - - - - - 5


1.4 Significance of the Study - - - - - 5

1.5 Scope and Limitations of the study - - 6

1.6 Definition of Key Concepts - - - - - 6

1.7 Organization of the Project - - - - - 8

CHAPTER TWO: REVIEW OF RELATED LITERATURE

CHAPTER THREE: RESEARCH METHODOLOGY

3.1 Procedure Used - - - - - - - 15

3.2 Hardware Development - - - - - - 16

3.3 Mode of Operation of the Circuit - - - - 22

3.4 How SMS is sent to the Owner/User Number - - 24

CHAPTER FOUR: RESULTS AND DISCUSSION

4.1 SMS Notification Test - - - - - - 30


4.2 Success Rate Test - - - - - - - 32

4.3 SMS Message Delivery Time - - - - 33

CHAPTER FIVE: SUMMMARY, CONCLUSION AND RECOMMENDATIONS

5.1 Summary - - - - - - - - 38

5.2 Conclusion - - - - - - - - 38

5.3 Recommendation - - - - - - - 39

REFERENCES - - - - - - 40

LIST OF TABLES

TABLE TITLE PAGE

3.1 List of components 26

3.2 Types AT command 29

4.1 SMS notification test results 31


4.2 Success rate table 33

4.3 Delivery time using device 35

4.4 Delivery tie using mobile phone 35

LIST OF FIGURES

FIGURE TITLE PAGE

3.1 Power pack 16

3.2 GSM module 18

3.3 Microcontroller 19

3.4 Circuit diagram of GSM

based intruder loop detector 21

3.5 Conceptual diagram 22


3.6 Block diagram 24

3.7 Program flow chart 27

CHAPTER ONE

INTRODUCTION

1.1 Background of the Study

The efficacy of our security system has been in question over the last few years owing to the wide spread
of global crime that has rendered many establishment, business place and home crippling. Despite all
effort security operative and their counterpart had put in place to moderate burglary and intrusion, yet
crime rate and intrusion are still high. It had been observed that as the population increases and
employment rate decreases, it leads to a corresponding increase in crime rate (Aayush,2012). Therefore
there is need to employ a more effective, efficient, reliable, cost effective and less time respond
technology or measure to tackle and reduce the crime wave to a bearable minimum to achieve a
peaceful society.

An Intruder Detecting System (IDS) or device is a techniques used for detecting intruder
actions(Abhishek and Amol, 2015). Intrusion detector is a device or software application that monitors
network or an area or system activities for malicious activities or policy violations and produces alert, or
reports to a management station. Intrusion prevention is the process of performing intrusion detection
and attempting to stop detected possible incidents (Abhishek el al, 2015)

Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible
incidents, logging information about them, attempting to stop them, and reporting them to security
administrators. In addition, organizations use IDPSs for other purposes, such as identifying problems
with security policies, documenting existing threats, and deterring individuals from violating security
policies (Sadeque, 2012). IDPSs have become a necessary addition to the security infrastructure of nearly
every organization.

Security is the degree of protection against danger, damage, loss or any criminal activity. Security can
also be seen as a condition in which one can develop and progress freely (Asogwa, 2013). An important
aspect of security includes home security. Intruder detection system is very important because crime
rate is increasing day by day. The advancement of technology has increased the safety and security of
people along with their belongings. One of the reasons for the rise of the smart home device is the
increasing risk of burglary and robbery and the busy time of the day.

The busy lifestyle of people during working hours or travel period is leading to the neccessity of
controlling home remotely and increasing the neccessity of keeping surveillance over their homes
(Nwalozie, Aniedu, Nwokoye and Abazuonu, 2015). Mobile phones today are not just used to make calls.
The use of mobile phones is changing with the development of technology and they can be used for
different purposes. They can be used as clocks, calendars or controllers instead of being used just as
phones (Nwalozie et al, 2015) . Today smart phones are available in the market with different
applications and hardware which can be implemented without any further development or
enhancement.

With the help of the global system mobile for communication (GSM) network, a mobile can be used to
implement a smart home by controlling devices and getting alerts on intrusion, burglary and robbery
(Abhishek and Amol, 2012).Traditional household security systems often require installation and detect
based on opening of doors and windows. The increasing number of the stealing and house breaking
cases especially when the people are not at home need a system that can call or tell owner if anyone
has attempted or trying to break into their home. Therefore the idea of a smart home system was
proposed, to overcome the limitations of the systems already available in the market. Hence the GSM-
Based Home Intrusion Detection Device is a security device that sends a text message to the owner’s
mobile number in case of home intrusion. This is to warn and notify the owner of an impending attack. It
is useful when the owner is outside the house, or even when asleep. It is pre-programmed to store the
owner’s mobile number in which the device would send a text message notifying the receiver of an
intrusion. The device uses a GSM modem which requires a subscriber identification module (SIM) card to
send text messages. The device is to be placed adjacent to possible entries of intrusion, such as doors
and windows. The device is activated once the door or window is opened and it automatically sends a
text message which is also pre-programmed. The user can choose the number of sensors, types of
sensors, the area of coverage of the systems along with the number space. The goal of the project is to
implement a smart home system by controlling the electronic devices at home remotely with the help of
a mobile device and getting alerts on intrusion or movement around the restricted premises. The
SIM900-GPRS module and the microcontroller are used to communicate between the mobile phone and
the devices and sensors installed at home. The mobile phone can be used as controller from anywhere in
the world if the GSM network is available. In addition, three sensors are used as a heat detector, motion
detector and intrusion detector which trigger the alarm upon reaching the critical limit. The GSM alert
system is limited to the area with the GSM network available. The alert system works without the GSM
network.

1.2 Statement of the Research

In offices, residential building and industries, the potential for intrusion and thieve is always there. This
could be carried out by close associate or stranger. However intrusion, burglary and thief has been a big
challenge prompting engineers to develop a system called “intruder detecting system” helping to reduce
intrusion thieve. In modern technology advanced system had been developed to improve the standard
of intruder detection / protection system called (IDPS). The system will not only detect intruder by
sensing their motion or presence, but also alert the occupant of the building and immediate
neighborhood of intrusion through SMS and alarm system.

1.3 Objectives of the study

The main objective of this work is to design and construct a GSM-based intruder loop detector system

1.4 Significance of the study

The following are theSpecific objectives of the study:

i. Create a device that triggers whenever the home security is bridged

ii. Use GSM technology in sending notifications to the security administrator’s mobile number
notifying him of a possible intruder to home.

1.5 Scope and Limitations of the Study


This project will focus on providing intruder detection and alarm system for individuals and industries.

However, there would be possibility for expansion to cover other areas like laboratories, offices, bank
vault and restricted areas like high tension voltage areas as well as radioactive areas.

1.6 Definition of Key Concepts

The key concepts associated with intruder loop detection system are:

i. Intrusion: is an illegal act of entering, seizing, or taking possession of another's property.

ii. Intrusion detection system: is a device or software application that monitors network and/or
system activities for malicious activities or policy violations and produces reports to a management
station.

iii. Alert or Alarm: is a signal suggesting that a system has been or is being compromised.

iv. Attacker or Intruder:

YOU EITHER GET WHAT YOU WANT OR YOUR MONEY BACK. T&C APPLY

Get Complete Project Now »

Follow us:
Talk to us right now: (+234)906-451-7926 (Call/WhatsApp)

Share a Comment

Get Full Access To Project »

Talk to us right now: (+234)906-451-7926 (Call/WhatsApp)

You can find more project topics easily, just search

Quick Project Topic Search

What is your project topic?

Find Topic Now »

SIMILAR ELECTRICAL ENGINEERING FINAL YEAR PROJECT RESEARCH TOPICS

1. APPLICATION OF ARTIFICAIL NEURAL NETWORK FOR ENHANCED POWER SYSTEMS PROTECTION ON


THE NIGERIAN 330kV NETWORK

» AbstractThis work investigates an improved protection solution based on the use of artificial neural
network on the 330kV Nigerian Network modelled us...Continue Reading »

52 pages | 378 hits | Source: ELECTRICAL ENGINEERING

2. AUTOMATIC DOOR BELL USING PASSIVE INFRARED SENSOR

» LIST OF FIGURES Fig. 2.1 PIR model D204B 10 Fig. 2.2 LM358 inter grate circuit 12 Fig 2.3 Pin out of IC
or LM 358 12 Fig 2.4BJT and JFET symbols 14 Fi...Continue Reading »

52 pages | 353 hits | Source: ELECTRICAL ENGINEERING

3. DESIGN AND CONSTRUCTION OF 12V BATTERY CHARGER

» CHAPTER ONE INTRODUCTION 1.1 Background of Study Few modern electrical appliances receive their
power directly from the Utility grid like National Ele...Continue Reading »

53 pages | 139 hits | Source: ELECTRICAL ENGINEERING


4. CONSTRUCTION AND DESIGN OF BATTERY LEVEL INDICATOR CIRCUIT

» DEDICATIONWe dedicate this project work to Almighty God, the source of all knowledge, wisdom and
understanding, for being there for us throughout the ...Continue Reading »

52 pages | 49 hits | Source: ELECTRICAL ENGINEERING

5. MODELING AND EVALUATION OF A SIMPLE ADAPTIVE ANTENNA ARRAY FOR A WCDMA MOBILE
COMMUNICATION.

» ABSTRACT This thesis presents the uniform Linear Array model of a simple adaptive antenna array
based on signal to interference plus noise ratio (SINR...Continue Reading »

125 pages | 84 hits | Source: ELECTRICAL ENGINEERING

6. DETERMINATION OF WEAR METALS IN AIRCRAFTENGINE OIL (A CASE STUDY OF NAF DIAMOND DA 40)

» Table of Contents DECLARATION.. II CERTIFICATION.. III APPROVAL. IV DEDICATION.. V


ACKNOWLEDGEMENT. VI Abbreviations. X ABSTRACT. XII CHAPTER ONE. 1 I...Continue Reading »

52 pages | 126 hits | Source: ELECTRICAL ENGINEERING

7. THE POLITICAL CORRUPTION AND PSYCHOSOCIAL DISORDER, USING TANURE OJAIDE’S THE ACTIVIST
AND OKEY NDIBE’S ARROW OF RAIN

» CHAPTER ONE 1.0 INTRODUCTION Nigeria’s political problems sprang from the carefree manner in
which the British took over, administered, and aban...Continue Reading »

52 pages | 256 hits | Source: ELECTRICAL ENGINEERING

8. DESIGN OF AN EQUIPMENT THAT CAN FACILITATE A CONVENIENT AND EASY WAY OF CONTROLLING
OUR DOMESTIC APPLIANCES

» CHAPTER ONE INTRODUCTION 1.1 OBJECTIVE OF PROJECT The need for a remote control alert system
that can control domestic appliances and various lighting...Continue Reading »

84 pages | 261 hits | Source: ELECTRICAL ENGINEERING


9. DESIGN AND CONSTRUCTION OF A SINGLE PHASE AUTO-TRANSFORMER OF RATING IKVA, 240V/110,
80 12V, 6V

» ABSTRACT This project work up deals on the design and construction of a single phase step down
nations fermor, with raking IKVA, 240V/11OV, 80V 12U, 6...Continue Reading »

50 pages | 376 hits | Source: ELECTRICAL ENGINEERING

10. CONSTRUCTION OF CAR TOUCH INTRUDER ALARM

» CHAPTER ONE: INTRODUCTION 1.1. Background of the Study The first car alarm was a primitive
contraption that utilized a bell or horn connected to the d...Continue Reading »

76 pages | 275 hits | Source: ELECTRICAL ENGINEERING

Access Fee

Access Fee SELECTED

₦5,000

Use, by you or one client, in a single end product/research which end users/readers are not charged for.
The total price includes only the project material price.

ALSO ON: CODEMINT.NET

₦5,000

Instant Download:Instant Download: Yes

Included:Format: Ms Word

Included:Chapters: 1-5

Included:Pages: 52

Included:Attributes: Abstract, All Chapters, Figures, Appendix, References

Study Level:Study Level: BTech, BSc, BEng, BA, HND, ND or NCE

Get Full Access Now


Trending Final Year Project Research Topics

SANITATION PRACTICES AND IMPLICATION ON STUDENT’S HEALTH (CASE STUDY OF ENUGU STATE
COLLEGE OF EDUCATION (TECHNICAL) ENUGU)

3,598 hits | 62 pages | Source: ENVIRONMENTAL SCIENCE

THE EFFECT OF EARLY MARRIAGE ON FEMALE ACADEMIC PERFORMANCE

2,437 hits | 61 pages | Source: EDUCATION

Design and Implementation of An Online Recruitment System

2,276 hits | 67 pages | Source: COMPUTER SCIENCE

THE CAUSES OF POOR ENROLLMENT OF MALE STUDENT INTO HOME ECONOMICS DEPARTMENT IN
TERTIARY INSTITUTIONS

2,172 hits | 59 pages | Source: EDUCATION

PROBLEMS AND PROSPECT OF MEDIA MANAGEMENT IN NIGERIA

1,953 hits | 62 pages | Source: MASS COMMUNICATION

THE RIGHT OF AN ACCUSED PERSON UNDER THE NIGERIAN LEGAL SYSTEM


1,939 hits | 100 pages | Source: LAW

©2019 All Rights Reserved

Contact the CodeMint Helpdesk

CODEMINT SUPPORT CHANNELS

Phone: 09064517926

Phone: 08121101801

Email: codemintbox@gmail.com

CODEMINT MARKET

Projects Topics

Hire a Professional

Source Codes

Terms

OUR COMMUNITY

Facebook

Blog

News

Free Software

CodeMintBox

Contact Us Research Project Materials BSc/HND Projects MSc/PhD Projects Privacy Policy

All prices are in Nigerian Naira (NGN). Trademarks and brands are the property of their respective
owners.

© 2019 CodeMint - Final Year Research Project Topics - Free Project Topics | Codemint.

Twitter
Facebook

YouTube

Instagram

Google+

You might also like