phonelogo+234 8146561114 or +2347015391124

DESIGN AND CONSTRUCTION OF GSM BASED INTRUDER DETECTOR SYSTEM

USER'S INSTRUCTIONS: The project work you are about to view is on "design and construction of gsm based intruder detector system" . Please, sit back and study the below research material carefully. This project topic "design and construction of gsm based intruder detector system" have complete 5(five) Chapters. The complete Project Material/writeup include: Abstract + Introduction + etc + Literature Review + methodology + etc + Conclusion + Recommendation + References/Bibliography.Our aim of providing this "design and construction of gsm based intruder detector system" project research material is to reduce the stress of moving from one school library to another all in the name of searching for "design and construction of gsm based intruder detector system" research materials. We are not encouraging any form of plagiarism. This service is legal because, all institutions permit their students to read previous projects, books, articles or papers while developing their own works.


TITLE PAGE

 

BY

---
--/H2013/01430
DEPARTMENT OF ----
SCHOOL OF ---
INSTITUTE OF ---



APPROVAL PAGE

This is to certify that the research work, "design and construction of gsm based intruder detector system" by ---, Reg. No. --/H2007/01430 submitted in partial fulfillment of the requirement award of a Higher National Diploma on --- has been approved.

By
---                                                     . ---
Supervisor                                                  Head of Department.
Signature……………….                           Signature……………….        

……………………………….
---
External Invigilator



DEDICATION
This project is dedicated to Almighty God for his protection, kindness, strength over my life throughout the period and also to my --- for his financial support and moral care towards me.Also to my mentor --- for her academic advice she often gives to me. May Almighty God shield them from the peril of this world and bless their entire endeavour Amen.



ACKNOWLEDGEMENT

The successful completion of this project work could not have been a reality without the encouragement of my --- and other people. My immensely appreciation goes to my humble and able supervisor mr. --- for his kindness in supervising this project.
My warmest gratitude goes to my parents for their moral, spiritual and financial support throughout my study in this institution.
My appreciation goes to some of my lecturers among whom are Mr. ---, and Dr. ---. I also recognize the support of some of the staff of --- among whom are: The General Manager, Deputy General manager, the internal Auditor Mr. --- and the ---. Finally, my appreciation goes to my elder sister ---, my lovely friends mercy ---, ---, --- and many others who were quite helpful.


PROJECT DESCRIPTION: This work "design and construction of gsm based intruder detector system" research material is a complete and well researched project material strictly for academic purposes, which has been approved by different Lecturers from different higher institutions. We made Preliminary pages, Abstract and Chapter one of "design and construction of gsm based intruder detector system" visible for everyone, then the complete material on "design and construction of gsm based intruder detector system" is to be ordered for. Happy viewing!!!


ABSTRACT

The GSM-based home intrusion detection device is a security device that sends a text message to the owner’s mobile number in case of home intrusion. This is to warn and notify the owner of an impending attack. It is used when the owner is outside the house, or even when asleep. The device uses a GSM modem which requires a subscriber identification module (SIM) card to send short message service (SMS). The device is activated once the door or window is opened and it automatically sends a text message to the user’s phone. The device improves the effectiveness to which possible incidents of intrusion and robbery are reported to security administrators when he is away from home through long distance communication using GSM technology. It bridges the gap between the security device and its user when the latter is away.

CHAPTER ONE
INTRODUCTION

1.1     Background of the Study

The efficacy of our security system has been in question over the last few years owing to the wide spread of global crime that has rendered many establishment, business place and home crippling. Despite all effort security operative and their counterpart had put in place to moderate burglary and intrusion, yet crime rate and intrusion are still high. It had been observed that as the population increases and employment rate decreases, it leads to a corresponding increase in crime rate (Aayush,2012). Therefore there is need to employ a more effective, efficient, reliable, cost effective and less time respond technology or measure to tackle and reduce the crime wave to a bearable minimum to achieve a peaceful society.
An Intruder Detecting System (IDS) or device is a techniques used for detecting intruder actions(Abhishek and Amol, 2015).  Intrusion detector is a device or software application that monitors network or an area or system activities for malicious activities or policy violations and produces alert, or reports to a management station. Intrusion prevention is the process of performing intrusion detection and attempting to stop detected possible incidents (Abhishek el al, 2015)
Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, attempting to stop them, and reporting them to security administrators. In addition, organizations use IDPSs for other purposes, such as identifying problems with security policies, documenting existing threats, and deterring individuals from violating security policies (Sadeque, 2012). IDPSs have become a necessary addition to the security infrastructure of nearly every organization.
Security is the degree of protection against danger, damage, loss or any criminal activity. Security can also be seen as a condition in which one can develop and progress freely (Asogwa, 2013). An important aspect of security includes home security. Intruder detection system is very important because crime rate is increasing day by day. The advancement of technology has increased the safety and security of people along with their belongings. One of the reasons for the rise of the smart home device is the increasing risk of burglary and robbery and the busy time of the day.
          The busy lifestyle of people during working hours or travel period is leading to the neccessity of controlling home remotely and increasing the neccessity of keeping surveillance over their homes (Nwalozie, Aniedu, Nwokoye and Abazuonu, 2015). Mobile phones today are not just used to make calls. The use of mobile phones is changing with the development of technology and they can be used for different purposes. They can be used as clocks, calendars or controllers instead of being used just as phones (Nwalozie  et al, 2015) . Today smart phones are available in the market with different applications and hardware which can be implemented without any further development or enhancement.
With the help of the global system mobile for communication (GSM) network, a mobile can be used to implement a smart home by controlling devices and getting alerts on intrusion, burglary and robbery (Abhishek and Amol, 2012).Traditional household security systems often require installation and detect based on opening of doors and windows. The increasing number of the stealing and house breaking cases especially when the people are not at home need a system that can call or  tell owner if anyone has attempted or trying to break into their home. Therefore the idea of a smart home system was proposed, to overcome the limitations of the systems already available in the market.  Hence the GSM-Based Home Intrusion Detection Device is a security device that sends a text message to the owner’s mobile number in case of home intrusion. This is to warn and notify the owner of an impending attack. It is useful when the owner is outside the house, or even when asleep. It is pre-programmed to store the owner’s mobile number in which the device would send a text message notifying the receiver of an intrusion. The device uses a GSM modem which requires a subscriber identification module (SIM) card to send text messages. The device is to be placed adjacent to possible entries of intrusion, such as doors and windows. The device is activated once the door or window is opened and it automatically sends a text message which is also pre-programmed. The user can choose the number of sensors, types of sensors, the area of coverage of the systems along with the number space. The goal of the project is to implement a smart home system by controlling the electronic devices at home remotely with the help of a mobile device and getting alerts on intrusion or movement around the restricted premises. The SIM900-GPRS module and the microcontroller are used to communicate between the mobile phone and the devices and sensors installed at home. The mobile phone can be used as controller from anywhere in the world if the GSM network is available. In addition, three sensors are used as a heat detector, motion detector and intrusion detector which trigger the alarm upon reaching the critical limit. The GSM alert system is limited to the area with the GSM network available. The alert system works without the GSM network.

1.2     Statement of the Research

In offices, residential building and industries, the potential for intrusion and thieve is always there. This could be carried out by close associate or stranger. However intrusion, burglary and thief has been a big challenge prompting engineers to develop a system called “intruder detecting system” helping to reduce intrusion thieve. In modern technology advanced system had been developed to improve the standard of intruder detection / protection system called (IDPS). The system will not only detect intruder by sensing their motion or presence, but also alert the occupant of the building and immediate neighborhood of intrusion through SMS and alarm system.

1.3     Objectives of the study

The main objective of this work is to design and construct a GSM-based intruder loop detector system

1.4     Significance  of the study

The following are the specific objectives of the study:
i.  Create a device that triggers whenever the home security is bridged
ii.  Use GSM technology in sending notifications to the user’s mobile number notifying him of a possible intruder to home.

1.5     Scope and Limitations of the Study

This project will focus on providing intruder detection and alarm system for individuals and industries.
However, there would be possibility for expansion to cover other areas like laboratories, offices, bank vault and restricted areas like high tension voltage areas as well as radioactive areas.

1.6     Definition of Key Concepts

The key concepts associated with intruder loop detection system are:
i.   Intrusion: is an illegal act of entering, seizing, or taking possession of another's property.
ii.  Intrusion detection system: is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a management station.
iii.  Alert or Alarm: is a signal suggesting that a system has been or is being compromised.
iv.  Attacker or Intruder:


CHAPTER TWO: The chapter one of this work has been displayed above. The complete chapter two of "design and construction of gsm based intruder detector system" is also available. Order full work to download. Chapter two of "design and construction of gsm based intruder detector system" consists of the literature review. In this chapter all the related work on "design and construction of gsm based intruder detector system" was reviewed.

CHAPTER THREE: The complete chapter three of "design and construction of gsm based intruder detector system" is available. Order full work to download. Chapter three of "design and construction of gsm based intruder detector system" consists of the methodology. In this chapter all the method used in carrying out this work was discussed.

CHAPTER FOUR: The complete chapter four of "design and construction of gsm based intruder detector system" is available. Order full work to download. Chapter four of "design and construction of gsm based intruder detector system" consists of all the test conducted during the work and the result gotten after the whole work

CHAPTER FIVE: The complete chapter five of "design and construction of gsm based intruder detector system" is available. Order full work to download. Chapter five of "design and construction of gsm based intruder detector system" consist of conclusion, recommendation and references.

 

CLICK HERE FOR MORE RELATED TOPICS/MATERIAL


To "DOWNLOAD" the complete material on this particular topic above click "HERE"

Do you want our Bank Accounts? please click HERE

To view other related topics click HERE

To "SUMMIT" new topic(s), develop a new topic OR you did not see your topic on our site but want to confirm the availiability of your topic click HERE

Do you want us to research your new topic? if yes, click "HERE"

Do you have any question concerning our post/services? click HERE for answers to your questions


For more information contact us through any of the following means:

Mobile No phonelogo:+2348146561114 or +2347015391124 [Mr. Innocent]

Email address emailus:engr4project@gmail.com

Watsapp No whatsapp.html :+2348146561114


COUNTRIES THAT FOUND OUR SERVICES USEFUL

Australia, Botswana, Canada, Europe, Ghana, Ireland, India, Kenya, Liberia, Malaysia, Namibia, New Zealand, Nigeria, Pakistan, Philippines, Singapore, Sierra Leone, South Africa, Uganda, United States, United Kindom, Zambia, Zimbabwe, etc
Support: +234 8146561114 or +2347015391124

Watsapp Nowhatsapp.html
:+2348146561114


E
mail Address emailus:engr4project@gmail.com


FOLLOW / VISIT US VIA:

tweeter instagram.htmlfacebook logomyyoutubelogo.html

Order Full Material(s)
Download Full Material(s)
Bank Accounts

Contact us

Hire a writer

Order/learn construction


View other related topics

Frequently asked questions(FAQ)
View more related topics
Format = microsoft word

Chapters = 1-5 chapters


Price: N3,000.

FOLLOW OR CONTACT US VIA:
facebook logomyyoutubelogo.html