Real Time Hybrid Detective Security System Using GSM Technology
Downloads
Keywords:
Fire alarm, Gas leakage, Human Intrusion, Microcontroller, SMS (Short Message Service)Abstract
Security has become an important issue everywhere and it is becoming necessary nowadays as the possibilities of intrusion are increasing day by day. Safety from theft, ritual killing like badoo in Lagos state Nigeria, as well as October 20th demonstration that was hijack by hoodlum in Nigeria, leaking of raw gas, Human intrusion and fire disaster are the most important requirements of home security system for people. A traditional security system gives the signals in terms of alarm for notification. However, the GSM (Global System for Mobile communications) based security systems provides enhanced security as whenever a signal from sensor occurs from integrated fire alarm system, gas leakage system and human intrusion system, a text message is sent to a desired number(s) to take necessary actions. This research employs a method for Real time intrusion detective security system for fire, gas, and human intrusion, where signal is send through SMS with the application of GSM Technology (sim548c) in line with Atmega644p microcontroller, sensors, relays and buzzers.
Downloads
References
The-History-of-Home-Security 4th July 2010 [Online]. Available: http://ezinearticles.com.
V. Karri and J. S. Daniel Lim, "Method and Device to Communicate via SMS After a Security Intrusion", 1st International Confe-rence on Sensing Technology, Palmerston North, New Zealand, (2005) November 21- 23.
Y. Zhao and Z. Ye, "Low cost GSM/GPRS BASED wireless home security system", IEEE Trans. Consumer Electron, vol. 56, no. 4, (2007) January, pp. 546-567.
https://doi.org/10.1109/TCE.2008.4560131
Z. Bing, G. Yunhung, L. Bo, Z. Guangwei and T. Tian, "Home Video Security Surveillance", Info-Tech and Infonet, 2001,Proceedings,ICII 2001-Beijing. 2001 International Conference, vol. 3, pp. 202-208.
M. Meyer, M. Hotter and T. Ohmacht, "A new system for Video-based Detection of moving objects and its integration into digital networks", Security Technology 1996, 30th Annual 1996 International Carnahan Conference, (1996), pp. 105-110.
Mae , Y,; Sasao , N .; INNoue ,K. ; Arai,T.; "Person Detection by Mobile Manipulator for Monitoring",SICE 2003 Annual Conference, pages-2801-2806.
"SMS Based Wireless Global Range Automation & Security System", Sudipan Saha, Sutasom Bhaumik.
"Analysis and Performance of a Low Cost SMS Based Home Security System", Sheikh Izzal Azid, Sushil Kumar, International Journal of Smart Home, vol. 5, no. 3, (2011) July.
Smart Home Automation: GSM Security System Design & Implementation. Isa and N. Slaves*Computer Engineering & Informatics Department, University of Patras, Greece Received 30 June 2015; Accepted 15 January 2016
IoT Based Smart Security and Home Automation SystemRavi Kishore Kodali, Vishal Jain, Suvadeep Bose and Lakshmi Boppana Department of Electronics and Communications Engineering National Institute of Technology, Warangal
J Bangali, A. Shaligram, "Design and Implementation of Security Systems for Smart Home based on GSM Technology", International Journal of Smart Home, vol. 7, no. 6, pp. 201-208, November 2013.
https://doi.org/10.14257/ijsh.2013.7.6.19
H Huang, S Xiao, X Meng, Y. Xiong, "A Remote Home Security System Based on Wireless Sensor Network and GSM Technology", Proceedings of Second International Conference on Networks Security Wireless Communications and Trusted Computing, pp. 535-538, 2010.
https://doi.org/10.1109/NSWCTC.2010.132
PMCid:PMC3138070
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 Ebole Alpha Friday
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
License Terms
Ownership and Licensing:
Authors of this research paper submitted to the journal owned and operated by The Science Brigade Group retain the copyright of their work while granting the journal certain rights. Authors maintain ownership of the copyright and have granted the journal a right of first publication. Simultaneously, authors agreed to license their research papers under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License.
License Permissions:
Under the CC BY-NC-SA 4.0 License, others are permitted to share and adapt the work, as long as proper attribution is given to the authors and acknowledgement is made of the initial publication in the Journal. This license allows for the broad dissemination and utilization of research papers.
Additional Distribution Arrangements:
Authors are free to enter into separate contractual arrangements for the non-exclusive distribution of the journal's published version of the work. This may include posting the work to institutional repositories, publishing it in journals or books, or other forms of dissemination. In such cases, authors are requested to acknowledge the initial publication of the work in this Journal.
Online Posting:
Authors are encouraged to share their work online, including in institutional repositories, disciplinary repositories, or on their personal websites. This permission applies both prior to and during the submission process to the Journal. Online sharing enhances the visibility and accessibility of the research papers.
Responsibility and Liability:
Authors are responsible for ensuring that their research papers do not infringe upon the copyright, privacy, or other rights of any third party. The Science Brigade Publishers disclaim any liability or responsibility for any copyright infringement or violation of third-party rights in the research papers.
Plaudit
License Terms
Ownership and Licensing:
Authors of this research paper submitted to the Journal of Science & Technology retain the copyright of their work while granting the journal certain rights. Authors maintain ownership of the copyright and have granted the journal a right of first publication. Simultaneously, authors agreed to license their research papers under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License.
License Permissions:
Under the CC BY-NC-SA 4.0 License, others are permitted to share and adapt the work, as long as proper attribution is given to the authors and acknowledgement is made of the initial publication in the Journal of Science & Technology. This license allows for the broad dissemination and utilization of research papers.
Additional Distribution Arrangements:
Authors are free to enter into separate contractual arrangements for the non-exclusive distribution of the journal's published version of the work. This may include posting the work to institutional repositories, publishing it in journals or books, or other forms of dissemination. In such cases, authors are requested to acknowledge the initial publication of the work in the Journal of Science & Technology.
Online Posting:
Authors are encouraged to share their work online, including in institutional repositories, disciplinary repositories, or on their personal websites. This permission applies both prior to and during the submission process to the Journal of Science & Technology. Online sharing enhances the visibility and accessibility of the research papers.
Responsibility and Liability:
Authors are responsible for ensuring that their research papers do not infringe upon the copyright, privacy, or other rights of any third party. The Journal of Science & Technology and The Science Brigade Publishers disclaim any liability or responsibility for any copyright infringement or violation of third-party rights in the research papers.