EconPapers    
Economics at your fingertips  
 

Detection of Crossed Walls Security Alarm System against Invasion

Muhammad Ahmad Baballe ()

Review of Computer Engineering Research, 2021, vol. 8, issue 1, 14-26

Abstract: A security detection system was developed to secure any of the walls that were crossed. These walls are the north, east, south and, west wall. These walls are designed to be in a square environment, each of these walls has a Light Emitting Diode (LED) that functions as a transmitter and a Light Dependent Resistor (LDR) that function as a Receiver. A closed-circuit television (CCTV) was used to capture the real-time video of any of the crossed walls. A Liquid Crystal Display (LCD) was used to display the status of these walls and display the name of the crossed walls. A magnetic buzzer is also used to alert the security personnel after a system has displayed the name of the crossed wall on the LCD. A Microcontroller (PIC16F877A) is used as the brain of the developed security system. The Personal Computer (PC) is also used to display the system status through personal computer Parallel Port, to display the real-time video captured by the CCTV camera, saving the video on personal computer hard drive, and to control the developed system from the personal computer (PC) such as activating, deactivating and resetting the developed system. With the aid of the latest development in technology nowadays, it is possible to secure the properties and people’s lives using a security detection system that will monitor, guide, and protect the environments that need to be secure against burglars and abductors.

Keywords: Graphical user interface; PIC16F877A; LCD; CCTV; Security detection system; Break-in; Abduction (search for similar items in EconPapers)
Date: 2021
References: Add references at CitEc
Citations:

Downloads: (external link)
https://archive.conscientiabeam.com/index.php/76/article/view/1485/2073 (application/pdf)
https://archive.conscientiabeam.com/index.php/76/article/view/1485/4797 (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:pkp:rocere:v:8:y:2021:i:1:p:14-26:id:1485

Access Statistics for this article

More articles in Review of Computer Engineering Research from Conscientia Beam
Bibliographic data for series maintained by Dim Michael ().

 
Page updated 2025-03-19
Handle: RePEc:pkp:rocere:v:8:y:2021:i:1:p:14-26:id:1485