Downloads provided by UsageCounts
Perimeter intrusion detection systems are an integral part of most physical security systems. Perimeter fencing is widely used to isolate and protect public and private places such as airports, military bases, power stations and security related applications. Fence structures merely prevent a percentage of intrusions or postpone them. A higher level of security needed to monitor and investigate activities on or around the university. Perimeter Intrusion Detection System (PID) focusing on the fence intrusions. The system used major components as Arduino board, 8x8 LED display, ultrasonic sensor, 16x2 LCD display module and speaker. The unauthorized person who tries to intrude the university would be sensed, detected and alarm would generate a signal that an intruder was trying to enter the university. The sound level depended on the distance, the nearer the intruder and stronger would be the alarm signal. PID system displayed the distance of the object or personal found in its region on the LCD display. This system was very useful for security applications. Ultrasonic sensor would be searching if there was a motion in its range.
Aurdino UNO, 16x2 LCD, 8x8 LED Matrix, HC-SR04 Ultrasonic Sensor, Speaker
Aurdino UNO, 16x2 LCD, 8x8 LED Matrix, HC-SR04 Ultrasonic Sensor, Speaker
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 7 | |
| downloads | 14 |

Views provided by UsageCounts
Downloads provided by UsageCounts