Contact Us

For Marketing, Sales and Subscriptions Inquiries
Rockefeller Center, 45 Rockefeller Plaza
20th Flr Unit #5, New York, NY 10111
United States

Conference List

Review of Computer Engineering Research

June 2021, Volume 8, 1, pp 14-26

Detection of Crossed Walls Security Alarm System against Invasion

Muhammad Ahmad Baballe

Muhammad Ahmad Baballe 1

  1. Department of Computer Engineering Technology, School of Technology, Kano State Polytechnic, Kano, Nigeria. 1

on Google Scholar
on PubMed

Pages: 14-26

DOI: 10.18488/journal.76.2021.81.14.26

Share :

Article History:

Received: 26 May, 2021
Revised: 28 June, 2021
Accepted: 23 July, 2021
Published: 01 September, 2021


A security detection system was developed to secure any of the walls that were crossed. These walls are the north, east, south and, west wall. These walls are designed to be in a square environment, each of these walls has a Light Emitting Diode (LED) that functions as a transmitter and a Light Dependent Resistor (LDR) that function as a Receiver. A closed-circuit television (CCTV) was used to capture the real-time video of any of the crossed walls. A Liquid Crystal Display (LCD) was used to display the status of these walls and display the name of the crossed walls. A magnetic buzzer is also used to alert the security personnel after a system has displayed the name of the crossed wall on the LCD. A Microcontroller (PIC16F877A) is used as the brain of the developed security system. The Personal Computer (PC) is also used to display the system status through personal computer Parallel Port, to display the real-time video captured by the CCTV camera, saving the video on personal computer hard drive, and to control the developed system from the personal computer (PC) such as activating, deactivating and resetting the developed system. With the aid of the latest development in technology nowadays, it is possible to secure the properties and people’s lives using a security detection system that will monitor, guide, and protect the environments that need to be secure against burglars and abductors.
Contribution/ Originality
It is to create awareness of the security alarm system and to prevent intrusion and abduction.


Graphical user interface, PIC16F877A, LCD, CCTV, Security detection system, Break-in, Abduction.



Google Scholor ideas Microsoft Academic Search bing Google Scholor


This study received no specific financial support.

Competing Interests:

The author declares that there are no conflicts of interests regarding the publication of this paper.


Related Article

( 1 ) Exploring Internet of Thing on PCA Algorithm for Optimization of Facial Detection and Tracking
( 2 ) Detection and Prevention of Phishing Attack Using Linkguard Algorithm
( 3 ) Classification Ensemble Based Anomaly Detection in Network Traffic
( 4 ) Smart Feature Fusion and Model for Human Detection
( 5 ) Detection of Crossed Walls Security Alarm System against Invasion
( 6 ) Two-Stage Model with Rough Cluster and Salp Optimization Technique for Epistasis Detection
( 9 ) Security Issues with Contactless Bank Cards
( 10 ) Big Data in Homeland Security
( 11 ) Analysis of Suitable Security Protocols for Apply a Model of Identity in the Civil Registry of Ecuador
( 12 ) A Security Scheme for Protecting Agent Societies
( 13 ) Security Threats and Privacy Issues in Vehicular Ad-Hoc Network (VANET): Survey and Perspective
( 14 ) Identification of Privacy and Security Risks of Internet of Things: An Empirical Investigation
( 15 ) Cloud Security Vulnerabilities and Solution Model
( 18 ) A Study on Commensal Mortality Rate of a Typical Three Species Syn-Eco-System with Unlimited Resources for Commensal
( 19 ) Investigation on the Dependence of TCP Upstream Throughput on Snr for Single and Multiple Links in a Wlan System
( 20 ) RLS Fixed-Lag Smoother Using Covariance Information Based on Innovation Approach in Linear Continuous Stochastic Systems
( 21 ) Enhanced Isolation Mimo Antenna with DGS Structures for Long Term Evolution Systems
( 22 ) High Isolation Microstrip Mimo Antennas for Wlan Systems
( 23 ) Selection of Appropriate Equipment for Designing Effective Vacuum System
( 24 ) FPGA Implementation of MC-CDMA Wireless Communication System Based on SDR-A Review
( 25 ) Fault Tolerance in Real Time Distributed System
( 26 ) Creation of Algoritms for Recommendation System Based on Users Data on Internet Advertisement Marketing