Abstract
In this paper, a distributed real time security system for monitoring and remote control on building and protecting it from unauthorized entering is designed and implemented. This system is based on the transfer of signal in real time when there is a breach and image of an unauthorized person to enter the building to the mobile phone of the person who is responsible for the security of the building. The real time system consists of three main parts, the first one is the computer with an electronic circuit connected via the serial port. The designed electronic circuit contains the Microcontroller for reading sensors connected to ports of the building (G1, G2, and G3) and processing the signals. Also, there is a monitoring camera to capture an image when registering a case of breach. The program in the computer receives signals from the three ports and uses a fixed real time algorithm for scheduling signals and gives them priorities according to the importance of ports, then sends signals to the second part of the system. The second part of the system consists of a server on the Internet which receives signal and image of the breach, stores it in a database system and then transferring it in real time to the third part. The third part consists of several mobile phones to achieve the principle of distribution for this system, each mobile phone will be responsible for a single port in the building, while there is one mobile phone responsible for all ports which belongs to the person who is responsible for the building security. Each mobile phone contains three programs, the first program would receive a signal of the breach and give the alarm, the second program displays picture, and the third program sends a control signal.
Highlights
The applications of real-time provide reaction or response to an external event in a predictable way of its delaying time
Mobile phone can be used in several ranges in which the person who is in somewhere can get a warning message from the mobile phone to inform him about, for example, a slump in the shares, prices of a particular company that gives instructions for the device to enter to the Finance affairs who shall mobile phone instantly open the Web site to deal with stocks on the Web and sell some or all of the shares to reduce the value of the loss, or ask the person from the mobile phone service booking airline tickets and who buys a ticket to travel to a specific region, or ask the person from the Design and Implementation of Distributed Real-time Security System via
The system was practically implemented by sending a signal of the breach and the image successfully to the mobile phone in its real time and the signal has been read and the image has been displayed by the person responsible for the security of the building, a control signal was delivered from the mobile phone and received by the computer for the purpose of control of part of the building
Summary
The applications of real-time provide reaction or response to an external event in a predictable way of its delaying time. The applications of real-time need a high speed computing power, and cover a wide range of tasks with different reliability of time[1 and 8]. Mobile phone can be used in several ranges in which the person who is in somewhere can get a warning message from the mobile phone to inform him about, for example, a slump in the shares, prices of a particular company that gives instructions for the device to enter to the Finance affairs who shall mobile phone instantly open the Web site to deal with stocks on the Web and sell some or all of the shares to reduce the value of the loss, or ask the person from the mobile phone service booking airline tickets and who buys a ticket to travel to a specific region, or ask the person from the Design and Implementation of Distributed Real-time Security System via. There are many buildings vulnerable to looting and theft during the absence of security officials on them without the ability to detect criminals and thwart their attempts and there are many shortcomings in the existing regimes to resist the robbers, especially those experienced or in the weakness of the used systems and their inability to overcome all the means that can be used by thieves, especially those with skills, so this system takes into account all the things that provide the greatest possible protection against this common threat, especially in our local difficult environment
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: AL-Rafidain Journal of Computer Sciences and Mathematics
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.