1.
0 Introduction:
   This chapter dealt with the background study of the project, the motivation and purpose of
   the project were highlighted leading to the statement of the problem and the aim and
   objectives, the scope of the work and significant justification.
1.1 Background of Study
   Security system are gaining increase importance in recent times to protect life and valuable
   resources, many advanced method of providing security have been developed and are in use
   in the last few decades. One important area is the security system required for
   military/strategic applications as stated by the ACPO {Association of chief police officers
   2002}, which has advanced greatly. Such systems being complex and expensive are useful
   to high end application only. However with recent progress in technology and the growing
   need for increased security in civilian and other applications, many low cost solutions
   security system have now emerged. In the field of the Burglar Alarm Systems using modern
   approaches has become a major means of providing security in all applications, both
   military and civilian.
   Due to high state of insecurity being experienced in the entire world the need to keep the
   occupants of the office aware of any intrusion in to their premises, as quoted that” alarms
   without the burglars put strain on police budget”(butterfield , f .2003)
   In the civilian circle, security systems are required for both life and property protection.
   Properties such as goods in warehouse required protection from theft and robbery. These
   demand that one form or the other of an intrusion detection system be installed in the
   warehouse. The purpose of the development of the office grown simple intrusion detection
   system that meets the same needs as commercial available system (barazini R 2002.
   Reduction of theft and false alarm a system approach).
   To effectively select a security system, the first thing that has to be considered is the fact
   that one has something valuable to protect that is worth the expense and time necessary to
   plan, build and install an electronic alarm system at all cost. Most people today in homes,
   companies and working places, have valuable materials such as goods and services that
   need to be adequately protected for accurate management and efficient productivity.
   (Morris, 2012).
1.2 Statement of the Problem
   Erisco food company has been experiencing a lot of losses in their business, due to theft in
   the warehouse,
   Items such as manufactured and finished goods such as cartons of tomato paste, bags of rice
   and several gallons of groundout oil has over the years be found missing which makes the
   company suffer a great deal of loss which may be caused by their internal employees and
   external consumers in the locality. The company have tried using the physical security
   system which has not alleviated the problem or offer a lasting solution and hence the
   introduction of an electronic means, such as the intrusion detection system was proposed.
1.3 Aim and Objective
   The aim of this project is to design and implement an intrusion detection system for Erisco
   food limited, okigwe.
   The objective are:
    a) To design and construct an electronic based intrusion detection system for Erisco food
        company limited.
    b) To dectect the presence of an intruder in erisco company warehouse after working
        hours.
    c) To ensure the safety of erisco food company warehouse and stored goods.
    d) To prevent illegal and unauthorized access to erisco company premise.
1.4 Scope of the study
   An intrusion detection system connects all peripheral equipment, such as detectors, sirens
   and control units.
   To analyze threat and raises alarm in the event of danger, the circuit helps safeguard the
   companies manufactured and stored goods from intruders or theft, all that is needed is to
   place the circuit inside the warehouse at closing hours, when any unknown person walk
   over the motion sensors the circuit will trigger the alarm and the sound of the alarm comes
   up, the main benefit of this system is that this can be implied in different places at a time as
   two different switches produces two different sound.
1.5 Justification/significance of study
      a) To Regulate entry and exit in the company premises at a given period of time.
      b) To specify at what point goods were taken and kept.
      c) To keep adequate record of minimum and maximum sales of goods per working day
          and record of products produced per day.
      d) To enable the occupant to give accurate account of goods produced and delivered.
      e) To keep security personnel alert of any unauthorized entry and exit in the company
          after working hours.
2.0   Introduction:
      This chapter emphasizes on the overview of an already existing knowledge on intrusion
      detection systems, it focuses on summarizing, analyzing and evaluating the relevant
      survey and study on intrusion detection systems leading to the design implementation
      general statement of erisco foods company limited and the review of the related literature
      study
2.1   Literature review
      Intrusion detection system the latest state-of-the art company security systems have many
      features that make our lives easier, from keyless door locks to the ability to arm your
      alarm from your cell phone. While these features are relatively new, the need to protect
      one’s company from intruders is not. It may surprise one to learn that intrusion detection
      systems have been around in one form or another for hundreds of years, and that the
      modern Electronic alarm system was invented in 1853. Even alarm monitoring has been
      around for over a century! Today, we take quick look at the history of electronic alarms
      to help one better appreciate the technology we have today.
      Electronic alarm systems are nothing new. In one historical document from 386 B.C. it
      was noted that a distinguished officer was alerted to danger by the flapping wings of
      cackling geese. Over the years, dogs and other livestock helped protect homes against
      intruders, and homeowners relied on neighbors or their own family members to keep their
      belongings and homes safe.
      In the 18th century, an English inventor created an intrusion alert that played chimes
      when a skeleton key or another device was used to open a door. This let homeowners
      know that someone was attempting to bypass their lock. Obviously, it had its limitations.
      Fortunately, electricity came along in the 19th century, opening the door to new options
      in burglar alarms.
      Electricity Added to security Alarms
      In 1853, the burglar alarm was patented by Reverend Augustus Russell Pope of
      Somerville, Massachusetts. This unit operated off a battery, and required an individual
unit for each window or door. A few years later, Edwin Holmes bought the patent from
Pope. Holmes is credited with actually manufacturing a device that was available for
purchase. People were skeptical about using electricity for alarms, so the business didn’t
go well. It wasn’t until Holmes started marketing his product in New York City that
things took off for him. He built a network of alarms which were monitored by a central
station.
Once he established the system in New York, he sent his son back to Boston to copy it.
Instead of building a separate cable system like his dad did in NYC, Holmes’ son tapped
into the existing phone lines. This let him build a system connected to 700 homes. His
dad then quickly copied this in NYC. Holmes, who was president of Bell Phone
Company, kept the rights to use the phone lines for his alarm when he sold his interests in
the phone company. As electricity became more accepted in the form of streetlights,
people began accepting electrical burglar alarms. The growth of the phone system also
contributed to the growth of the industry.
Electronic intrusion detection system in the Twentieth Century and Beyond
In 1905, The American Telephone and Telegraph Company (AT&T, as it is known
today) bought the Holmes’ business. They began linking the system to emergency call
systems to alert the police and fire to emergencies. In the twentieth century, many
modifications were made to the burglar alarm. After World War II, the technology
advanced even more. More people saw the benefits of being connected to emergency
personnel.
In the 1970s, motion sensors and infrared technology improved the capability of burglar
alarms, but there were still many false positives until the 80s, when engineers were able
to advance the system even further. Burglar alarms became standard in building security,
and the technology became more affordable for homes.
2.2 Intrusion Detection System
      An Intrusion Detection System (IDS) is a monitoring system that detects suspicious
     activities and generates alerts when they are detected. Based upon these alerts, a security
     operations center (SOC) analyst or incident responder can investigate the issue and take
     the appropriate actions to remediate the threat to alert the owner of the property of the
     warehouse.
     According to (www.WIKIPEDIA.com) an intrusion detection system (IDS; also intrusion
     prevention system or IPS) is a device or software application that monitors a network or
     systems for malicious activity or policy violations. Any intrusion activity or violation is
     typically reported either to an administrator.
     According to (Ben Lutkevich 2009) an intrusion detection system (IDS) is a system that
     monitors the presence of intrusion for suspicious activity and alerts when such activity is
     discovered.
     Furthermore an Intrusion Detection System is a hardware nand software programmable
     device used for monitoring a premises and protecting it from an intruder. With the rapid
     progress in the internet based technology new application areas for computer network
     have emerged. In instances, the fields like business, financial, industry, security and
     healthcare sectors the electronic systems have progressed. All of these applications are
     attractive target for the abuse and a big vulnerability for company security services. Other
     intrusion application in networks for instance burglars use organization’s internal systems
     to collect information’s and cause vulnerabilities like Software bugs, Lapse in
     administration,. As the internet emerging into the society, new stuffs like viruses and
     worms are imported. The malignant so, the users use different techniques like cracking of
     password, detecting unencrypted text are used to cause vulnerabilities to the system.
     Hence, security is needed for the users to secure their system from the intruders. Firewall
     technique is one of the popular protection techniques and it is used to protect the private
     network from the public network. IDS are used in network related activities, medical
     applications, credit card frauds, Insurance agency
2.2 Design
       To Design means to create a plan or sketch of something that is going to be made later,
       especially a plan that details what the finished thing will do and look like. A design is the
       plan or sketch created as a result of this activity. It deals with the design methods and
       then analysis employed in the design of the intrusion detection system, The analysis is
       divided into modules namely :
          The Power supply unit
          The Processor unit
          The Software Design
2.2.1 Design of the Power Supply Unit
       The power supply unit performs the function of converting an AC source to a DC power
       which is needed to power the circuit. A miniature 12V power source adapter was
       incorporated into the design to power the different segments of the system.
2.2.2 Design of the Processor Unit
        The design of the processor unit was achieved using adriuno nano microcontroller. The
       processor unit takes care of taking the signals from the sensors and activating the alarm
       and display to show the point of intrusion or the place where the intruder is thereby
       making it easy for the intruder to be caught. The Processor unit controls the overall
       function of the system since it takes the signals from the sensor inputs and determines the
       necessary action to take by showing the zone of intrusion of the intruder or thief and also
       directing the security operative in apprehending the criminal by giving away the position
       of the criminal, The processor unit was programmed to achieve the desired system
       result.
2.2.3 The Software Design
        This is the written program that contains the bearer’s intension. The screen displays the
       content of this program. With particular reference to this project, the essence of this
       program is to control the transmitting and receiving signals at a particular time,
        Hence with the program properly implemented, the detection system would send the
       signal accurately. The software/firmware development was executed in the following
       phases:
       a. Writing of the source code Is C++ language.
    b. Compiling the source code using SDCC compiler.
    c. Programming the Adriuno microcontroller with the output hex file
    from the compiler using ISP flash program.
                                                                   (F.i.g 2.2 Design Diagrm)
2.3 Implementation
    Implementation is the execution or practice of a plan, a method or any design, idea,
    model, specification, standard or policy for doing something. As such, implementation is
    the action that must follow any preliminary thinking for something to actually happen.
    For this project, the ultrasonic motion detector alarm system based on an Arduino nano
    was created. All of the components along with many more are available in Arduino nano
    was implemented, The system has the following features: ultra sonic motion sensor to
    detect movement in the proximity of the device. to show alarm state and show input one
    relay module is activated to arm and disarm the system.- Alarm siren horn with audible
    alert from an active buzzer and visual alert via a red LED- System power indicator with a
    green LED.
    We undertook this project to gain more experience to coding embedded projects that
    require the use of state c++ source code, The sensors must be capable of sending input
    signals, the module must refresh and the LED indicator must switch off and on all
    without blocking.
    When the device is powered it is initialized in the disarmed state. A presence is detected
    by the sensors which sends information to the programmed chip/ indicates the state of the
    system and allows the user to see the input of the membrane keypad. When armed, the
    devise polls the output from the PIR sensor to detect movement and triggers the alarm,
2.4 Erisco foods company limited
   Erisco Foods limited, is an indigenous foods product manufacturer incorporated in Nigeria
   in 2004 and started operation in 2009, we are firmly committed to producing high-quality
   products that combine nourishment with value pricing. As they strive to become one of
   Nigerians largest indigenous food manufacturers on a global scale. Behind every Erisco
   food product is a team of people committed to creating safe products of the highest quality.
   People understand that food is a source of nourishment and satisfaction, but also pleasure,
   health, happiness and peace of mind. They are increasingly aware that their food and
   beverage choices can impact their quality of life and affect the lives of others.
   Innovation has been at the heart of the company since its beginning striving to make the
   products tastier and healthier choices that help consumers care for themselves and their
   families.
   Behind every one food product there is a team of scientists, engineers, nutritionists,
   designers, regulatory specialists and consumer care representatives dedicated to earn their
   consumers’ trust with safe products of the highest quality. in terms of convenience, health
   or pleasure, erisco foods company are able and committed to create trustworthy products,
   systems and services that contribute to improving the quality of consumers lives. To
   become one of the largest indigenous manufacturers of food products globally producing
   high-quality products that combine nourishment with value pricing.
2.5 Review of Related Literature
     This is a detailed review of existing literature relating to intrusion detection of a thesis or
     dissertation, we talked about the security alarm as a system designed to detect intrusion,
     such as unauthorized entry, into a building or other areas such as a home or school.
     Security alarms used in residential, commercial, and industrial facilities protect against
     burglary (theft) or property damage, as well as personal protection against intruders.
     Security alerts in neighborhoods show a connection with diminished robbery. Modern
     intrusion detection system have been the best help when it comes to protection of Goods
     and Environment from unauthorized personnel and this describe the importance of
     electronic alarm security systems.
3.0    Introduction:
       This chapter dealt with the material and components required to design the system and
       the basic methodology adapted while designing the intrusion detection system
3.1 Material Requirement:
       The material requirement or material used in this project are
  a)   Adriuno nano micro controller
  b)   Ultrasonic motion sensor
  c)   Alarm siren system
  d)   One relay module
  e)   Dc to DC bulk converter
  f)   12v DC power supply system
3.1.1 Adriuno Nano Microcontroller
       An Arduino nano microcontroller is an open-source platform used for building
       electronics projects. Arduino consists of both a physical programmable circuit board
       (often referred to as a microcontroller) and a piece of software, or IDE (Integrated
       Development Environment) that runs on computers, used to write and upload computer
       code to the physical board. widely used in robotics, embedded systems, automation,
       Internet of Things(IoT) and electronics projects. These boards were initially introduced
       for the students and non-technical users but nowadays for industrial projects.
       The Micro controller was programmed with a subset of C/C++ source code
       (Fig 3.1.1) Adruino Nano Microcontroller
3.1.2 Ultrasonic Motion Sensor
     An ultrasonic motion detector or sensor is a device that can detect movement of people or
     objects within a limited area, it sense motion by analyzing sound waves in its
     environment send ultrasonic signals and how they are relayed back
     In carrying out this project an ultrasonic motion detection sensor was programmed to the
     adriuno nano as the receiver to detect the movement of objects generating sound waves in
     the ultrasonic frequency range around 30 to 50 khz, it uses a transducer to send and
     receive impulses that relay back information about the objects proximity
               (Fig 3.1.2) Ultrasonic Motion Sensor.
3.1.3 Alarm Siren Horn
     An Alarm siren horn is a loud noise making device it works by having two states. armed
     and disarmed , the alarm sirens are activated if the system is a armed and a movement
     detector is triggered.
     In this project the alarm siren was used as noise making device, when the ultrasonic
     sensor senses a movement and transmit the signal to the relay it triggers the alarm siren
     horn to signal an alarm and the presence of an intruder
                                  (Fig 3.1.3) Alarm Siren Horn
3.1.4 One Relay Module
    The relay module is used to control high voltage through the adriuno which runs on 5v,
    because the adriuno nano cannot directly control high voltage,
    In this project the relay as an electromagnetic device a wire coil that becomes temporary
    magnet when electricity is passed through, it is turned on with a relatively small current
    turning or powering the alarm system with a much larger current.
                                            (Fig 3.1.4) One Relay Module
3.1.5 DC to DC Bulk Converter
    The buck converter uses a transistor as a switch that alternately connects and disconnects
    the input voltage meaning that it will take the current and pass it through a switching
    element this turns the signal into a wave usually AC the wave then passes through
    another filter which turns it back to a dc signal of the appropriate voltage.
    It was connected directly to the power supply to enable efficient transmission of DC in
    the project.
                                                        (Fig 3.1.5) DC to DC bulk converter
3.1.6 12v Power Source
      This is a higher output processor voltage regulator that converts electric current from the
      source to the correct voltage current and frequency to power the load.
      In this project a 12v power source was used to pass current directly from the source to the
      project.
                                         (Fig 3.1.6 12V Power Source)
3.2   Methodology
      This is the prototyping of the system, a model of the system was built
      Introduction:
This chapter deals with the construction, testing, results and discussion of the
performance of the electronic alarm system
Construction
 The construction of the project was done in three different stages. Which are testing on a
breadboard, soldering on the Vero board and casing for the entire constructed work.
Bread Boarding
This is where the preliminary implementation of the project was done. Each of the
various components in the system was tested separately on a bread board before being
transferred to the Main board.
Main Board
The final construction of the sytem was coupled on the main boards. Integrated circuit
sockets were used for ease of troubleshooting and parts replacement.
Results and Discussion
During the construction of this project, testing was carried out at different stages to
determine if the result obtained at each stage met the desired specifications. After the
design and implementation phase, the system built has to be tested for Durability,
Efficiency, and Effectiveness and also ascertain if there is need to modify this design.
The system was first assembled using a breadboard. All components were properly
inserted into the breadboard from whence some tests were carried out at various stages.
To ensure proper functioning of components’ expected data, the components were tested
using a digital multimeter (DMM). Resistors were tested to ensure that they were within
the tolerance value. Faulty resistors were discarded .The LM7805 voltage regulator was
also tested, the resulting output was 4.99v which is just a deviation of 0.01v from the
expected result of 5.00v. The system was powered and operated upon using several
possibilities. They include triggering more than one alarm at the same time and noting the
output responses of the system hardware. The system displayed the corresponding point
of intrusion and buzzer came on each time there were intrusion. The completely coupled
system performed well displaying the correct location of intrusion and movement and
This goes to show that the use of adriuno nano microcontroller in designing effectively
reduces the number of components and also make for active control of device and
components using program code
Conclusion
The ideal security system is yet to be designed so far. In this project an attempt has been
made to come up with a cheap but effective security system for Erisco foods company ltd
The software developed to run the microcontrollers run according to the specifications
proved to be very effective as a security system.
Despite all the odds and difficulties encountered in regard to resource availability all the
project objectives were ache
There was also an attempt to provide possible designs possible to implement this project,
The design type chosen here was mainly to deal with the standard for Erisco foods
company LTD. To secure large warehouses this type of design needs to be 'improved.
This could be done by use of addressed sensors that would be sending information to
control unit instead of use of polling the sensors. This would enable many sensors to be
connected to the microcontroller thus resulting in a stable complex system that cover
large warehouses, building and factories which would include other features such as fire
alarm. employee clocking in and out, Chemical gas warning and much more. The design
here is conclusive but needs a lot of improvement and development for larger facilities
and system indicating that there is still huge room for future development. As the need of
more secure and complex system keeps on growing there is need in depth research and
development to keep up with the needs of consumers
Recommendations
 Alarm systems are installed in buildings to protect people and assets. When an alarm has
been triggered, a response to the alarm is needed. Normally, a security guard is sent to the
location where the alarm went off to check the premises and try to find the cause of the
alarm. If the security at the location has been breached, caused by for example a burglary
or a fire, a fast response may limit the potential damages and loss of assets. This project
has basic steps taken in the design and construction of burglary alarm system in an
electrical/ electronic workshop, Institution, Houses, etc these places which are well
equipped, model for students of electrical/electronics to enhance and impact in them
adequate knowledge on the various electrical devices and components. Again, different
electronics components were studied under this condition like Resistor, Transistor,
Capacitor, Rectifier, Led etc. their functions, properties and types even Transformer volts
was used as the project makes use of a lot of electronic devices.
Conceptual diagram of the complete Equipment