Papers by Dr. Adamu Murtala Zungeru

The Anti–Collision device is a detection device meant to be incorporated into cars for the purpos... more The Anti–Collision device is a detection device meant to be incorporated into cars for the purpose of safety. As opposed to the anti–collision devices present in the market today, this system is not designed to control the vehicle. Instead, it serves as an alert in the face of imminent collision. The device is intended to find a way to implement a minimum spacing for cars in traffic in an affordable way. It would also achieve safety
for the passengers of a moving car. The device is made up of an infrared transmitter and receiver. Also incorporated into it is an audio visual alarm to work in with the receiver and effectively alert the driver and/or the passengers. To achieve this design, 555 timers coupled both as astable and monostable circuits were used along with a 38 KHz Square – Pulse generator. The device works by sending out streams of infrared radiation and when these rays are seen by the other equipped vehicle, both are meant to take the necessary precaution to avert a collision. The device would still sound an alarm even though it is not
receiving infrared beams from the oncoming vehicle. This is due to reflection of its own infrared beams. At the end of the design and testing process, overall system was implemented with a constructed work, tested working and perfectly functional.

Sophistications in theft and other criminal damages necessitates for the symbiotic blending of te... more Sophistications in theft and other criminal damages necessitates for the symbiotic blending of technology with security needs. In this research, electronic switches in the form of sensors were used to implement a point-to point intrusive monitoring system for the detection of an unauthorized access to commercial and residential buildings. The system is a simple and reliable security system and uses switch sensor technology to revolutionize the standards of living. The system is also simple, adaptable and cost-effective. It is designed in six major units which include; the power supply, the input/sensor micro-switches, the monitoring and indicator, the timing, the tone generation and output units. To ensure steady power supply in the circuit, the power unit constitutes both the mains and DC supplies. The alarm unit are being activated by the normally closed sensor micro-switches unit which is connected in an electronic/door mat at both the entrance and exit of buildings. In order to facilitate easy location of the intruder, the exact point of intrusion is being determined by the monitoring and indicator unit which constitutes the quad R/S flip-flop IC and LED’s. The timing/tone generation unit is built on the 555 timer IC, in the Astable mode, which output keeps changing as far as there is a breakage of the sensors. The output of the system is mainly the LEDs and buzzer, which gives electrical light and audio signal to notify the owner of an intruder in the building. Major design issues considered include; efficiency, portability, cost-effectiveness, durability, compatibility as well as the availability of required materials. This system works on the principle of the micro-switch sensor and dependent on the condition that an intruder entered through the door and stepped in any one of the switches under the mat. Verification and validation of the system indicate compliances to design specification hence the output requirements were met.

Social insect communities are formed from simple, autonomous, and cooperative organisms that are ... more Social insect communities are formed from simple, autonomous, and cooperative organisms that are interdependent for their survival. These communities are able to effectively coordinate themselves to achieve global objectives despite a lack of centralized planning. This chapter presents a study of artificial insect algorithms for routing in wireless sensor networks, with a specific focus on simulating termites and their behaviours in their colony. The simulating behaviour demonstrates how the termites make use of an autocatalytic behaviour in order to collectively find a solution for a posed problem in reasonable time. The derived algorithm termed Termite-Hill demonstrates the principle of the termite behavior for solving the routing problem in wireless sensor networks. The performance of the algorithm was tested on static and dynamic sink scenarios. The results were compared with other routing algorithms with varying network density and showed that the proposed algorithm is scalable and improved on network energy consumption with a control over best-effort service.
In this paper, various performance equations are derived from phasor diagrams of a three phase no... more In this paper, various performance equations are derived from phasor diagrams of a three phase non-salient pole (cylindrical rotor) synchronous generator of known armature resistance and of ignored armature resistance for lagging, unity and leading power factor load. These equations are used to calculate the output parameters of non-synchronous generator and to plot the graphs of terminal voltage-armature current, torque angle-armature current, torque angle-terminal voltage, power-torque angle and torque-speed characteristics through simulation by MATLAB program for the purpose of illustration.

Access control systems restrict access to a secured premise or other secured devices (like a safe... more Access control systems restrict access to a secured premise or other secured devices (like a safe) only to
authorized persons. In this design a biometric (fingerprint based) access control system was developed with
added versatility: remotely Adding/Removing users and monitoring the system’s operation via a GSM Phone.
The administrator phone sends SMS commands to the system to put it in the desired operating modes (as
security situations arise) and to add/remove users of the premise; thus, the system can work both independently
and as dictated by the administrator. The main components are a Fingerprint Module, a GSM/GPRS modem, the
door & its control circuitry, and an AT89C52 microcontroller. The microcontroller polls the SMS received by
the GSM modem, interprets it to puts the system in the desired mode, sends appropriate SCAN/DELETE/ADD
command to the fingerprint scanner, opens/closes the door at each access request by any user (registered or not)
based on the present system mode and command it receives from the scanner. The microcontroller’s code is
written in ASSEMBLY language using KEIL MICRO-VISION3 emulator/debugger. At completion, the system
quite responded in the four set modes: it adds/deletes user fingerprints appropriately, shuts-off when instructed,
opens/closes the door when a registered fingerprint is recognized, displays messages appropriately on the LCD
screen and receives/sends the appropriate SMS to the Administrator’s phone.
This research is on the design and construction of a generator shutdown timer; an electronic devi... more This research is on the design and construction of a generator shutdown timer; an electronic device that
automatically turns off electric generator after a specified period of duty hours. A microcontroller Atmega8 is
used, which makes the entire circuitry compact, more flexible, efficient and reliable. The microcontroller
program is written in C programming language using AVR studio4 and the circuit simulation using Proteus. This
circuitry does not only control the timing operation of electric generators, but also possesses the ability to sense
power restoration (from the utility power supply) and respond by switching off the generator. Power handling
capacity of the circuit is estimated to be 1760W.

The research provides a security system that achieves automatic object sensing detection at a giv... more The research provides a security system that achieves automatic object sensing detection at a given radius range
from the security system. This system provides an automatic detection of intrusion into a restricted property. An
ultrasonic range sensor and a stepper motor are interfaced with a microcontroller. The range sensor is mounted
on top of a stepper motor which rotates about its axis continuously, and emits a burst of energy until reflected off
of an object. When the range sensor senses an object, the angle of the stepper motor at the instance of object
detection is recorded by the microcontroller and displayed on a Liquid Crystal Display (LCD) along with the
object distance. Because of the rotational motion of the sensing system, it can be concluded that this system is
quite different in its approach to security issues as compared to similar ones that which are just stationed in a
fixed point and meant to detect obstacle or intrusion from a particular direction.

Wireless sensor nodes are usually deployed in not easily accessible places to provide solution to... more Wireless sensor nodes are usually deployed in not easily accessible places to provide solution to a wide
range of application such as environmental, medical and structural monitoring. They are spatially
distributed and as a result are usually powered from batteries. Due to the limitation in providing power
with batteries, which must be manually replaced when they are depleted, and location constraints in
wireless sensor network causes a major setback on performance and lifetime of WSNs. This difficulty in
battery replacement and cost led to a growing interest in energy harvesting. The current practice in energy
harvesting for sensor networks is based on practical and simulation approach. The evaluation and
validation of the WSN systems is mostly done using simulation and practical implementation. Simulation is
widely used especially for its great advantage in evaluating network systems. Its disadvantages such as the
long time taken to simulate and not being economical as it implements data without proper analysis of all
that is involved ,wasting useful resources cannot be ignored. In most times, the energy scavenged is directly
wired to the sensor nodes. We, therefore, argue that simulation – based and practical implementation of
WSN energy harvesting system should be further strengthened through mathematical analysis and design
procedures. In this work, we designed and modeled the energy harvesting system for wireless sensor nodes
based on the input and output parameters of the energy sources and sensor nodes. We also introduced the
use of supercapacitor as buffer and intermittent source for the sensor node. The model was further tested in
a Matlab environment, and found to yield a very good approach for system design.

This research work is developed with two AT89C52 microcontrollers from Atmel. The microcontroller... more This research work is developed with two AT89C52 microcontrollers from Atmel. The microcontrollers
provide all the functionality of the display notices and wireless control. The Display is obtained on a 7X96
Light Emitting Diode (LED) dot matrix display, arranged on a Vero board. A desired text message from a
mobile phone is sent via a Global System for Mobile Communication (GSM) to the GSM module located at
the receiving end. The GSM modem is connected, through MAX 232 Integrated Circuit (MAX 32 IC), to the
AT89C52 microcontroller. The message that is stored in the Electrically Erasable Programmable Read
Only Memory (EEPROM) is then displayed on the LED dot matrix display. This hardware uses regulated
5V, 500mA power supply. A three-terminal LM7805 is employed for regulation of the voltage. A bridge
type full-wave rectifier is used to rectify the AC output of the secondary of 230/12V step down transformer.
The system was tested to work according to specification.

Journal of Network and Computer …, Nov 1, 2012
A wireless sensor network (WSN) is a large collection of sensor nodes with limited power supply, ... more A wireless sensor network (WSN) is a large collection of sensor nodes with limited power supply, constrained memory capacity, processing capability, and available bandwidth. The main problem in event gathering in wireless sensor networks is the formation of energy-holes or hot spots near the sink. Due to the restricted communication range and high network density, events forwarding in sensor networks is very challenging, and require multi-hop data forwarding. Improving network lifetime and network reliability are the main factors to consider in the research associated with WSN. In static wireless sensor networks, sensors nodes close to the sink node run out of energy much faster than nodes in other parts of the monitored area. The nodes near the sink are more likely to use up their energy because they have to forward all the traffic generated by the nodes farther away to the sink. The uneven energy consumption results in network partitioning and limit the network lifetime. To this end, we propose an on-demand and multipath routing algorithm that utilizes the behavior of real termites on hill building termed Termite-hill which support sink mobility. The main objective of our proposed algorithm is to efficiently relay all the traffic destined for the sink, and also balance the network energy. The performance of our proposed algorithm was tested on static, dynamic and mobile sink scenarios with varying speed, and compared with other state-of-the-art routing algorithms in WSN. The results of our extensive experiments on Routing Modeling Application Simulation Environment (RMASE) demonstrated that our proposed routing algorithm was able to balance the network traffic load, and prolong the network lifetime.

Journal of Network and Computer …, Mar 20, 2012
High efficient routing is an important issue for the design of wireless sensor network (WSN) prot... more High efficient routing is an important issue for the design of wireless sensor network (WSN) protocols to meet the severe hardware and resource constraints. This paper presents a comprehensive survey and comparison of routing protocols in WSNs. The first part of the paper surveys state-of-the-art routing protocols in WSNs from classical routing protocols to swarm intelligence based protocols. The routing protocols are categorized based on their computational complexity, network structure, energy efficiency and path establishment. The second part of the paper presents a comparison of a representative number of classical and swarm based protocols. Comparing routing protocols in WSNs is currently a very challenging task for protocol designers. Often, much time is required to re-create and re-simulate algorithms from descriptions in published papers to perform the comparison. Compounding the difficulty is that some simulation parameters and performance metrics may not be mentioned. We see a need in the research community to have standard simulation and performance metrics for comparing different protocols. To this end, the final part of the paper re-simulates different protocols using a Matlab based simulator: routing modeling application simulation environment (RMASE), and gives simulation results for standard simulation and performance metrics which we hope will serve as a benchmark for future comparisons for the research community.

SIMULATION, Nov 21, 2012
The current practice in modeling and simulation of wireless sensor network (WSN) environments is ... more The current practice in modeling and simulation of wireless sensor network (WSN) environments is to develop functional WSN systems for event gathering and optimize the necessary performance metric using heuristics and intuition. The evaluation and validation of the WSN system is mostly done using simulation approaches and practical implementations. Simulation studies, despite their wide use and merits for network systems and algorithms validation, have some drawbacks such as long simulation times, and some results reported by several prominent protocols cannot be repeated and are inconsistent. We, therefore, argue that simulation-based validation of WSN systems and environments should be further strengthened through mathematical analysis. To this end, we developed our modeling framework based on energy consumption for WSN topology and information extraction in a grid-based and line-based, randomly distributed sensor network. We strengthen the work with a model of the mobility impact on routing energy consumption by deriving the expected energy consumption of an agent-based reactive routing protocol for a WSN system as a function of packet arrival rate and topology change rate, using a termite hill routing algorithm. The results of our mathematical analysis were also compared with the simulation results."

Hindawi Publishing Corporation, Feb 24, 2013
The main problem for event gathering in wireless sensor networks (WSNs) is the restricted communi... more The main problem for event gathering in wireless sensor networks (WSNs) is the restricted communication range for each node. Due to the restricted communication range and high network density, event forwarding in WSNs is very challenging and requires multihop data forwarding. Currently, the energy-efficient ant based routing (EEABR) algorithm, based on the ant colony optimization (ACO) metaheuristic, is one of the state-of-the-art energy-aware routing protocols. In this paper, we propose three improvements to the EEABR algorithm to further improve its energy efficiency. The improvements to the original EEABR are based on the following: (1) a new scheme to intelligently initialize the routing tables giving priority to neighboring nodes that simultaneously could be the destination, (2) intelligent update of routing tables in case of a node or link failure, and (3) reducing the flooding ability of ants for congestion control. The energy efficiency improvements are significant particularly for dynamic routing environments. Experimental results using the RMASE simulation environment show that the proposed method increases the energy efficiency by up to 9% and 64% in converge-cast and target-tracking scenarios, respectively, over the original EEABR without incurring a significant increase in complexity. The method is also compared and found to also outperform other swarm-based routing protocols such as sensor-driven and cost-aware ant routing (SC) and Beesensor.

Termites present a good natural metaphor to evolutionary computation. While each individual’s com... more Termites present a good natural metaphor to evolutionary computation. While each individual’s computational power is small compared to more evolved species, it is the power of their colonies that inspires communication engineers. This paper presents a study of artificial termites in sensor networks for the purpose of solving its’ routing problem. The behaviours of each of the termites in their colony allow their simulation in a restricted environment. The simulating behaviour demonstrates how the termites make use of an autocatalytic behaviour to collectively find a solution for a posed problem in reasonable time. The derived algorithm termed Termite-hill demonstrates the principle of termites’ behavior to routing problem solving in the real applications of sensor networks. The performance of the algorithm was tested on static and dynamic sink scenarios. The results as compared with other routing algorithms and with varying network density show that Termite-hill is scalable and improved on network energy consumption with a control over best-effort-service.

Advances in Swarm Intelligence, Jun 1, 2012
High efficient and energy-aware routing is an important issue for the design of resource constrai... more High efficient and energy-aware routing is an important issue for the design of resource constrained environments like Wireless Sensor Networks (WSNs). Many protocols have been developed for WSN that try to overcome the constraints that characterized this type of networks. Termite based routing protocols can add a significant contribution to assist in the maximization of the network lifetime without performance degradation. But this is only possible by means of an adaptable and balanced algorithm that takes into account the main constraints of WSN. This paper presents a biological inspired self-organized routing protocol for WSN which is based on termite colony optimization metaheuristic termed Termite-hill. The main objective of the proposed algorithm is to efficiently relay all the traffic destined for the sink, and also balance the network energy. The results of our extensive experiments on Routing Modeling Application Simulation Environment (RMASE) demonstrated that with sink mobility, our proposed routing algorithm was able to balance the network traffic load and prolong the network lifetime without performance degradation.

… and Information Science, Oct 1, 2011
In routing protocols, sensor nodes tend to route events (images) captured to a particular destina... more In routing protocols, sensor nodes tend to route events (images) captured to a particular destination (sink) using the most efficient path. The power and bandwidth required to transmit video data from hundreds of cameras to a central location for processing at a high success rate would be enormous. In this work, captured packets were routed from different sensors placed at different locations to the sink using the best path. Since the captured images (packets) need to be routed to the destination (sink) at regular interval and within a predefined period of time, while consuming low energy without performance degradation, Ant based routing which utilizes the behavior of real ants searching for food through pheromone deposition, while dealing with problems that need to find paths to goals, through the simulating behavior of ant colony is adopted. In this end, we present an Improved Energy-Efficient Ant- Based Routing (IEEABR) Algorithm in Visual Sensor Networks. Compared to the state-of-the-art Ant-Based routing protocols; Basic Ant-Based Routing (BABR) Algorithm, Sensor-driven and Cost-aware ant routing (SC), Flooded Forward ant routing (FF), Flooded Piggybacked ant routing (FP), and Energy- Efficient Ant-Based Routing (EEABR), the proposed IEEABR approach have advantages of reduced energy usage, delivering events packets at high success rate with low latency, increases the network lifetime, and actively performing its set target without performance degradation. The performance evaluations for the algorithms on a real application are conducted in a well known WSNs MATLAB-based simulator (RMASE) using both static and dynamic scenario.

High efficient routing is an important issue in the design of limited energy resource Wireless Se... more High efficient routing is an important issue in the design of limited energy resource Wireless Sensor Networks (WSNs). Due to the characteristic of the environment at which the sensor node is to operate, coupled with severe resources; on-board energy, transmission power, processing capability, and storage limitations, prompt for careful resource management and new routing protocol so as to counteract the differences and challenges. To this end, we present an Improved Energy-Efficient Ant-Based Routing (IEEABR) Algorithm in wireless sensor networks. Compared to the state-of-the-art Ant-Based routing protocols; Basic Ant-Based Routing (BABR) Algorithm, Sensor-driven and Cost-aware ant routing (SC), Flooded Forward ant routing (FF), Flooded Piggybacked ant routing (FP), and Energy-Efficient Ant-Based Routing (EEABR), the proposed IEEABR approach has advantages in terms of reduced energy usage which can effectively balance the WSN node's power consumption, and high energy efficiency. The performance evaluations for the algorithms on a real application are conducted in a well known WSN MATLAB-based simulator (RMASE) using both static and dynamic scenario.
… Sensor Networks and …, Nov 1, 2011
... Networks (pages 1-13). Seema Ansari (Karachi Institute of Economics and Technology, Pakistan)... more ... Networks (pages 1-13). Seema Ansari (Karachi Institute of Economics and Technology, Pakistan), Syeda Fariha Hasnain (Karachi ... Sciences, Pakistan), Waseem Shahzad (National University of Computer and Emerging Sciences, Pakistan), and Farrukh Aslam Khan (National ...
Uploads
Papers by Dr. Adamu Murtala Zungeru
for the passengers of a moving car. The device is made up of an infrared transmitter and receiver. Also incorporated into it is an audio visual alarm to work in with the receiver and effectively alert the driver and/or the passengers. To achieve this design, 555 timers coupled both as astable and monostable circuits were used along with a 38 KHz Square – Pulse generator. The device works by sending out streams of infrared radiation and when these rays are seen by the other equipped vehicle, both are meant to take the necessary precaution to avert a collision. The device would still sound an alarm even though it is not
receiving infrared beams from the oncoming vehicle. This is due to reflection of its own infrared beams. At the end of the design and testing process, overall system was implemented with a constructed work, tested working and perfectly functional.
authorized persons. In this design a biometric (fingerprint based) access control system was developed with
added versatility: remotely Adding/Removing users and monitoring the system’s operation via a GSM Phone.
The administrator phone sends SMS commands to the system to put it in the desired operating modes (as
security situations arise) and to add/remove users of the premise; thus, the system can work both independently
and as dictated by the administrator. The main components are a Fingerprint Module, a GSM/GPRS modem, the
door & its control circuitry, and an AT89C52 microcontroller. The microcontroller polls the SMS received by
the GSM modem, interprets it to puts the system in the desired mode, sends appropriate SCAN/DELETE/ADD
command to the fingerprint scanner, opens/closes the door at each access request by any user (registered or not)
based on the present system mode and command it receives from the scanner. The microcontroller’s code is
written in ASSEMBLY language using KEIL MICRO-VISION3 emulator/debugger. At completion, the system
quite responded in the four set modes: it adds/deletes user fingerprints appropriately, shuts-off when instructed,
opens/closes the door when a registered fingerprint is recognized, displays messages appropriately on the LCD
screen and receives/sends the appropriate SMS to the Administrator’s phone.
automatically turns off electric generator after a specified period of duty hours. A microcontroller Atmega8 is
used, which makes the entire circuitry compact, more flexible, efficient and reliable. The microcontroller
program is written in C programming language using AVR studio4 and the circuit simulation using Proteus. This
circuitry does not only control the timing operation of electric generators, but also possesses the ability to sense
power restoration (from the utility power supply) and respond by switching off the generator. Power handling
capacity of the circuit is estimated to be 1760W.
from the security system. This system provides an automatic detection of intrusion into a restricted property. An
ultrasonic range sensor and a stepper motor are interfaced with a microcontroller. The range sensor is mounted
on top of a stepper motor which rotates about its axis continuously, and emits a burst of energy until reflected off
of an object. When the range sensor senses an object, the angle of the stepper motor at the instance of object
detection is recorded by the microcontroller and displayed on a Liquid Crystal Display (LCD) along with the
object distance. Because of the rotational motion of the sensing system, it can be concluded that this system is
quite different in its approach to security issues as compared to similar ones that which are just stationed in a
fixed point and meant to detect obstacle or intrusion from a particular direction.
range of application such as environmental, medical and structural monitoring. They are spatially
distributed and as a result are usually powered from batteries. Due to the limitation in providing power
with batteries, which must be manually replaced when they are depleted, and location constraints in
wireless sensor network causes a major setback on performance and lifetime of WSNs. This difficulty in
battery replacement and cost led to a growing interest in energy harvesting. The current practice in energy
harvesting for sensor networks is based on practical and simulation approach. The evaluation and
validation of the WSN systems is mostly done using simulation and practical implementation. Simulation is
widely used especially for its great advantage in evaluating network systems. Its disadvantages such as the
long time taken to simulate and not being economical as it implements data without proper analysis of all
that is involved ,wasting useful resources cannot be ignored. In most times, the energy scavenged is directly
wired to the sensor nodes. We, therefore, argue that simulation – based and practical implementation of
WSN energy harvesting system should be further strengthened through mathematical analysis and design
procedures. In this work, we designed and modeled the energy harvesting system for wireless sensor nodes
based on the input and output parameters of the energy sources and sensor nodes. We also introduced the
use of supercapacitor as buffer and intermittent source for the sensor node. The model was further tested in
a Matlab environment, and found to yield a very good approach for system design.
provide all the functionality of the display notices and wireless control. The Display is obtained on a 7X96
Light Emitting Diode (LED) dot matrix display, arranged on a Vero board. A desired text message from a
mobile phone is sent via a Global System for Mobile Communication (GSM) to the GSM module located at
the receiving end. The GSM modem is connected, through MAX 232 Integrated Circuit (MAX 32 IC), to the
AT89C52 microcontroller. The message that is stored in the Electrically Erasable Programmable Read
Only Memory (EEPROM) is then displayed on the LED dot matrix display. This hardware uses regulated
5V, 500mA power supply. A three-terminal LM7805 is employed for regulation of the voltage. A bridge
type full-wave rectifier is used to rectify the AC output of the secondary of 230/12V step down transformer.
The system was tested to work according to specification.
for the passengers of a moving car. The device is made up of an infrared transmitter and receiver. Also incorporated into it is an audio visual alarm to work in with the receiver and effectively alert the driver and/or the passengers. To achieve this design, 555 timers coupled both as astable and monostable circuits were used along with a 38 KHz Square – Pulse generator. The device works by sending out streams of infrared radiation and when these rays are seen by the other equipped vehicle, both are meant to take the necessary precaution to avert a collision. The device would still sound an alarm even though it is not
receiving infrared beams from the oncoming vehicle. This is due to reflection of its own infrared beams. At the end of the design and testing process, overall system was implemented with a constructed work, tested working and perfectly functional.
authorized persons. In this design a biometric (fingerprint based) access control system was developed with
added versatility: remotely Adding/Removing users and monitoring the system’s operation via a GSM Phone.
The administrator phone sends SMS commands to the system to put it in the desired operating modes (as
security situations arise) and to add/remove users of the premise; thus, the system can work both independently
and as dictated by the administrator. The main components are a Fingerprint Module, a GSM/GPRS modem, the
door & its control circuitry, and an AT89C52 microcontroller. The microcontroller polls the SMS received by
the GSM modem, interprets it to puts the system in the desired mode, sends appropriate SCAN/DELETE/ADD
command to the fingerprint scanner, opens/closes the door at each access request by any user (registered or not)
based on the present system mode and command it receives from the scanner. The microcontroller’s code is
written in ASSEMBLY language using KEIL MICRO-VISION3 emulator/debugger. At completion, the system
quite responded in the four set modes: it adds/deletes user fingerprints appropriately, shuts-off when instructed,
opens/closes the door when a registered fingerprint is recognized, displays messages appropriately on the LCD
screen and receives/sends the appropriate SMS to the Administrator’s phone.
automatically turns off electric generator after a specified period of duty hours. A microcontroller Atmega8 is
used, which makes the entire circuitry compact, more flexible, efficient and reliable. The microcontroller
program is written in C programming language using AVR studio4 and the circuit simulation using Proteus. This
circuitry does not only control the timing operation of electric generators, but also possesses the ability to sense
power restoration (from the utility power supply) and respond by switching off the generator. Power handling
capacity of the circuit is estimated to be 1760W.
from the security system. This system provides an automatic detection of intrusion into a restricted property. An
ultrasonic range sensor and a stepper motor are interfaced with a microcontroller. The range sensor is mounted
on top of a stepper motor which rotates about its axis continuously, and emits a burst of energy until reflected off
of an object. When the range sensor senses an object, the angle of the stepper motor at the instance of object
detection is recorded by the microcontroller and displayed on a Liquid Crystal Display (LCD) along with the
object distance. Because of the rotational motion of the sensing system, it can be concluded that this system is
quite different in its approach to security issues as compared to similar ones that which are just stationed in a
fixed point and meant to detect obstacle or intrusion from a particular direction.
range of application such as environmental, medical and structural monitoring. They are spatially
distributed and as a result are usually powered from batteries. Due to the limitation in providing power
with batteries, which must be manually replaced when they are depleted, and location constraints in
wireless sensor network causes a major setback on performance and lifetime of WSNs. This difficulty in
battery replacement and cost led to a growing interest in energy harvesting. The current practice in energy
harvesting for sensor networks is based on practical and simulation approach. The evaluation and
validation of the WSN systems is mostly done using simulation and practical implementation. Simulation is
widely used especially for its great advantage in evaluating network systems. Its disadvantages such as the
long time taken to simulate and not being economical as it implements data without proper analysis of all
that is involved ,wasting useful resources cannot be ignored. In most times, the energy scavenged is directly
wired to the sensor nodes. We, therefore, argue that simulation – based and practical implementation of
WSN energy harvesting system should be further strengthened through mathematical analysis and design
procedures. In this work, we designed and modeled the energy harvesting system for wireless sensor nodes
based on the input and output parameters of the energy sources and sensor nodes. We also introduced the
use of supercapacitor as buffer and intermittent source for the sensor node. The model was further tested in
a Matlab environment, and found to yield a very good approach for system design.
provide all the functionality of the display notices and wireless control. The Display is obtained on a 7X96
Light Emitting Diode (LED) dot matrix display, arranged on a Vero board. A desired text message from a
mobile phone is sent via a Global System for Mobile Communication (GSM) to the GSM module located at
the receiving end. The GSM modem is connected, through MAX 232 Integrated Circuit (MAX 32 IC), to the
AT89C52 microcontroller. The message that is stored in the Electrically Erasable Programmable Read
Only Memory (EEPROM) is then displayed on the LED dot matrix display. This hardware uses regulated
5V, 500mA power supply. A three-terminal LM7805 is employed for regulation of the voltage. A bridge
type full-wave rectifier is used to rectify the AC output of the secondary of 230/12V step down transformer.
The system was tested to work according to specification.