Intrusion Detection Notification via SMS
Poster created by Moboluwaduro Adebajo (c)

Intrusion Detection Notification via SMS

Detection of unauthorised users to digital assets was automated using a newly designed electronic circuit. The work was tested using the Short Message Service (SMS) for informing the asset owner or gatekeeper when an intrusion occurs. The circuit relies on sensors to inform the circuit of breaches. A telephone number is pre-programmed into the mobile phone component of the circuit to send out a pre-worded message.

Intrusion detection is a breach of protocol(s) and boundaries to access resources that are not freely available or that have economic value. There are several methods that have been implemented to do this. Artificial Intelligence algorithms are the current trend to detect and prevent intrusions. Computer networks and resources need to be used but inappropriate use stopped.

Completed circuitry for Intrusion Detection System


The image above refers to a paper targeted at physical intrusion detection using a communication system to ensure prompt notification. The work can be found at https://www.ijetae.com/files/Volume9Issue7/IJETAE_0719_13.pdf

要查看或添加评论,请登录

Seyi Osunade的更多文章

  • Celebrating a Teacher of Professors

    Celebrating a Teacher of Professors

    On Monday 24 March 2025, we gathered to honor Dr Adejoke Olamiti, a distinguished member of our academic community, as…

    6 条评论
  • A Tribute to Professor Iya Abubakar @90

    A Tribute to Professor Iya Abubakar @90

    Prof Iya Abubakar, we celebrate you on this occasion of your birthday. Sir, your intellectual capacity has made you an…

    1 条评论
  • Online Testing and Assessment Solutions

    Online Testing and Assessment Solutions

    Recent reports indicate that the Nigerian government plans to transition WAEC and NECO examinations to a fully…

  • Repeating Undergraduate Project Topics

    Repeating Undergraduate Project Topics

    In my years of project supervision at the undergraduate level, I have had cause to serve as external examiner to some…

  • Academics and Use of the Internet

    Academics and Use of the Internet

    This descriptive study on the use of the internet and its services by academics based in Africa showed that…

  • Research Topic Generation

    Research Topic Generation

    I am a researcher, teacher and community developer. As a researcher, part of my duties is to write publications for…

  • Impact Assessment of the UI e-bulletin

    Impact Assessment of the UI e-bulletin

    E-newsletters are regularly scheduled emails sent by a person or business to a list of subscribers. In the context of…

  • Yoruba Mobile App Development

    Yoruba Mobile App Development

    Developing a localised mobile application for indigenous information sharing is a fantastic initiative that can empower…

  • A Vision Statement for Leading a Tertiary Institution

    A Vision Statement for Leading a Tertiary Institution

    I have always been interested in leading organisations and people either as a servant leader or as a leader-on-demand…

  • Configuration Management using Mobile Agents

    Configuration Management using Mobile Agents

    Configuration management (CM) is a crucial aspect of IT operations, ensuring systems and applications are consistently…

社区洞察

其他会员也浏览了