+234 813 0686 500
+234 809 3423 853
info@grossarchive.com

DISIGN AND CONSTRUCTION OF ALERT DETECTION SYSTEM

  • Type:Project
  • Pages:23
  • Format:Microsoft Word
(Computer Engineering Project Topics & Materials)

ABSTRACT

 

In The development of ways to reduce malpractices in examination centers in all educational institutions is an important area of research. One of the major problems discovered aiding malpractices has been the creation of mobile phones, which however is a good communication device but needs to be curtailed during examinations. In order to have a 100% assurance that no student can cheat with his or her mobile phone a mobile detector system with a frequency jamming feature was developed using mobile cell phone detection techniques of measuring a cell phone's electromagnetic properties, determining an identifiable signature, measuring the RF spectrum and meeting the jamming requirements. 


 

 

DISIGN AND CONSTRUCTION OF ALERT DETECTION SYSTEM

Share This

Details

Type Project
Department Computer Engineering
Project ID CPE0050
Price ₦3,000 ($20)
No of Pages 23 Pages
Format Microsoft Word

500
Leave a comment...

    Details

    Type Project
    Department Computer Engineering
    Project ID CPE0050
    Price ₦3,000 ($20)
    No of Pages 23 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT This project is aimed at developing an alert system which notifies shop owners and managers of products/inventory which are about to expire. Faced with the challenges shop owners face with loses and health hazards brought about by expired products, the researcher aimed at developing a product/Inventory Expiration system that manages... Continue Reading
    ABSTRACT The necessity of a low cost electronic home security system designed in co-ordination with other security measures is always there in our society to reduce the risk of home intrusion. Keeping this problem in mind, we are working on a project on automatic... Continue Reading
    ABSTRACT A prepaid meter monitoring system with SMS alert is designed simulated and constructed using microcontroller to achieve a unique transmission of SMS messages to designated mobile phone numbers. The work is a response to the need to checkmate commercial energy losses in utility electrical distribution system. The system utilizes a normally... Continue Reading
    ABSTRACT The necessity of a low cost electronic home security system designed in co-ordination with other security measures is always there in our society to reduce the risk of home intrusion. Keeping this problem in mind, we are working on a project on automatic... Continue Reading
    ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and... Continue Reading
    ABSTRACT Gas is supplied in pressurized steel cylinders. As this gas is heavier than air, when it leaks from the cylinder it flows along floor and tends to settle in low spots such as a basement to cause fire or suffocation if not dealt with. To handle gas leak situations, this project presents the... Continue Reading
    CHAPTER ONE INTRODUCTION Introduction An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity and alert the system or network administrator. In some cases the IDS may also respond to anomalous or malicious traffic by taking action such blocking the user or source IP address from accessing the network. IDS... Continue Reading
    ABSTRACT Face recognition and detection is one of the most important fields of the modern applications.  Face recognition system uses two sub-systems named face detection system and image database system.  Face recognition can be of feature based and image based.  Feature based method uses features like skin color, eyes, nose and mouth to... Continue Reading
    ABSTRACT Handwriting recognition is the ability of a computer to receive and interpret intelligible handwritten input from sources such as paper documents, photographs, touch-screens and other devices. The image of the written text may be sensed 'off line' from a piece of paper by optical scanning (optical character recognition) or intelligent... Continue Reading
    ABSTRACT As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and... Continue Reading