Uploaded by Mark Justin Antiquera

5DEVELOPMENT OF A MICROCONTROLLER BASED A

advertisement
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/237100217
Developement of a Microcontroller Based Alarm System for Pipeline Vandals
Detection
Article · April 2013
CITATIONS
READS
2
1,866
1 author:
Engr. Dr. Oluwagbemiga Omotayo Shoewu
Lagos State University
167 PUBLICATIONS 755 CITATIONS
SEE PROFILE
All content following this page was uploaded by Engr. Dr. Oluwagbemiga Omotayo Shoewu on 02 July 2018.
The user has requested enhancement of the downloaded file.
Online available since 2013/Apr/27 at www.oricpub.com
© (2013) Copyright ORIC Publications
Journal of Science and Engineering
Vol. 1 (2), 2013, 133-142
ORICPublications
SE Journal
Science and Engineering
www.oricpub.com/journal-of-sci-and-eng
www.oricpub.com
DEVELOPMENT OF A MICROCONTROLLER BASED ALARM
SYSTEM FOR PIPELINE VANDALS DETECTION
O. Shoewu 1, L. A Akinyemi 1, Kola A. Ayanlowo 2, Segun O. Olatinwo 2,3 , N. T. Makanjuola 1
1
Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
2
Department of Computer Science, Moshood Abiola Polytechnic, Abeokuta, Nigeria.
3
Department of Computer Science and Engineering, Ladoke Akintola University of Technology, Ogbomoso, Nigeria.
Received: 02 Apr 2013
Accepted: 11 Apr 2013
Keywords:
Transceiver
Pipelines
Vandals
Microcontroller
Alarm System and Sensors
Abstract
This paper focuses on the design of a microcontroller based alarm system for pipeline
vandals detection. In this paper, a robust advance and fast mechanism of pipeline detection
was adopted for the system design. The design was in modular forms i.e. communication
system (transceiver), microcontroller, power system, simulation of system and all modules
were tested individually and the whole system was tested to perform the required task of
detecting any leakage when the rubber on the pipes is removed which quickly triggers the
microcontroller and thereby alerts the personnel for necessary actions to be taken.
1.
Correspondence:
Segun O. Olatinwo
Department of Computer
Engineering, Moshood Abiola
Polytechnic, Abeokuta, Nigeria.
Department of Computer Science
and Engineering, Ladoke Akintola
University of Technology,
Ogbomoso, Nigeria.
INTRODUCTION
Acts of pipeline vandalism in onshore operations of major
multinational oil prospecting and producing companies, like SPDC and
Chevron have been a major challenge in recent times. The companies
affected took several steps in the past to address this problem; however,
these efforts were not very successful. Hence, the need to design, develop
and install a system that will adequately monitor and report acts of
vandalism and their location for ease of remediation has become necessary;
this is the focus of this work. The existing practice is that all crude and gas
transporting lines are either laid on land surface, buried at a depth of 1.3m
on land or 3m across creek waters. This however, has failed to stop the
vandals from carrying out their nefarious activities, by digging through the
right-of-ways (ROW) of pipelines and damaging them. Scada monitors that
report condition of lines were strategically installed; but the vandals
discovered a way of demobilizing them prior to carrying out their
operations. They simply destroyed these monitors or removed the power
packs because they were installed externally. Fencing of strategic valves
and lines across creeks to limit accessibility of pipeline vandals also failed
as they simply used oxyacetylene flames to cut through the fence and gain
access to the assets. This became more pronounced because there is no
continuous manning or surveillance of the lines. The companies also
introduced the Pipelines and flow lines surveillance program; this approach
was based on the understanding that utilizing community constructive
engagement approach and partnership will stem the acts of vandalism.
All rights reserved. No part of contents of this paper may be reproduced or transmitted in any form or by any
means without the written permission of ORIC Publications, www.oricpub.com.
Journal of Science and Engineering Vol. 1 (2), 2013, 133-142 P a g e | 134
Eight youths were hired from each host community to watch over the company assets within their
locality. Incentives were introduced as rewards at end of year. This system also failed as some of the “bad
eggs” within the groups diverted logistics resources provided to enhance their operation to other uses and
even aided and abetted the acts of vandalism that were being perpetrated.The Federal Government
introduced the Joint task force (JTF) operations, in a bid to curtail the illegal activities of vandals. The
presence of this military outfit worsened the security situation, oil workers, expatriates and their family
became targets of kidnapping for a ransom fee. In an attempt to dislodge these vandals, their activities
gradually snowballed into more criminal acts and several oil workers lost their lives and properties worth
millions of dollars have been lost to their nefarious activities. The new invention, having weighed all
previous options, aims at developing a simple mechatronics system that is capable of performing a spying
function around pipelines at strategic locations where acts of vandalism have been prevalent. The new
system would be capable of collecting and transmitting information to a processing unit via wireless signals.
It would also have the capacity to decode the exact location(s) where vandalism is taking place. This
approach has become an attractive option to pursue, due to the concealed and secret nature of its installation
and operation. What this means is that access to it will be highly limited. Additionally, the device is capable
of sensing light, pressure drops and mechanical breaks in the line as long as there is power supply to the
component units of the system. The device can also be adapted to perform other desired functions as needed
including sounding an audible alarm and shutting down fluid flows automatically. In addition, the device is
compact and concealed in such a way that the vandals cannot easily destroy it. This work is based on the
onshore operations in the oil and gas industry.
1.1 Theory of the System
Several regulations both local and international have been put in place to govern the smooth operation
of the oil and gas industry; in Nigeria for instance, some of these are listed as Oil Pipelines Act, 1965;
Mineral oil (safety) regulations, 1997;Petroleum regulations, 1967; Petroleum Drilling and Production
regulations, 1969; Oil in navigable water Act, 1968; Oil Terminal Dues Act, 1969; Petroleum refining
Regulations, 1974; Federal Environmental Regulations, 1974; Federal Environmental Protection Agency
Act, 1990; National Oil Spill Detection and Response Agency Act, 2006. Ministry of Niger Delta.Acts of
pipeline vandalism attribute to the frequent pipeline fires, accompanying loss of lives and lost profit
opportunities (LPO). According to Johnson (2004) pipeline explosions have killed hundreds of looters,
bystanders and innocent residents. The most recent of these explosions happened at Ilado, Lagos on May,
2006; more than 200 people were incinerated in the pipeline fire that enveloped the area (Balogun et al
2006). Several deaths recorded from pipeline fires in recent times are a few of the horrendous effects of
crude oil theft from oil transport lines, which are a leading cause of oil spills, environmental degradation and
ecological destruction in Nigeria today. Oil spills through pipeline vandalism by idle youths in Nigeria
reached alarming peaks in the last few decades. Poor implementation of memoranda of understanding
(M.O.U) between oil companies and host communities, lack of employment and dilapidating environmental
conditions have all been blamed for this rising trend. (Uwhejevwe-Togbolo 2005). Ojediran and Ndibe
(2005) reported that an average of 35,000 barrels of crude oil is stolen per day in circumstances that threaten
lives, the environment and the ecosystem in general. Apart from the loss of lives and property through
pipeline fires, the long time ecological effects on impacted sites usually degrade the quality of fresh water
sources which serve the domestic water supply needs of most the host communities. Marine creatures are
not spared and increases in water borne diseases are visibly noticeable. The enormous numbers of oil
installations in the Niger Delta region explain their vulnerability to vandalism. Presently, the Niger Delta
region plays host to over 600 oil fields of which 360 fields are onshore while 240 are offshore with over
3000 kilometres of pipelines crisscrossing the region and linking some 275 flow stations to various tank
farms which concurrently serve as export terminals. It is pertinent therefore to note that oil spills resulting
from pipeline vandalism constitute a major challenge to emergency management efforts, despite the
contingency arrangements in place by industry operators. Table1 below shows that for the period 19952005, Shell Petroleum Development Company recorded a total of 2944 oil spill incidents. The data reveals a
noticeable increase from 235 oil spill incidents in 1995 to 330 in 2000. The least number of 224 oil spill
incidents was observed in 2005.
135 | P a g e O. Shoewu , L. A Akinyemi , Kola A. Ayanlowo , Segun O. Olatinwo , N. T. Makanjuola
Table 1. Oil spill data: SPDC1995 -2005
YEAR
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
TOTAL
Source: SNAR, 2005.
NUMBER OF SPILLS
235
326
240
248
320
330
302
262
221
236
224
2944
VOLUME IN BARRELS (bbl)
31,000
39,000
80,000
50,000
20,000
30,000
76,960
19,980
9,916
8,317
11,921
377,194
Below are some pictures showing deliberate acts of vandalism.
Fig. 1 Burning AGGE Manifold North Bank March 2006
Fig. 2 Fire incident at Fusokiri December2000
Fig. 3 Illegal bunkering at Eteo
It is near impossibility to deploy a workforce that will monitor these assets physically on a 24/7 hour
basis considering the fact that we have over 3000km length of pipe network criss-crossing this region. A
better approach will be to use an automated system capable of monitoring activities and alerting a control
station of any act of vandalism.
According to Ajiboye O.E et al (May 2009), in their paper titled “poverty, Niger Delta and the youth
response”, the general impoverishment of the host communities can be linked to the years of perennial
neglect and abuse of the environment. Major operators do not have recognisable reclamation or remediation
programme in place after major oil spills occur. The situation is worsened by a visible show of apathy to the
fate of the environment by successive governments. While the drive is towards increasing the petro-dollars
the country gets from oil, sadly enough, there is no corresponding passion directed towards ensuring
ecological sustainability. This is evident in the way successive administrations have been shifting the
dateline on gas flaring stoppage in oil field operations in Nigeria. The absence of a strong political will and
Journal of Science and Engineering Vol. 1 (2), 2013, 133-142 P a g e | 136
alignment by the legislature and executive has worsened the hope for entrenching an environmentally
friendly legal system that would protect the ecosystem.
2.
MATERIALS AND METHODS
2.1 Component Design – Communication
The design of this device is governed by the principle of radio frequency modulation and demodulation. Through this means communication is established. Messages are sent from one point to another
within the range of the radio frequency coverage. A radio wave travels through the atmosphere or space at
the speed of light (3x108 meters/second). If a radio wave strikes another antenna, a high-frequency current
will be induced that is a replica of the current flowing in the transmitting antenna. Thus, it is possible to
transfer high-frequency electrical energy from one point to another without using cables. The energy in the
receiving antenna is typically only a fraction of the energy delivered to the transmitting antenna. The
transceiver is capable of transmitting and receiving signals across a space in this form. The transceiver unit
has a transmitter with a receiver incorporated in it.
Modulation is the process through which a radio wave transmits information to different points. A radio
frequency can be modulated in various forms. For example, it can be amplitude modulated (AM) or
frequency modulated (FM).
2.1.1 The amplitude modulator
In amplitude modulation, the intelligence or information controls the amplitude of the radio frequency
(RF) signal. It also transmits voice, music, data, or even multimedia information (video). In amplitude
modulation, the RF signal amplitude varies in accordance with the audio frequency (AF) signal. The RF
signal could just as well be amplitude-modulated by a video signal or digital (on-off) data. The figure below
shows a typical circuit for an amplitude modulator.
+V
Vcc
AM
S IGNAL
(CAR RIER+S IDEBAN DS)
INPUT
ANTE NNA
RB1
INFO RMATIO N
RL
OUT
+
T1
+
C4
PNP
+
C2
C1
+
RB2
C3
RE
Fig. 4 The amplitude modulator circuit
2.1.2 The frequency modulator
Frequency modulation (FM) is an alternative to amplitude modulation (AM). Frequency modulation has
some advantages that make it attractive for some commercial broadcasting and two way radio traffic. One
problem with AM is its sensitivity to noise. Lightning, automotive ignition, and sparking electric circuits all
produce radio interference. This interference is spread over a wide frequency range. It is not easy to prevent
such interference from reaching the detector in an AM receiver. An FM receiver can be made to be
insensitive to noise interference. This noise free performance is highly desirable. The principle of frequency
modulation can be explained using the figure below.
+V
Vcc
RFC1
SIGNAL
INPUT
+
C6
C7
+
+
R1
L1
C1
C4
R3
+
Q1
FM OUTPUT
C2
D1
RFC2
+
+
+
R2
R4
C5
C3
Fig. 5 The Frequency modulation circuit
137 | P a g e O. Shoewu , L. A Akinyemi , Kola A. Ayanlowo , Segun O. Olatinwo , N. T. Makanjuola
Transistor Q1 and its associate parts make up a series tuned oscillator. Capacitor C3 and coil L1 have
the greatest effect in determining the frequency of oscillation. Diode D1 is a varicap diode. It is connected in
parallel with C3. This means that as the capacitance of D1 changes, so will the resonant frequency of the
tank circuit. Resistors R1 and R2 form a voltage divider to bias the varicap diode. Some positive voltage is
applied to the cathode of D1. Thus, D1 is in reverse bias. A varicap diode uses its depletion region as the
dielectric. More reverse bias means a wider depletion region and less capacitance. Therefore, as a signal
goes positive, D1 will reduce in capacitance. This will shift the frequency of the oscillator up. A negativegoing signal will reduce the reverse bias across the diode. This will increase the capacitance and shift the
oscillator to some lower frequency. The signal is modulating the frequency of the oscillator. The amplitude
of the modulated frequency is constant. Demodulation is the means by which modulated signals are
recovered. Demodulators are called radio receivers. An AM radio receiver must recover the information
from the modulated signal. This process reverses what happened in the modulator section of the transmitter.
This process is also called detection. A diode and a transistor can be used for AM detection.
The circuit below shall be used to explain the principle of AM detection.
+V
Vcc
AM
S IGNAL
(CAR RIER+S IDEBAN DS)
INPUT
ANTE NNA
RB1
OUT
+
T1
INFO RMATIO N
RL
+
C4
PNP
+
C2
C1
+
RB2
RE
C3
Fig. 6 The amplitude detection circuit
The circuit shown is a common emitter amplifier. Transistor T1 and capacitor C1 form a resonant
circuit to pass the modulated signal (carrier plus sidebands). Capacitor C4 is added to give a low pass filter
action, since the high-frequency carrier and the sidebands are no longer needed after detection. Bi-polar
Junction transistor (BJT) can demodulate signals because they are also nonlinear devices. The base-emitter
junction is a diode. The transistor detector has the advantage of producing gain. This means that the circuit
will produce more information amplitude than the simple diode detector. Detection of FM signal is more
complicated than for AM. Since FM contains several sidebands above and below the carrier, a simple
nonlinear detector will not demodulate the signal. A double- tuned discriminator circuit is required. The
discriminator works by having two resonant points. One is above the carrier frequency, and one is below the
carrier frequency. There are many other FM detector circuits. Some of the more popular ones are the
quadrature detector, the phase-locked-loop detector, and phase-width detector. These circuits are used with
integrated circuits.In the design of this device, the transceiver operates at a frequency of 900MHz. This is
the operating frequency of a GSM phone. The transceiver is a modified GSM phone. Through it a wireless
information exchange can be achieved. The mode of communication here is similar to that of FM but it is
not a broadcast.GSM (Global System for Mobil communication) is a standard wireless communication
system. Its commercial service began in 1991, at the beginning of 1994; there were about 1.3 million
subscribers in the world. GSM is the dominant communication standard in the world today, communicationbase stations are not needed to be set up. The most fundamental service supported by GSM was wireless
phone. Since 2001 this service has been available to us in Nigeria. The potential of the GSM service is
beyond what is known in the country. The system can be adopted to serve designs such as the pipeline
vandalism alert. A GSM system has wide coverage area; the extent of coverage is determined by the
availability of repeating stations to boost the strength of the signal. Wherever there is a GSM signal, a GSM
device like a mobile phone can be reached from any place in the world. In the same vain it can reach any
where, too. This means of communication requires no cable. Space satellites are used to relay signals from
one continent to another or from one very remote place to another. The transceiver which is a GSM device is
a modified Nokia 1100 phone. It is hosted on a network through a SIM module. Every SIM module has an
identification number. Through this identification number it can send and receive data on the local and
global GSM network.
Journal of Science and Engineering Vol. 1 (2), 2013, 133-142 P a g e | 138
2.2 Component Design – Sensors.
The device operates through the use of sensors, which sense a variation in stable operating conditions of
pressure, break or light.
2.2.1
The pressure sensor
Fig. 7 The pressure sensor
The Operation of the Pressure Sensor
The pressure sensor is designed with a normally closed push switch connected in series with a resistor
R1. The output voltage (Vo) at the junction of these two components depends on the state of the switch.
When the switch is not depressed, the contacts are closed. Hence, Vo is 0V. This is the state of the sensor
when the joint of two pipes is opened. When this joint is closed, the switch is in the open contact state, and
the value of Vo is 5V.
The resistor R1 is a pull-up resistor. Its value is determined with respect to the maximum current
sinkable by the microcontroller. The microcontroller can sink a maximum current of 25mA. To reduce the
current drain on the power supply port Ao of the microcontroller is made to sink 0.5mA. Therefore, the
value of R1 is obtained by this equation:
V= IR, R=V/I, R=5/0.5X10-3 , R1=10K
2.2.2
The light sensor
5V
+V
PHOTO
RESISTOR
R3
10k
100mA
TO MICROCONTROLLER
OPTICAL FIBER
NPN
Q1
R2
50K
Fig 8. The light sensor
Fig. 9 The light sensor circuit
The Operation of the Light Sensor
This senses light around the pipe line whenever there is an opening along the pipe. This sensor is a
network of optical fibres and a photo resistor. The optical fibres are to receive and transmit light from source
to the photo resistor. The light sensor is covered with a black rubber to cut out light from the optical fibres.
The optical fibres are laid along the pipe so as to provide proper coverage in a zigzag form. When the rubber
insulation is removed during vandalism, the optical fibres pick up light rays which are transmitted to the
surface of the photo resistor. The photo resistor converts light signals into electrical signals which are sent to
the microcontroller for processing. The optical fibres are channels for transferring light from source to a
point of use. It is used in this project to pick up light and focus it on the surface of a photo resistor. The
photo resistor and the variable resistor R2 convert the light energy to electrical signal. The electrical signal is
then converted to digital signal by the transistor before it gets to the microcontroller. The essence of this
sensor is to detect the presence of light. This will happen when the black rubber sheet covering the pipe is
removed during vandalism. During installation of this sensor, the optical fibres are laid concurrently as
shown below. This pattern of distribution of fibre optics is to enable coverage of the surface of the pipe. The
photo resistor and the 50K variable resistor convert the light energy on the surface of the photo resistor to
electrical energy. The sensitivity of this sensor is determined by the resistance of the variable resistor (R2).
The higher its value the more the sensitivity and light sensor, and vice versa. The output of this connection is
139 | P a g e O. Shoewu , L. A Akinyemi , Kola A. Ayanlowo , Segun O. Olatinwo , N. T. Makanjuola
digitalized by the transistor Q1. The transistor is used as a switch in this mode; and the resistor R3 is to limit
the current to the microcontroller to 0.5mA.
2.2.3
The break sensor
5V
+V
R4-R11
10K
B7
B6
B5
TO MICROCONTROLLER
B4
B3
PIPE
B2
B1
OPTICAL FIBER
B0
Fig. 10 The break sensor
Fig. 11 The break sensor circuit
The Operation of The Break Sensor
This is a network of thin coils connected to the ports of the microcontroller and to the body of the pipe
at the other end. These coils are wrapped around the pipe in a thread like fashion to provide surface cover of
the pipe. When any of these tiny coils is broken, a signal is sent to the microcontroller for interpretation.
These coils are concealed using black rubber insulation over the pipe. This rubber wrapping also protects the
sensors from adverse environmental conditions.
2.3 Component Design – Microcontroller
This is the brain of the system. It is the component responsible for interpretation of signals received
from the various sensors. It is also responsible for information transmission between the system and the base
station unit. This means that it directly controls the functions of the transceiver. The microcontroller in this
system performs the same functions a processor does to a computer system; it governs its operations. The
microcontroller selected for this function is the PIC16F 628A, a product of Microchips. The Functions of the
microcontroller-16F628A include: To turn on the system automatically when power is connected, To
interpret signals, To send an alert signal to the base station, To clear the transceiver’s screen and To relay
audio signals around the pipe to the base station.
2.3.1 The transceiver
This module is capable of sending and receiving signals via wireless communication. The transceiver is
a very important part of the system, and its mode of operation is better explained by the operation of radio
signal transmitter and receiver. The transceiver module transmits and receives signals at a certain frequency.
2.4 Component Design – Power System
S1
REGULATOR
F1
6V
78 L06
IN OUT
5.4V
COM
TO THE DEVICE
T1
50 .0Hz
UTILITY
SUPPLY
C1
+
-22 0/22 0V
10 TO 1
C2
D4
BRIDGE
220/12
VAC
D3
D1
POWER SUPPLY 6v,3A
NPN
R13
Q2
R12
+
MM SZ7V5T1
D2
Fig.12 The power supply
CHARGER
6V
BACK-UP BATTERY
Journal of Science and Engineering Vol. 1 (2), 2013, 133-142 P a g e | 140
10k
78L05
IN OUT
8V
COM
DIAL
PIC 16F628
10k
CLR
470uF
BATTERY
C181 5
NPN
LIGHT
SENSOR
10k
ON
10k
+
+
JOINT SENSOR
MICRCONTROLLER
390
4.000MHZ
NPN
10k
22uF
NPN
22uF
390
C181 5
C181 5
NPN
NPN
390
C181 5
y4
y3
y2
y1
47
ON/OFF
BREAK SENSOR(WEB)
C D E F
8 9 A B
4 5 6 7
0 1 2 3
x1 x2x3 x4
TRANSCEIVER
Fig.13 The power circuit
Base
station
Power
supply
Microcontroller
Light sensor
Transceiver
Break sensor
Pressure sensor
Fig.14 The block diagram of the design of a microcontroller based alarm system for pipeline vandals detection
This is the part that supplies the energy that keeps the device active and running. It has a main power
supply which is sourced from utility supply (PHCN), and a back-up power supply which is sourced from a
battery. Its power consumption is low, 3Watts maximum. The reason for dual power supply is to keep the
device active even when main power supply fails due to erratic power.
Algorithm of the design
1.
2.
3.
4.
5.
6.
7.
stand by the alarm system
Monitor the pipeline
If there is break
Send the break signal or light signal to microcontroller
Microcontroller
If yes, alert the personnel
If No, go to step (2)
141 | P a g e O. Shoewu , L. A Akinyemi , Kola A. Ayanlowo , Segun O. Olatinwo , N. T. Makanjuola
Fig. 15 Flow Chart of the design of a Microcontroller based alarm system for Pipeline Vandals Detection
3. SYSTEM SIMULATION
3.1 Computer Simulation of the Alarm System
Under normal operating conditions (when there is no pressure drop, break or exposure of optical fibres
to light rays), the digital signal to the microcontroller is 00000000. The zeros are eight because the sensor is
an eight bit system. Whenever the microcontroller senses a different digital input, it reads it as a break in one
of the coils which also means a break in the pipe. The 10K resistors are to limit the maximum current into
the microcontroller to 0.5mA.All the signals from the sensors are received and processed by the
microcontroller. The processing of the signals is controlled by a written program that is downloaded into the
controller. These operations of these sensors can best be explained using the control program.
3.2 Simulation of the Pressure Sensors
This can be done by pulling two pipe connections apart. The pressure switch loses contact and sends a
signal for the transceiver to alert the receiving phone. This receiving phone stores the number of each SIM,
on a module, with the pipe number. With this the exact location of the alerting module can be known. The
phone is programmed to alert thrice to compensate for bad network scenarios.
3.3 Simulation of Light Sensors
The light sensors at normal operating condition should be kept in the dark. This condition will not cause
any alert signal to be sent. When the light sensors are exposed to light by removing the protective cladding
over the pipe, an alert signal is sent to the control station. The call rings three times. This means that while
the vandals are trying to get to the pipe by removing the covering over it, the control station gets alerted of
their activity.
3.4 Simulation of the Break Sensors
These sensors can be tested by drilling a hole into the pipe using a hand drilling machine. The drill bit
cuts break sensors, and as a result the alert signal rings three times. This means that when the vandals are
Journal of Science and Engineering Vol. 1 (2), 2013, 133-142 P a g e | 142
trying to bore a hole into the oil pipe, one or more break sensors will be broken by their activity and the
control station would be alerted.
The Audio Spying Function: In order to listen to the conversation of the vandals or their activities, the
transceiver can be called from the control station by dialling its SIM card number .When this is done, voices
around the sensor station can be heard. The spy operation does not reduce the credit balance of the module
transceiver. It is the caller that is charged. This operation could be repeated several times and the same
results will be obtained. This confirms the consistency and proper functionality of the device.
4.
TESTING AND RESULTS
The various tests were carried out on the different modules and striking results were obtained for
different circuit diagrams.
5.
CONCLUSION
The various ways of designing of security gadgets from analog to digital circuit was used in this paper.
However, various components were designed and tested to ensure it did meet the specification of the users
by warding off or alerting the personnel when things go wrong in the pipelines.
REFERENCES
[1] Abubakar, S. (2006). Pipeline vandalism caused fuel shortages at northern depots. Weekly Trust
(Abuja), 7–13 October
[2] Abdulkadir, B. M (2009). NSCDC Urges Security Networking Against Vandalism [online]. Available at
www.guardian.co.uk [accessed 6 August 2009]
[3] Adeniyi, O. (2007). Playing with fire (1). Thisday (Lagos), 18 January.
[4] Ahmed, O. S. (2007). Nigeria, oil terrorism and pipeline safety [online]. Available at guardian.co.uk
[accessed 23 October 2006].
[5] Akintola, T. (2006). Pipeline vandalism and oil scooping in the Niger Delta and Others [online].
Available at vanguardngr.com [accessed 21 October 2006].
[6] Ali, A. (2006). Pipeline sabotage in Nigeria and oil pollution damage out of context [online]. Available
at ipec.utulsa.edu/conf/2008/…/Eyo_Essien [accessed 21 October 2006].
[7] Alimeka, C. (2001). Poverty, social exclusion and social dislocation in Nigeria. Paper presented at the
National Conference on Law and Poverty in Nigeria, Kaduna.
[8] Amanze-Nwachukwu, C. and Ogbu, A. (2007). Kupolokun cries over pipeline vandalism. Thisday
(Lagos), 15 January.
[9] Brume, F. (2006). Oil pipeline vandalism in the Niger Delta: the way out [online]. Available at
guardian.uk.co [accessed 21 October 2006].
[10]Helen, Y. (2007). Sharpening the strategic focus of livelihoods programming in the Darfur region. A
report at the Darfur Peace conference.
[11]Lex de Waal, (2007). War in Darfur and the search for peace. Cambridge press.
[12]Manze-Nwachukwu, C. (2007). Boxing Day tragedy: it is time for solution. Thisday (Lagos), 2 January.
[13]Nelles, W. (2003). Comparative education, terrorism and human security: from critical pedagogy to
peace building. New York: Palgrave Macmillan.
[14]Nelson-Smith (1973). Oil pollution and marine ecology. Cambridge press.
[15]United Nations Development Programme (UNDP) 1994. Human Development Report. New York:
Oxford University Press.
[16]Victor, A. Y. (2009). NNPC, Police Connive With Pipeline Vandals – Nupeng. Available at
www.guardian.co.uk
[17]Wall Street Journal (2008). Pipeline vandalism, Hillsborough, U.S.
[18]White, J. (1998). Who is responsible for the oil explosion in Nigeria [online]. Available at
www.guardian.co.uk [accessed 21 October 2006].
Please cite this article as: O. Shoewu , L. A Akinyemi , Kola A. Ayanlowo , Segun O. Olatinwo , N. T. Makanjuola, (2013), Development Of A
Microcontroller Based Alarm System For Pipeline Vandals Detection, Journal of Science and Engineering, Vol. 1(2), 133-142.
View publication stats
Download