See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/237100217 Developement of a Microcontroller Based Alarm System for Pipeline Vandals Detection Article · April 2013 CITATIONS READS 2 1,866 1 author: Engr. Dr. Oluwagbemiga Omotayo Shoewu Lagos State University 167 PUBLICATIONS 755 CITATIONS SEE PROFILE All content following this page was uploaded by Engr. Dr. Oluwagbemiga Omotayo Shoewu on 02 July 2018. The user has requested enhancement of the downloaded file. Online available since 2013/Apr/27 at www.oricpub.com © (2013) Copyright ORIC Publications Journal of Science and Engineering Vol. 1 (2), 2013, 133-142 ORICPublications SE Journal Science and Engineering www.oricpub.com/journal-of-sci-and-eng www.oricpub.com DEVELOPMENT OF A MICROCONTROLLER BASED ALARM SYSTEM FOR PIPELINE VANDALS DETECTION O. Shoewu 1, L. A Akinyemi 1, Kola A. Ayanlowo 2, Segun O. Olatinwo 2,3 , N. T. Makanjuola 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria. 2 Department of Computer Science, Moshood Abiola Polytechnic, Abeokuta, Nigeria. 3 Department of Computer Science and Engineering, Ladoke Akintola University of Technology, Ogbomoso, Nigeria. Received: 02 Apr 2013 Accepted: 11 Apr 2013 Keywords: Transceiver Pipelines Vandals Microcontroller Alarm System and Sensors Abstract This paper focuses on the design of a microcontroller based alarm system for pipeline vandals detection. In this paper, a robust advance and fast mechanism of pipeline detection was adopted for the system design. The design was in modular forms i.e. communication system (transceiver), microcontroller, power system, simulation of system and all modules were tested individually and the whole system was tested to perform the required task of detecting any leakage when the rubber on the pipes is removed which quickly triggers the microcontroller and thereby alerts the personnel for necessary actions to be taken. 1. Correspondence: Segun O. Olatinwo Department of Computer Engineering, Moshood Abiola Polytechnic, Abeokuta, Nigeria. Department of Computer Science and Engineering, Ladoke Akintola University of Technology, Ogbomoso, Nigeria. INTRODUCTION Acts of pipeline vandalism in onshore operations of major multinational oil prospecting and producing companies, like SPDC and Chevron have been a major challenge in recent times. The companies affected took several steps in the past to address this problem; however, these efforts were not very successful. Hence, the need to design, develop and install a system that will adequately monitor and report acts of vandalism and their location for ease of remediation has become necessary; this is the focus of this work. The existing practice is that all crude and gas transporting lines are either laid on land surface, buried at a depth of 1.3m on land or 3m across creek waters. This however, has failed to stop the vandals from carrying out their nefarious activities, by digging through the right-of-ways (ROW) of pipelines and damaging them. Scada monitors that report condition of lines were strategically installed; but the vandals discovered a way of demobilizing them prior to carrying out their operations. They simply destroyed these monitors or removed the power packs because they were installed externally. Fencing of strategic valves and lines across creeks to limit accessibility of pipeline vandals also failed as they simply used oxyacetylene flames to cut through the fence and gain access to the assets. This became more pronounced because there is no continuous manning or surveillance of the lines. The companies also introduced the Pipelines and flow lines surveillance program; this approach was based on the understanding that utilizing community constructive engagement approach and partnership will stem the acts of vandalism. All rights reserved. No part of contents of this paper may be reproduced or transmitted in any form or by any means without the written permission of ORIC Publications, www.oricpub.com. Journal of Science and Engineering Vol. 1 (2), 2013, 133-142 P a g e | 134 Eight youths were hired from each host community to watch over the company assets within their locality. Incentives were introduced as rewards at end of year. This system also failed as some of the “bad eggs” within the groups diverted logistics resources provided to enhance their operation to other uses and even aided and abetted the acts of vandalism that were being perpetrated.The Federal Government introduced the Joint task force (JTF) operations, in a bid to curtail the illegal activities of vandals. The presence of this military outfit worsened the security situation, oil workers, expatriates and their family became targets of kidnapping for a ransom fee. In an attempt to dislodge these vandals, their activities gradually snowballed into more criminal acts and several oil workers lost their lives and properties worth millions of dollars have been lost to their nefarious activities. The new invention, having weighed all previous options, aims at developing a simple mechatronics system that is capable of performing a spying function around pipelines at strategic locations where acts of vandalism have been prevalent. The new system would be capable of collecting and transmitting information to a processing unit via wireless signals. It would also have the capacity to decode the exact location(s) where vandalism is taking place. This approach has become an attractive option to pursue, due to the concealed and secret nature of its installation and operation. What this means is that access to it will be highly limited. Additionally, the device is capable of sensing light, pressure drops and mechanical breaks in the line as long as there is power supply to the component units of the system. The device can also be adapted to perform other desired functions as needed including sounding an audible alarm and shutting down fluid flows automatically. In addition, the device is compact and concealed in such a way that the vandals cannot easily destroy it. This work is based on the onshore operations in the oil and gas industry. 1.1 Theory of the System Several regulations both local and international have been put in place to govern the smooth operation of the oil and gas industry; in Nigeria for instance, some of these are listed as Oil Pipelines Act, 1965; Mineral oil (safety) regulations, 1997;Petroleum regulations, 1967; Petroleum Drilling and Production regulations, 1969; Oil in navigable water Act, 1968; Oil Terminal Dues Act, 1969; Petroleum refining Regulations, 1974; Federal Environmental Regulations, 1974; Federal Environmental Protection Agency Act, 1990; National Oil Spill Detection and Response Agency Act, 2006. Ministry of Niger Delta.Acts of pipeline vandalism attribute to the frequent pipeline fires, accompanying loss of lives and lost profit opportunities (LPO). According to Johnson (2004) pipeline explosions have killed hundreds of looters, bystanders and innocent residents. The most recent of these explosions happened at Ilado, Lagos on May, 2006; more than 200 people were incinerated in the pipeline fire that enveloped the area (Balogun et al 2006). Several deaths recorded from pipeline fires in recent times are a few of the horrendous effects of crude oil theft from oil transport lines, which are a leading cause of oil spills, environmental degradation and ecological destruction in Nigeria today. Oil spills through pipeline vandalism by idle youths in Nigeria reached alarming peaks in the last few decades. Poor implementation of memoranda of understanding (M.O.U) between oil companies and host communities, lack of employment and dilapidating environmental conditions have all been blamed for this rising trend. (Uwhejevwe-Togbolo 2005). Ojediran and Ndibe (2005) reported that an average of 35,000 barrels of crude oil is stolen per day in circumstances that threaten lives, the environment and the ecosystem in general. Apart from the loss of lives and property through pipeline fires, the long time ecological effects on impacted sites usually degrade the quality of fresh water sources which serve the domestic water supply needs of most the host communities. Marine creatures are not spared and increases in water borne diseases are visibly noticeable. The enormous numbers of oil installations in the Niger Delta region explain their vulnerability to vandalism. Presently, the Niger Delta region plays host to over 600 oil fields of which 360 fields are onshore while 240 are offshore with over 3000 kilometres of pipelines crisscrossing the region and linking some 275 flow stations to various tank farms which concurrently serve as export terminals. It is pertinent therefore to note that oil spills resulting from pipeline vandalism constitute a major challenge to emergency management efforts, despite the contingency arrangements in place by industry operators. Table1 below shows that for the period 19952005, Shell Petroleum Development Company recorded a total of 2944 oil spill incidents. The data reveals a noticeable increase from 235 oil spill incidents in 1995 to 330 in 2000. The least number of 224 oil spill incidents was observed in 2005. 135 | P a g e O. Shoewu , L. A Akinyemi , Kola A. Ayanlowo , Segun O. Olatinwo , N. T. Makanjuola Table 1. Oil spill data: SPDC1995 -2005 YEAR 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 TOTAL Source: SNAR, 2005. NUMBER OF SPILLS 235 326 240 248 320 330 302 262 221 236 224 2944 VOLUME IN BARRELS (bbl) 31,000 39,000 80,000 50,000 20,000 30,000 76,960 19,980 9,916 8,317 11,921 377,194 Below are some pictures showing deliberate acts of vandalism. Fig. 1 Burning AGGE Manifold North Bank March 2006 Fig. 2 Fire incident at Fusokiri December2000 Fig. 3 Illegal bunkering at Eteo It is near impossibility to deploy a workforce that will monitor these assets physically on a 24/7 hour basis considering the fact that we have over 3000km length of pipe network criss-crossing this region. A better approach will be to use an automated system capable of monitoring activities and alerting a control station of any act of vandalism. According to Ajiboye O.E et al (May 2009), in their paper titled “poverty, Niger Delta and the youth response”, the general impoverishment of the host communities can be linked to the years of perennial neglect and abuse of the environment. Major operators do not have recognisable reclamation or remediation programme in place after major oil spills occur. The situation is worsened by a visible show of apathy to the fate of the environment by successive governments. While the drive is towards increasing the petro-dollars the country gets from oil, sadly enough, there is no corresponding passion directed towards ensuring ecological sustainability. This is evident in the way successive administrations have been shifting the dateline on gas flaring stoppage in oil field operations in Nigeria. The absence of a strong political will and Journal of Science and Engineering Vol. 1 (2), 2013, 133-142 P a g e | 136 alignment by the legislature and executive has worsened the hope for entrenching an environmentally friendly legal system that would protect the ecosystem. 2. MATERIALS AND METHODS 2.1 Component Design – Communication The design of this device is governed by the principle of radio frequency modulation and demodulation. Through this means communication is established. Messages are sent from one point to another within the range of the radio frequency coverage. A radio wave travels through the atmosphere or space at the speed of light (3x108 meters/second). If a radio wave strikes another antenna, a high-frequency current will be induced that is a replica of the current flowing in the transmitting antenna. Thus, it is possible to transfer high-frequency electrical energy from one point to another without using cables. The energy in the receiving antenna is typically only a fraction of the energy delivered to the transmitting antenna. The transceiver is capable of transmitting and receiving signals across a space in this form. The transceiver unit has a transmitter with a receiver incorporated in it. Modulation is the process through which a radio wave transmits information to different points. A radio frequency can be modulated in various forms. For example, it can be amplitude modulated (AM) or frequency modulated (FM). 2.1.1 The amplitude modulator In amplitude modulation, the intelligence or information controls the amplitude of the radio frequency (RF) signal. It also transmits voice, music, data, or even multimedia information (video). In amplitude modulation, the RF signal amplitude varies in accordance with the audio frequency (AF) signal. The RF signal could just as well be amplitude-modulated by a video signal or digital (on-off) data. The figure below shows a typical circuit for an amplitude modulator. +V Vcc AM S IGNAL (CAR RIER+S IDEBAN DS) INPUT ANTE NNA RB1 INFO RMATIO N RL OUT + T1 + C4 PNP + C2 C1 + RB2 C3 RE Fig. 4 The amplitude modulator circuit 2.1.2 The frequency modulator Frequency modulation (FM) is an alternative to amplitude modulation (AM). Frequency modulation has some advantages that make it attractive for some commercial broadcasting and two way radio traffic. One problem with AM is its sensitivity to noise. Lightning, automotive ignition, and sparking electric circuits all produce radio interference. This interference is spread over a wide frequency range. It is not easy to prevent such interference from reaching the detector in an AM receiver. An FM receiver can be made to be insensitive to noise interference. This noise free performance is highly desirable. The principle of frequency modulation can be explained using the figure below. +V Vcc RFC1 SIGNAL INPUT + C6 C7 + + R1 L1 C1 C4 R3 + Q1 FM OUTPUT C2 D1 RFC2 + + + R2 R4 C5 C3 Fig. 5 The Frequency modulation circuit 137 | P a g e O. Shoewu , L. A Akinyemi , Kola A. Ayanlowo , Segun O. Olatinwo , N. T. Makanjuola Transistor Q1 and its associate parts make up a series tuned oscillator. Capacitor C3 and coil L1 have the greatest effect in determining the frequency of oscillation. Diode D1 is a varicap diode. It is connected in parallel with C3. This means that as the capacitance of D1 changes, so will the resonant frequency of the tank circuit. Resistors R1 and R2 form a voltage divider to bias the varicap diode. Some positive voltage is applied to the cathode of D1. Thus, D1 is in reverse bias. A varicap diode uses its depletion region as the dielectric. More reverse bias means a wider depletion region and less capacitance. Therefore, as a signal goes positive, D1 will reduce in capacitance. This will shift the frequency of the oscillator up. A negativegoing signal will reduce the reverse bias across the diode. This will increase the capacitance and shift the oscillator to some lower frequency. The signal is modulating the frequency of the oscillator. The amplitude of the modulated frequency is constant. Demodulation is the means by which modulated signals are recovered. Demodulators are called radio receivers. An AM radio receiver must recover the information from the modulated signal. This process reverses what happened in the modulator section of the transmitter. This process is also called detection. A diode and a transistor can be used for AM detection. The circuit below shall be used to explain the principle of AM detection. +V Vcc AM S IGNAL (CAR RIER+S IDEBAN DS) INPUT ANTE NNA RB1 OUT + T1 INFO RMATIO N RL + C4 PNP + C2 C1 + RB2 RE C3 Fig. 6 The amplitude detection circuit The circuit shown is a common emitter amplifier. Transistor T1 and capacitor C1 form a resonant circuit to pass the modulated signal (carrier plus sidebands). Capacitor C4 is added to give a low pass filter action, since the high-frequency carrier and the sidebands are no longer needed after detection. Bi-polar Junction transistor (BJT) can demodulate signals because they are also nonlinear devices. The base-emitter junction is a diode. The transistor detector has the advantage of producing gain. This means that the circuit will produce more information amplitude than the simple diode detector. Detection of FM signal is more complicated than for AM. Since FM contains several sidebands above and below the carrier, a simple nonlinear detector will not demodulate the signal. A double- tuned discriminator circuit is required. The discriminator works by having two resonant points. One is above the carrier frequency, and one is below the carrier frequency. There are many other FM detector circuits. Some of the more popular ones are the quadrature detector, the phase-locked-loop detector, and phase-width detector. These circuits are used with integrated circuits.In the design of this device, the transceiver operates at a frequency of 900MHz. This is the operating frequency of a GSM phone. The transceiver is a modified GSM phone. Through it a wireless information exchange can be achieved. The mode of communication here is similar to that of FM but it is not a broadcast.GSM (Global System for Mobil communication) is a standard wireless communication system. Its commercial service began in 1991, at the beginning of 1994; there were about 1.3 million subscribers in the world. GSM is the dominant communication standard in the world today, communicationbase stations are not needed to be set up. The most fundamental service supported by GSM was wireless phone. Since 2001 this service has been available to us in Nigeria. The potential of the GSM service is beyond what is known in the country. The system can be adopted to serve designs such as the pipeline vandalism alert. A GSM system has wide coverage area; the extent of coverage is determined by the availability of repeating stations to boost the strength of the signal. Wherever there is a GSM signal, a GSM device like a mobile phone can be reached from any place in the world. In the same vain it can reach any where, too. This means of communication requires no cable. Space satellites are used to relay signals from one continent to another or from one very remote place to another. The transceiver which is a GSM device is a modified Nokia 1100 phone. It is hosted on a network through a SIM module. Every SIM module has an identification number. Through this identification number it can send and receive data on the local and global GSM network. Journal of Science and Engineering Vol. 1 (2), 2013, 133-142 P a g e | 138 2.2 Component Design – Sensors. The device operates through the use of sensors, which sense a variation in stable operating conditions of pressure, break or light. 2.2.1 The pressure sensor Fig. 7 The pressure sensor The Operation of the Pressure Sensor The pressure sensor is designed with a normally closed push switch connected in series with a resistor R1. The output voltage (Vo) at the junction of these two components depends on the state of the switch. When the switch is not depressed, the contacts are closed. Hence, Vo is 0V. This is the state of the sensor when the joint of two pipes is opened. When this joint is closed, the switch is in the open contact state, and the value of Vo is 5V. The resistor R1 is a pull-up resistor. Its value is determined with respect to the maximum current sinkable by the microcontroller. The microcontroller can sink a maximum current of 25mA. To reduce the current drain on the power supply port Ao of the microcontroller is made to sink 0.5mA. Therefore, the value of R1 is obtained by this equation: V= IR, R=V/I, R=5/0.5X10-3 , R1=10K 2.2.2 The light sensor 5V +V PHOTO RESISTOR R3 10k 100mA TO MICROCONTROLLER OPTICAL FIBER NPN Q1 R2 50K Fig 8. The light sensor Fig. 9 The light sensor circuit The Operation of the Light Sensor This senses light around the pipe line whenever there is an opening along the pipe. This sensor is a network of optical fibres and a photo resistor. The optical fibres are to receive and transmit light from source to the photo resistor. The light sensor is covered with a black rubber to cut out light from the optical fibres. The optical fibres are laid along the pipe so as to provide proper coverage in a zigzag form. When the rubber insulation is removed during vandalism, the optical fibres pick up light rays which are transmitted to the surface of the photo resistor. The photo resistor converts light signals into electrical signals which are sent to the microcontroller for processing. The optical fibres are channels for transferring light from source to a point of use. It is used in this project to pick up light and focus it on the surface of a photo resistor. The photo resistor and the variable resistor R2 convert the light energy to electrical signal. The electrical signal is then converted to digital signal by the transistor before it gets to the microcontroller. The essence of this sensor is to detect the presence of light. This will happen when the black rubber sheet covering the pipe is removed during vandalism. During installation of this sensor, the optical fibres are laid concurrently as shown below. This pattern of distribution of fibre optics is to enable coverage of the surface of the pipe. The photo resistor and the 50K variable resistor convert the light energy on the surface of the photo resistor to electrical energy. The sensitivity of this sensor is determined by the resistance of the variable resistor (R2). The higher its value the more the sensitivity and light sensor, and vice versa. The output of this connection is 139 | P a g e O. Shoewu , L. A Akinyemi , Kola A. Ayanlowo , Segun O. Olatinwo , N. T. Makanjuola digitalized by the transistor Q1. The transistor is used as a switch in this mode; and the resistor R3 is to limit the current to the microcontroller to 0.5mA. 2.2.3 The break sensor 5V +V R4-R11 10K B7 B6 B5 TO MICROCONTROLLER B4 B3 PIPE B2 B1 OPTICAL FIBER B0 Fig. 10 The break sensor Fig. 11 The break sensor circuit The Operation of The Break Sensor This is a network of thin coils connected to the ports of the microcontroller and to the body of the pipe at the other end. These coils are wrapped around the pipe in a thread like fashion to provide surface cover of the pipe. When any of these tiny coils is broken, a signal is sent to the microcontroller for interpretation. These coils are concealed using black rubber insulation over the pipe. This rubber wrapping also protects the sensors from adverse environmental conditions. 2.3 Component Design – Microcontroller This is the brain of the system. It is the component responsible for interpretation of signals received from the various sensors. It is also responsible for information transmission between the system and the base station unit. This means that it directly controls the functions of the transceiver. The microcontroller in this system performs the same functions a processor does to a computer system; it governs its operations. The microcontroller selected for this function is the PIC16F 628A, a product of Microchips. The Functions of the microcontroller-16F628A include: To turn on the system automatically when power is connected, To interpret signals, To send an alert signal to the base station, To clear the transceiver’s screen and To relay audio signals around the pipe to the base station. 2.3.1 The transceiver This module is capable of sending and receiving signals via wireless communication. The transceiver is a very important part of the system, and its mode of operation is better explained by the operation of radio signal transmitter and receiver. The transceiver module transmits and receives signals at a certain frequency. 2.4 Component Design – Power System S1 REGULATOR F1 6V 78 L06 IN OUT 5.4V COM TO THE DEVICE T1 50 .0Hz UTILITY SUPPLY C1 + -22 0/22 0V 10 TO 1 C2 D4 BRIDGE 220/12 VAC D3 D1 POWER SUPPLY 6v,3A NPN R13 Q2 R12 + MM SZ7V5T1 D2 Fig.12 The power supply CHARGER 6V BACK-UP BATTERY Journal of Science and Engineering Vol. 1 (2), 2013, 133-142 P a g e | 140 10k 78L05 IN OUT 8V COM DIAL PIC 16F628 10k CLR 470uF BATTERY C181 5 NPN LIGHT SENSOR 10k ON 10k + + JOINT SENSOR MICRCONTROLLER 390 4.000MHZ NPN 10k 22uF NPN 22uF 390 C181 5 C181 5 NPN NPN 390 C181 5 y4 y3 y2 y1 47 ON/OFF BREAK SENSOR(WEB) C D E F 8 9 A B 4 5 6 7 0 1 2 3 x1 x2x3 x4 TRANSCEIVER Fig.13 The power circuit Base station Power supply Microcontroller Light sensor Transceiver Break sensor Pressure sensor Fig.14 The block diagram of the design of a microcontroller based alarm system for pipeline vandals detection This is the part that supplies the energy that keeps the device active and running. It has a main power supply which is sourced from utility supply (PHCN), and a back-up power supply which is sourced from a battery. Its power consumption is low, 3Watts maximum. The reason for dual power supply is to keep the device active even when main power supply fails due to erratic power. Algorithm of the design 1. 2. 3. 4. 5. 6. 7. stand by the alarm system Monitor the pipeline If there is break Send the break signal or light signal to microcontroller Microcontroller If yes, alert the personnel If No, go to step (2) 141 | P a g e O. Shoewu , L. A Akinyemi , Kola A. Ayanlowo , Segun O. Olatinwo , N. T. Makanjuola Fig. 15 Flow Chart of the design of a Microcontroller based alarm system for Pipeline Vandals Detection 3. SYSTEM SIMULATION 3.1 Computer Simulation of the Alarm System Under normal operating conditions (when there is no pressure drop, break or exposure of optical fibres to light rays), the digital signal to the microcontroller is 00000000. The zeros are eight because the sensor is an eight bit system. Whenever the microcontroller senses a different digital input, it reads it as a break in one of the coils which also means a break in the pipe. The 10K resistors are to limit the maximum current into the microcontroller to 0.5mA.All the signals from the sensors are received and processed by the microcontroller. The processing of the signals is controlled by a written program that is downloaded into the controller. These operations of these sensors can best be explained using the control program. 3.2 Simulation of the Pressure Sensors This can be done by pulling two pipe connections apart. The pressure switch loses contact and sends a signal for the transceiver to alert the receiving phone. This receiving phone stores the number of each SIM, on a module, with the pipe number. With this the exact location of the alerting module can be known. The phone is programmed to alert thrice to compensate for bad network scenarios. 3.3 Simulation of Light Sensors The light sensors at normal operating condition should be kept in the dark. This condition will not cause any alert signal to be sent. When the light sensors are exposed to light by removing the protective cladding over the pipe, an alert signal is sent to the control station. The call rings three times. This means that while the vandals are trying to get to the pipe by removing the covering over it, the control station gets alerted of their activity. 3.4 Simulation of the Break Sensors These sensors can be tested by drilling a hole into the pipe using a hand drilling machine. The drill bit cuts break sensors, and as a result the alert signal rings three times. This means that when the vandals are Journal of Science and Engineering Vol. 1 (2), 2013, 133-142 P a g e | 142 trying to bore a hole into the oil pipe, one or more break sensors will be broken by their activity and the control station would be alerted. The Audio Spying Function: In order to listen to the conversation of the vandals or their activities, the transceiver can be called from the control station by dialling its SIM card number .When this is done, voices around the sensor station can be heard. The spy operation does not reduce the credit balance of the module transceiver. It is the caller that is charged. This operation could be repeated several times and the same results will be obtained. This confirms the consistency and proper functionality of the device. 4. TESTING AND RESULTS The various tests were carried out on the different modules and striking results were obtained for different circuit diagrams. 5. CONCLUSION The various ways of designing of security gadgets from analog to digital circuit was used in this paper. However, various components were designed and tested to ensure it did meet the specification of the users by warding off or alerting the personnel when things go wrong in the pipelines. REFERENCES [1] Abubakar, S. (2006). Pipeline vandalism caused fuel shortages at northern depots. Weekly Trust (Abuja), 7–13 October [2] Abdulkadir, B. M (2009). NSCDC Urges Security Networking Against Vandalism [online]. Available at www.guardian.co.uk [accessed 6 August 2009] [3] Adeniyi, O. (2007). Playing with fire (1). Thisday (Lagos), 18 January. [4] Ahmed, O. S. (2007). Nigeria, oil terrorism and pipeline safety [online]. Available at guardian.co.uk [accessed 23 October 2006]. [5] Akintola, T. (2006). Pipeline vandalism and oil scooping in the Niger Delta and Others [online]. Available at vanguardngr.com [accessed 21 October 2006]. [6] Ali, A. (2006). Pipeline sabotage in Nigeria and oil pollution damage out of context [online]. Available at ipec.utulsa.edu/conf/2008/…/Eyo_Essien [accessed 21 October 2006]. [7] Alimeka, C. (2001). Poverty, social exclusion and social dislocation in Nigeria. Paper presented at the National Conference on Law and Poverty in Nigeria, Kaduna. [8] Amanze-Nwachukwu, C. and Ogbu, A. (2007). Kupolokun cries over pipeline vandalism. Thisday (Lagos), 15 January. [9] Brume, F. (2006). Oil pipeline vandalism in the Niger Delta: the way out [online]. Available at guardian.uk.co [accessed 21 October 2006]. [10]Helen, Y. (2007). Sharpening the strategic focus of livelihoods programming in the Darfur region. A report at the Darfur Peace conference. [11]Lex de Waal, (2007). War in Darfur and the search for peace. Cambridge press. [12]Manze-Nwachukwu, C. (2007). Boxing Day tragedy: it is time for solution. Thisday (Lagos), 2 January. [13]Nelles, W. (2003). Comparative education, terrorism and human security: from critical pedagogy to peace building. New York: Palgrave Macmillan. [14]Nelson-Smith (1973). Oil pollution and marine ecology. Cambridge press. [15]United Nations Development Programme (UNDP) 1994. Human Development Report. New York: Oxford University Press. [16]Victor, A. Y. (2009). NNPC, Police Connive With Pipeline Vandals – Nupeng. Available at www.guardian.co.uk [17]Wall Street Journal (2008). Pipeline vandalism, Hillsborough, U.S. [18]White, J. (1998). Who is responsible for the oil explosion in Nigeria [online]. Available at www.guardian.co.uk [accessed 21 October 2006]. Please cite this article as: O. Shoewu , L. A Akinyemi , Kola A. Ayanlowo , Segun O. Olatinwo , N. T. Makanjuola, (2013), Development Of A Microcontroller Based Alarm System For Pipeline Vandals Detection, Journal of Science and Engineering, Vol. 1(2), 133-142. View publication stats