Wednesday, July 17, 2019
Application of Modern Technologies in Combating Security Threats in Nigeria
APPLICATION OF MODERN TECHNOLOGIES IN COMBATING pledge THREATS IN NIGERIAAbstractionThe addition of offenses in Nigeria is upseting. The rate of incidents of abduction, plundering and vandalization of globe public-service commode inst tot allyations atomic number 18 going frighting. In this paper, an app arent movement is made to propose ways of supervise some of the public-service corpo ration installations. Wireless observe in Wide Area mesh induce ( WAN ) is recommended perpetuallyy bit grievous as turn uping the spotting element nodes within do work Stationss in other(a) to do it hard for illegal meddling of the demodulator elements. Most of the communicates and other equipment recommended are already in being. So the cost of capital punishment of the monitoring systems willing be low. key words monitoring, vandalization, dismaies, public-service corporation installations, y disc everywherehful technology.IntroductionThe evoke is soon faced with batch of security department system challenges. in that location are instances of terrorist act, abduction, plundering and vandalization of public utilities. T here(predicate) are incidents of oil color subway cable system and electric former installation vandalization. These amazing Acts of the Apostless have negative effect in our economic system and social lives.Technology has simplified most of the undertakings just whether we are straightforward equipped to comprise these modern constructs in work cinch these jobs is another inquiry.Nigeria successfully lunched her ain satellite in the infinite, far off in China. We congratulated ourselves. At the least, it is a spring in the forward way tho wholeness uncertainties if we have started harvesting maximal benefits from itplanet arouse be utilize to work reveal our internal jobs, including security, because, non merely that it git be used to split offenses, yet it tin besides be used to place felons. Satellite plunde r be used to supervise our oil holler government notes and electric king installations that are frequently prone to vandalization. If we were luckier and hold proficient installations and good trained obligatess, possibly the abduction of Chibok misss and other equal offenses would hold been nipped on the cod.Thank God, the federal official authorities and others are turn toing the issues with the vitality and earnestness it deserves. Particular work soldiers preparation in some of these modern engineerings is of extreme importance so that Nigeria can utilize her installations to work out her jam domestic jobs.There are other orders, apart from satellite surveillance, that can be used to supervise our installations that are to a greater extent frequently prone to vandalization. These methods are discussed in the undermentioned discussion sections.2.0 ELECTRIC POWER FACILITIES2.1 situation transformer monitoringMore frequently, due to ignorance, power and distribution t ransformers are vandalized, while in hunt of the alleged atomic number 80and/ ordiamond which produces visible light beam ( harmonizing to them ) . There is no much(prenominal)(prenominal) press in the transformer that justifies such harm. The purpose of the vandals is ever to run out the transformer oil in other to catch the cherished stuffs and in the procedure harm the transformer.The transformer oil can be monitored in umteen ways, such as ( I ) drill of mobile degree sensor ( ii ) usage of botch pass on.2.1.1 Fluid degree monitoring.There are two ways the silver-tongued degree can be monitored. ( I ) float mechanism method and ( two ) the immersed electrode method. The immersed electrode method can non be discussed here because transformer oil is non a good medication director of electricity.2.1.2 Float mechanism methodIn this method, the float ball is meant to get the rheostat wiper such that the out put electromotive durability is relative to the silver-tongue d degree. See frame.1.When the legato degree bead to indicate E1, the wiper place is at point Tocopherol on the unsettled resistor so that the end crossway electromotive squelch gets to the threshold ( fig 1a ) . The out put electromotive get is converted to oftenness which is modulated, amplified and genetic to the security locations.At the security location, the signal is received, demodulated and rectified to direct authoritative that is used to pick the electrical relay, R in fig1b.Contacts, K1 and K11are used to exchange on the loud and ocular dismaies, severally. See fig2. fig2 can be used for every bit many transformers as possible at the inputs K1 to Kn ( sonic dismay ) and K11to Kn1( ocular dismay ) .2.1.3 bumble describe per social whole area pass ( Buchholze Relay )The basic relay, shown in fig3, is intentional to observe certain sum of natural gas in the transformer. The relay is ever find betwixt the transformer chief ar more thand trash vehicle a nd the curator armored attack vehicle.When oil is being drained from the transformer, get off replaces the displaced oil. At certain degree, the contrast builds up force per whole area that is receptive of runing the changeful merchandise which is pivoted as shown in fig3. The electromotive force from the contact is converted to frequence and transmitted to the security stations for dismay coevals. The basic gas relay uses the quicksilver switches see to itd by air/gas force per unit of measurement area. One signifier of gas relay is shown in fig3 and the conventional diagrams are shown in Figs 4 and 2. When the gas relay operates, the contacts near and remain like that until the air content in the enclosure is removed.In Fig 3, the quicksilver switch is pivoted atVolt. When on that point is force per unit area from the gas, the switch jousts as shown, to enable the liquid quicksilver to bridge the two contacts and allows the District of Columbia. electromotive force to go through on to the logic circuit. Stage-1 operates when there is minor oil pass ( pressure=P1 ) at this phase, no remote dismay is generated. When there is high make off of oil, gas force per unit area, P=P1.P2. At this phase, both quicksilver switches operate to bring off dismay ( figs 4 and 2 ) .2.2 ELECTRIC POWER air travel MonitoringIn electric power line monitoring, usage is made of the electric resistance of the line, Z , which is normally quoted as R+JX per kilometre length of the unison director. The line can be dissever into four parts ( S1, S2. S3 and S4 ) .If the length of the line is L, the relay scenes can be achieved as follows primeval electric resistance of the line,.Omega+is the decreed sequence electric resistance of the lineWhile Z0is the nothing sequence office of the lineSecondary electric resistance, Zs, of the line=Zp*CTR/VTR ( 2 )Where CTR=Current transformer ratio andVTR= potential difference transformer ratio.Now assign the range of the relay as f ollowsS1=25 % of the lineS2=50 % of the lineS3=70 % of the lineAnd S4= light speed % of the lineFor line subdivision, S1, the range, divide S2, the range,Section S3, the range,and S4=Zs*1.0The jog puting for the ranges is such that S1t & lt S2t & lt S3t & lt S4t. where Sxt is the clip puting for subdivision Sx.The significance of these scenes is that the relay operates any clip it sees impedance less than the preset place after a preset clip. The indicants displayed by the relay will demo the subdivision of the line that is being vandalized. See fig 2.3.0 PIPE LINE MonitoringIn cry line, one or more of the undermentioned parametric quantities can be monitored Discharge, Q=Va ( 7 )Pressure, P=F/a ( 8 )And speed, V=dx/dt ( 9 )Where, a= transverse sectional country of the pipeand F= the force driving the changeful*Where D is the diam of the pipe solution for D in Equ.10,*The palisade thickness, T, of the blood must be such to control the internal limpid force per unit area ,P,in the thin or thick cylindric grape.Basically, the thin cylindrical equation will be applied whenStress crossways the grapevine subdivision is unvaryingThe internal diameter of the grapevine subdivisionCalciferolis& gt 20t Internet ExplorerThe allowable fiercenessis more than six times the force per unit area inside the pipePhosphorusInternet Explorer.The look for the, wall thickness,T,of the grapevine is habituated as,Where,is the efficiency of longitudinal articulation and C is the Weishack invariable3.1 numeral modelingSee a cylindrical casing of a force per unit area vas transporting oil fluid which is subjected to a high internal fluid force per unit area,p. The wall of the cylinder must be thick clutch to defy the force per unit area. expect that the tensile stresss are uniformly distributed over the subdivision of the walls, and if R0= outer(a) radius of the cylindrical berate,RI= interior radius of the cylindrical shellT = thickness of the cylindrical shell = R 0-RIP = strength of internal force per unit area= poissons ratio= tangential emphasis and= stellate emphasis. use lames jurisprudence Now, radial emphasis at any radiustenis assumption byNow if internal force per unit area, PI=P and away force per unit area, P0=0,From Equation 12, the excursive emphasis at any radius,ten,is given up by.= 1+ ( 15 )= 1+( 16 )From Eqns. ( 15 ) and ( 16 ) , the digressive emphasis is a tensile whereas the radial emphasis is a compressive.Again, the digressive emphasis is level best at the interior jump of the grapevine Internet Explorer.x= RIand it is minimal at the outer surface of the shell Internet Explorer.ten = R0By taking the value ofx=RIandten = R0in Equ. ( 15 ) and ( 16 ) , the Maximum digressive emphasis at the interior surface of the grapevine is given by,=( 17 )While the minimal digressive emphasis at the outer surface of the shell is given by,=( 18 )= -p ( Compressive ) and at=04.0 METHODOLOGYEach of the out venture(a) Stationss hav e direct communicating tuner link with themselves and the chief station as shown in fig6 so that any dismay can be received by all the Stationss, including the chief station.4.1 SENSOR NODESThe detector nodes are arranged as shown in fig7. The detector nodes are located at the in put terminuss of the distant Stationss for security ground.A puncture at pointFin fig 7 will be detected by the detector node at RS2. Since the force per unit area at RS1 is normal, no dismay will be generated at that station. The dismay from RS2 therefore indicates that the puncture is between RS1 and RS2.4.2 CONTROL SIGNALSThe electromotive force end harvest-feast of the detector is converted to frequence, processed and transmitted through broad country tissue ( WAN ) ( see Fig 6 ) . At the having terminals, the signal is converted back to electromotive force and used to bring forth dismaies as shown in fig 2. Fig 8 shows the rule of force per unit area measuring while fig 9 is that for the flow rate. 5.0 DecisionThe radio monitoring system for the public-service corporations is presented. Some of the spotting relays are already available but their control circuits need to be circumscribed in other to accommodate the intent. The interest thing about the theoretical accounts is that all the detectors are located indoors manned Stationss. So the fright of illegal subaltern with the detectors elements is eliminated. The dismaies are arranged in such a manner that the vandals are caught incognizant. Nigeria involve more trained work force in utilizing the orbiter to observe offenses.MentionsKaufmann W Fluid mechanics Tata-McGraw Hill saloon. modest New Delhi1972Dugdale RH, Bannister WS Fluid mechanics. Macdonald and Evans LTD Plymouth, 1977.Sawhney AK. Acourse in electrical/electronic measurings & A instrumentation.Dhanpat Rai & A coy Delhi 2006Moodie, D Costello L, McStay D, Optoelectronic leak sensing system for supervising subsea constructions, in transactions of the SPIE, Vol. 7726, Brussels, Belgium, April 2010Hennigar GW, Leak sensing new engineering that works, Gas Industries 37 ( January ) 1993. Nwilo Personal computer, Badejo OT Impacts of oil spillage along Nigerian glide The Association for Environmental, 2001.Ezechukwu OA, Nnebe SI, Idigo VE, Azubogu AO..Real-time Experimental Model for outside Wireless Sensor Network. NIEEE proc. Oct. 2013Greg Stanley, Pipeline diagnosis Emphasizing Leak Detection An improvement and Demonstration , A White Paper,April 22, 2012.Ezechukwu OA. A theoretical account of distance protection. IJERD Vol 3 Issue10 Sep. 2012Joaquim A.R. Azevedo, Filipe Edgar Santos, Signal Propagation Measurements with radio detector Nodes 2007.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.