Models and Techniques Analysis of Border Intrusion Detection Systems

Article ID

47ZL7

Models and Techniques Analysis of Border Intrusion Detection Systems

Mosad Alkhathami
Mosad Alkhathami University of Michigan
Lubna Alazzawi
Lubna Alazzawi
Ali Elkateeb
Ali Elkateeb
DOI

Abstract

This research paper sets out to explore various border intrusion detection systems but with emphasis on wireless sensor detection method. The system described in this paper relates to the detection of human beings in particular but also offers ways of detecting non-human intruders such as objects and animals. Thus, the study aims at ascertaining the intruder crossing a specified border or perimeter under surveillance before raising an alarm. It also looks forward to provide intrusion detection mechanisms for other forms of objects that are considered to be intruding to a specified perimeter. The application is being developed for border intrusion detection problems that are mainly focused on human and any other intruder. As such, the system will focus on all forms of intrusion including objects. There is also need for an intrusion detection system to ascertain the identity of the intruder.

Models and Techniques Analysis of Border Intrusion Detection Systems

This research paper sets out to explore various border intrusion detection systems but with emphasis on wireless sensor detection method. The system described in this paper relates to the detection of human beings in particular but also offers ways of detecting non-human intruders such as objects and animals. Thus, the study aims at ascertaining the intruder crossing a specified border or perimeter under surveillance before raising an alarm. It also looks forward to provide intrusion detection mechanisms for other forms of objects that are considered to be intruding to a specified perimeter. The application is being developed for border intrusion detection problems that are mainly focused on human and any other intruder. As such, the system will focus on all forms of intrusion including objects. There is also need for an intrusion detection system to ascertain the identity of the intruder.

Mosad Alkhathami
Mosad Alkhathami University of Michigan
Lubna Alazzawi
Lubna Alazzawi
Ali Elkateeb
Ali Elkateeb

No Figures found in article.

Mosad Alkhathami. 2015. “. Global Journal of Research in Engineering – F: Electrical & Electronic GJRE-F Volume 15 (GJRE Volume 15 Issue F7): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjre

Print ISSN 0975-5861

e-ISSN 2249-4596

Classification
GJRE-F Classification: FOR Code: 290901p
Keywords
Article Matrices
Total Views: 4111
Total Downloads: 2043
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Models and Techniques Analysis of Border Intrusion Detection Systems

Mosad Alkhathami
Mosad Alkhathami University of Michigan
Lubna Alazzawi
Lubna Alazzawi
Ali Elkateeb
Ali Elkateeb

Research Journals