Wednesday, January 16, 2019

Application of Modern Technologies in Combating Security Threats in Nigeria

APPLICATION OF MODERN TECHNOLOGIES IN COMBATING SECURITY THREATS IN NIGERIA inductionThe addition of offenses in Nigeria is upseting. The rate of incidents of abduction, plundering and vandalization of public public-service corporation institutions be going horrifying. In this paper, an effort is made to propose ways of lapse slightly of the public-service corporation installations. Wireless monitoring in Wide knowledge domain Net perish ( WAN ) is recommended incessantlyy bit faithful as plication uping the demodulator nodes inside manned Stationss in another(prenominal) to do it sticky for illegal meddling of the detector elements. Most of the relays and other equipment recommended be already in being. So the cost of execution of the monitoring remainss will be low.Cardinal words monitoring, vandalization, dismaies, public-service corporation installations, modern engineering.IntroductionThe state is soon confront with batch of security challenges. at that place arg on instances of terrorist act, abduction, plundering and vandalization of public utilities. in that location are incidents of petroleum pipe var. and voltaic power installation vandalization. These amazing Acts of the Apostless have negative effects in our economic system and societal lives.Technology has simplified most of the undertakings exclusively whether we are good equipped to follow these modern constructs in work break throughing these jobs is another(prenominal) inquiry.Nigeria successfully lunched her ain satellite in the infinite, far off in China. We congratulated ourselves. At the least, it is a spring in the forward way but one uncertainties if we have started harvesting maximal benefits from itSatellite green goddess be utilize to work out our native jobs, including security, because, non merely that it domiciliate be used to split offenses, but it thunder mug besides be used to place felons. Satellite can be used to supervise our oil pipe positions and electric car automobile power installations that are frequently prone to vandalization. If we were luckier and clear proficient installations and good trained mightinesss, possibly the abduction of Chibok misss and other similar offenses would behave been nipped on the cod.Thank God, the federal authorities and others are turn toing the issues with the button and earnestness it deserves. Particular work pound preparation in some of these modern engineerings is of extreme importance so that Nigeria can utilize her installations to work out her pressing domestic jobs. on that point are other methods, asunder from satellite surveillance, that can be used to supervise our installations that are to a greater extent frequently prone to vandalization. These methods are discussed in the undermentioned subdivisions.2.0 ELECTRIC great power FACILITIES2.1 Power transformer monitoringMore frequently, due to ignorance, power and distribution transformers are vandalized, while in hunt of the alleged quicksilverand/ ordiamond which produces visible radiation ( harmonizing to them ) . There is no much(prenominal) stuff in the transformer that justifies such harm. The purpose of the vandals is ever to run out the transformer oil in other to catch the cherished stuffs and in the procedure harm the transformer.The transformer oil can be monitored in m any(prenominal) a(prenominal) ways, such as ( I ) usage of unstable peak sensor ( deuce ) usage of throttle valve relay.2.1.1 Fluid degree monitoring.There are two ways the fluid degree can be monitored. ( I ) float mechanism method and ( two ) the immersed electrode method. The immersed electrode method can non be discussed here because transformer oil is non a good music managing director of electricity.2.1.2 Float mechanism methodIn this method, the float ball is meant to chock up the rheostat wiper such that the out put electromotive force is recounting to the fluid degree. See fig.1.When the fluid degree bead s to indicate E1, the wiper place is at point Tocopherol on the variable electric resistance so that the end product electromotive force gets to the threshold ( fig 1a ) . The out put electromotive force is reborn to frequence which is modulated, amplified and transmitted to the security locations.At the security location, the signal is received, demodulated and rectified to direct current that is used to resource the relay, R in fig1b.Contacts, K1 and K11are used to exchange on the hearable and optic dismaies, severally. See fig2. Fig2 can be used for every bit many transformers as possible at the inputs K1 to Kn ( hearable get off ) and K11to Kn1( ocular dismay ) .2.1.3 Gas force per social social social unit knowledge base Relay ( Buchholze Relay )The basal relay, shown in fig3, is designed to observe certain sum of gas in the transformer. The relay is ever situated between the transformer knob armored encounter vehicle and the curator armored combat vehicle.When oil is being knackered from the transformer, air replaces the displaced oil. At certain degree, the air builds up force per unit study that is capable of runing the quicksilver switch which is pivoted as shown in fig3. The electromotive force from the contact is converted to frequence and transmitted to the security stations for dismay coevals. The basic gas relay uses the quicksilver switches operated by air/gas force per unit subject field. One signifier of gas relay is shown in fig3 and the conventional diagrams are shown in Figs 4 and 2. When the gas relay operates, the contacts come on and remain like that until the air content in the enclosure is removed.In Fig 3, the quicksilver switch is pivoted atVolt. When in that location is force per unit area from the gas, the switch jousts as shown, to enable the liquid quicksilver to bridge the two contacts and allows the District of Columbia. electromotive force to go through on to the logic circuit. Stage-1 operates when there is m inor oil escape ( pressure=P1 ) at this phase, no orthogonal dismay is generated. When there is high discharge of oil, gas force per unit area, P=P1.P2. At this phase, both quicksilver switches operate to bring onward dismay ( figs 4 and 2 ) .2.2 ELECTRIC POWER LINE observeIn electric power line of merchandise monitoring, usage is made of the electric resistance of the line, Z , which is normally quoted as R+JX per kilometre duration of the music director. The line can be divided into four subdivisions ( S1, S2. S3 and S4 ) .If the aloofness of the line is L, the relay scenes can be achieved as followsPrimary electric resistance of the line,.Omega+is the positive sequence electric resistance of the lineWhile Z0is the nothing sequence constituent of the lineSecondary electric resistance, Zs, of the line=Zp*CTR/VTR ( 2 )Where CTR=Current transformer ratio andVTR=Voltage transformer ratio.Now set up the range of the relay as followsS1=25 % of the lineS2=50 % of the lineS3=70 % of the lineAnd S4= 100 % of the lineFor line subdivision, S1, the range, divide S2, the range,Section S3, the range,and S4=Zs*1.0The clip puting for the ranges is such that S1t &038 lt S2t &038 lt S3t &038 lt S4t. where Sxt is the clip puting for subdivision Sx.The significance of these scenes is that the relay operates any clip it sees impedance less than the preset value after a preset clip. The indicants displayed by the relay will demo the subdivision of the line that is being vandalized. See fig 2.3.0 PIPE LINE MonitoringIn pipe line, one or more of the undermentioned parametric quantities can be monitored Discharge, Q=Va ( 7 )Pressure, P=F/a ( 8 )And speed, V=dx/dt ( 9 )Where, a= transverse sectional country of the pipeand F= the force driving the fluid*Where D is the diameter of the pipe solution for D in Equ.10,*The wall thickness, T, of the Pipeline must be such to defy the internal fluid force per unit area,P,in the thin or thick cylindric grapevine.Basically, the thin rounded equation will be applied whenStress across the grapevine subdivision is unvaryingThe internal diameter of the grapevine subdivisionCalciferolis&038 gt 20t Internet ExplorerThe allowable idiomis more than six times the force per unit area inside the pipePhosphorusInternet Explorer.The look for the, wall thickness,T,of the grapevine is addicted as,Where,is the efficiency of longitudinal articulation and C is the Weishack invariable3.1 Mathematical copySee a cylindrical beat of a force per unit area vas transporting oil fluid which is subjected to a high internal fluid force per unit area,p. The wall of the cylinder must be thick plenty to defy the force per unit area.Assuming that the malleable emphasiss are uniformly distributed over the subdivision of the walls, and if R0= out radius of the cylindrical shell,RI= interior radius of the cylindrical shellT = thickness of the cylindrical shell = R0-RIP = strength of internal force per unit area= poissons ratio= digressive emphasis and= radial emphasis.Using squares jurisprudence Now, radial emphasis at any radiustenis prone byNow if internal force per unit area, PI=P and external force per unit area, P0=0,From Equation 12, the digressive emphasis at any radius,ten,is given(p) by.= 1+ ( 15 )= 1+( 16 )From Eqns. ( 15 ) and ( 16 ) , the digressive emphasis is a tensile whereas the radial emphasis is a compressive.Again, the digressive emphasis is supreme at the interior open of the grapevine Internet Explorer.x= RIand it is minimal at the outer surface of the shell Internet Explorer.ten = R0By taking the value ofx=RIandten = R0in Equ. ( 15 ) and ( 16 ) , the Maximum digressive emphasis at the interior surface of the grapevine is given by,=( 17 )While the minimal digressive emphasis at the outer surface of the shell is given by,=( 18 )= -p ( Compressive ) and at=04.0 methodological analysisEach of the distant Stationss have direct communicating nexus with themselves and the chief station as shown in fig6 so that any dismay can be received by all the Stationss, including the chief station.4.1 SENSOR NODESThe detector nodes are arranged as shown in fig7. The detector nodes are located at the in put terminuss of the distant Stationss for security ground.A deflate at pointFin fig 7 will be detected by the detector node at RS2. Since the force per unit area at RS1 is normal, no dismay will be generated at that station. The dismay from RS2 accordingly indicates that the puncture is between RS1 and RS2.4.2 CONTROL SIGNALSThe electromotive force end product of the detector is converted to frequence, processed and transmitted through broad country weave ( WAN ) ( see Fig 6 ) . At the having terminals, the signal is converted back to electromotive force and used to bring forth dismaies as shown in fig 2. Fig 8 shows the rule of force per unit area measuring while fig 9 is that for the flow rate.5.0 DecisionThe tuner monitoring system for the public-service corporations is presented. Some of the detection relays are already getable but their control circuits need to be modified in other to accommodate the intent. The interesting thing about the theoretical accounts is that all the detectors are located indoors manned Stationss. So the fright of illegal bantam with the detectors elements is eliminated. The dismaies are arranged in such a manner that the vandals are caught incognizant. Nigeria needs more trained work force in utilizing the orbiter to observe offenses.MentionsKaufmann W Fluid mechanics Tata-McGraw Hill saloon. Coy unseasoned Delhi1972Dugdale RH, Bannister WS Fluid mechanics. Macdonald and Evans LTD Plymouth, 1977.Sawhney AK. Acourse in electrical/electronic measurings &038 A instrumentation.Dhanpat Rai &038 A coy Delhi 2006Moodie, D Costello L, McStay D, Optoelectronic leak sensing system for supervising subsea constructions, in Proceedings of the SPIE, Vol. 7726, Brussels, Belgium, April 2010Hennigar GW, Leak sensing new engineering that work s, Gas Industries 37 ( January ) 1993. Nwilo Personal computer, Badejo OT Impacts of oil spillage along Nigerian seashore The intimacy for Environmental, 2001.Ezechukwu OA, Nnebe SI, Idigo VE, Azubogu AO..Real-time Experimental Model for Outdoor Wireless Sensor Network. NIEEE proc. Oct. 2013Greg Stanley, Pipeline diagnosing Emphasizing Leak Detection An Approach and Demonstration , A washcloth Paper,April 22, 2012.Ezechukwu OA. A theoretical account of distance protection. IJERD Vol 3 Issue10 Sep. 2012Joaquim A.R. Azevedo, Filipe Edgar Santos, Signal university extension Measurements with radio detector Nodes 2007.

No comments:

Post a Comment