First, the introduction of intrusion detection and alarm technology
The intrusion detection and alarm system is the main component of the security system, and its basic function is the (abnormal situation) detection. The mode of intrusion detection alarm system is mainly determined by the characteristics of the detector and the functional requirements of the system.
The typical mode of intrusion detection alarm system is a tree-type (lumped) information acquisition system. Under the current technological conditions, people have conceived many other modes, mainly using network technologies and systems that use public information networks, but they have not formed a practical model, mainly because these systems cannot achieve some basic functions of intrusion detection and alarm systems. Requirements (these requirements are generated in the traditional mode). At the same time, many systems are wide area network structures, which have poor real-time performance and slow alarm response, and cannot be effectively responded. In fact, the main difference between the new model and the classic model is the transmission of alarm information and the network topology, and how to implement the system's status monitoring and anti-disruption function. The functional requirements for front-end equipment and control equipment are basically the same.
(A) detector
Often referred to as an alarm, it is the core of the front-end device. The alarm system forms a sufficient space for prevention through it and has appropriate sensitivity to complete the response to the prevention of space closure and abnormal situations (possibly intrusion). The detector can be self-powered and self-tested. It can also be powered by the alarm controller and perform status monitoring. The detector's own settings and the alarm controller can be used to implement the anti-destruction function of the alarm system. Usually the detector should have a built-in tamperproof device.
(II) Alarm Controller
Also called the system controller, it is the central device of the intrusion detection alarm system. It has the following three main functions:
1. display. Including intrusion detection system detection results, system status (alarm, system transmission, controller status) display, system storage information display and controller receives external system (device) information display.
2. System status monitoring. The alarm controller should be able to perform a comprehensive status monitoring of the alarm system, including whether the system is operating normally, whether the various equipment in the system is normal (failure, power supply, and damage); the diagnosis of the fault, etc., also includes the operation of the system and the management personnel. Inspections and assessments, etc.
3. Information storage. Storage of the above various information.
(III) Communication
The communication method and network structure of the intrusion detection system are the key to determine the system mode. It needs to complete the upload of the detector's alarm signal and state detection signal, and the controller transmits the system setting and control signals. There are two main forms:
1. Wired way. The most classic system model, regional private network is this way. Its real-time performance is good, it does not achieve immediate alarm through any intermediate links, and it is the least systematic expenditure (price, using equipment quantity), the most reliable and safest way. High-risk unit alarm systems use this approach. In the area of ​​the community, the use of public information networks (telephone, cable TV, and three meters) is also a wired transmission method, but all of them use additional equipment, and all have additional alarm delays.
Security protection technology books usually elaborate on the private line system because it best represents the characteristics of the alarm system. The connection between the detector and the controller is divided into two types: multi-wire system and bus system.
2. Wireless mode. The use of wireless channels and communications equipment to achieve the transmission of alarm information. It has the characteristics of long transmission distance, flexible deployment, good communication links and good security. But wireless communication needs to occupy frequency resources (the state only specifies a few frequency points for wireless alarm frequency), and the additional equipment (transmitting and receiving) has a relatively high price, two-way communication (system status monitoring and function setting requirements )more difficult. In particular, the problem of traffic jams (simultaneous alarms at multiple alarm points) is difficult to solve and the anti-jamming capability is also poor. So, so far there is no real wireless system running.
In a small area, a wireless wireless alarm network (a household, a floor, a small unit) is formed wirelessly, and then the network is connected to the alarm center through a wired method. This is a small wireless + cable method, which is flexible, Practical methods are widely used in home security systems. Both the front controller and the alarm detector have built-in wireless transmitter/receiver units, which form a small wireless system that has all the functions of the alarm system and can communicate with superior alarm centers (through wired or public networks). Therefore, without the problem of resource constraints, building a wireless system does not make any changes to the building and it is very convenient to implement. This form must be self-powered by the front-end detector, so the micro-power and efficient battery of the front-end device is the key.
Obviously, this approach and the local area wireless network (such as Bluetooth technology) and the information network appliance trends are in line with each other, and the technology is also the same, therefore, the small wireless + wired security system is likely with these common Together, technology becomes part of smart buildings and smart homes. This method has also been widely adopted in a wide-area mobile target monitoring system. Wireless is used in small peaks and wired networks are used in large areas, such as terrestrial beacon positioning systems. In fact, the mobile communication network with a small peak structure is also such a structure.
3. The combination of detectors. The guard zone of the alarm system can be understood as the detection range of a detector, and it is also considered as a detection area formed by several detectors. The zone of the alarm controller is the geographic information that represents the alarm signals from different directions. The number of zones that can be distinguished by the multi-wire system is determined by the number of physical terminals, and the bus system is based on the number of address codes. More than one detector can be installed in one zone. These detectors combine to form an alarm signal output. According to the output of the detector, the combination method is divided into series combination and parallel combination.
Serial connection: The alarm output of the detector is set to the normally closed mode, so that several detectors can be connected in series. When a detector alarm occurs, an alarm output can be generated.
Parallel combination: The alarm output of the detector is set to the normally open mode, so that several detectors can be connected together. Any one of the detectors can generate an alarm output when an alarm occurs.
Simple serial connection and parallel combination can increase the detection probability of the system and reduce the false negative rate, but it will increase the false alarm rate. Obviously, multi-wire alarm controllers can only consider several detectors combined as a single detector (precaution zone); the bus system alarm system, if an address code is assigned to each detector in the combination, the system will The alarm of each detector can be identified and integrated to have the intelligent function of judging the authenticity of the alarm.
Second, intrusion detection and alarm technology innovation
Intrusion detection requires fast response to real-time intrusion events, so excellent anti-theft alarm products should seek balance in both performance and reliability.
(A) Intelligent Video Alarm Products for ATM
The embedded hard disk recorder with intelligent identification technology is a new generation of monitoring system developed with embedded system, built-in high-performance audio and video codec chip set, including motion detection, motion tracking, face recognition, pattern recognition and other fronts The integration of technology provides a new solution to the analysis and detection of intrusion alarm behavior. At this stage, it is mainly used in the field of financial security prevention. For example, the TS2302 ATM intelligent identification hard disk recorder currently used in Bank of China and major commercial banks mainly uses AVS/H. 264 video coding technology and dual stream technology, in the completion of the collection of audio and video signals, preview, compression, storage, network transmission and playback functions, for the special needs of ATM machine applications, the intelligent processing of real-time images has been added , identification. At present, it is possible to promptly report alarms and trigger recordings on abnormalities or events such as items left behind, personnel entering, personnel leaving, abnormal keyboard areas, and abnormal bayonet, to assist safety monitoring personnel in detecting and handling abnormal situations in a timely manner. And can make statistics on the number of people in the area. The use of such intelligent identification hard disk recorders can increase the ex post warning to advance warning and greatly reduce the pressure on related personnel.
As China's video intelligent analysis technology continues to deepen, the real-time analysis, alarm, and early warning functions of the surveillance scene will inevitably evolve from the financial sector to the public security, government departments, large venues, aviation, rail transit, shipping, postal logistics, and prisons. Many high-quality, high-demand video surveillance areas and departments play a role.
(II) Video Alarm Controller Products
Combination of video function and alarm function Another technical innovation applied to alarm products is mainly reflected in the dual-routing video alarm monitor capable of realizing video surveillance and alarm monitoring information and communication. When the alarm occurs, the alarm can be uploaded to the network center and the alarm center at the same time. When one route fails, the other route is not affected, which helps improve the reliability of the product. At the same time, according to the needs of the scene, the scenes and sounds of the time were recorded for subsequent evidence collection. The response time of the zone can be set, and different time can be set according to different detectors, thereby improving the accuracy. There are various support modes for the attributes of the defense zone, arming and disarming, and the like. The support mode can be implemented through a mouse operation interface, case programming, remote configuration, etc., and the ease of use is achieved.
This type of product can meet the different needs of different users for multiple video, multiple audio and multiple alarm zones. The storage mode can also be flexibly selected. It can use a small-capacity SD card to store data, and can also support large-capacity SATA hard disk storage of data. For different enterprise networks and individual users, it can meet the needs of large-scale video alarm networking systems, small-scale networking systems, and individual non-network users.
(III) Virtual Technology Alarming Machine
The traditional application mode is when one of the alarms fails and the faulty alarm is turned off to replace another alarming alarm. However, in the process of closing and replacing, if there is a warning, it may not be received and it may delay the handling of the alarm, resulting in a certain loss. The virtual technology alarming machine can make full use of all line cards. Besides high security network monitoring, it can also support dual-system hot backup and hot swap. Dual-system hot backup can realize seamless connection and switching between two police machines, ie, it can be switched without dismantling the machine; hot-plugging technology can directly replace the card inside the receiving machine and replace it without power failure in case of failure. Regardless of which replacement action was performed, the aircraft was in an alarm state from beginning to end.
(D) Intelligent light curtain detector
In the detector, it integrates infrared emission, receives two lenses, and transmits and receives the reflected infrared beam to the monitoring area. By analyzing the signal intensity of the monitored area, it is determined whether there is an alarm. Smart light curtain detectors can use optical lens segmentation technology to form multiple beam combinations to achieve stereoscopic surveillance. It is also possible to intelligently determine whether residents are entering or exiting, or whether they are outsiders, through the length of person's dwell time. When the households enter and exit normally, they will not call the police, but if outsiders want to force the door to enter, an alarm will be issued. In particular, the humanization is that before the strong acousto-optic alarm is linked, the detector first conducts a small-scale voice warning to deter, so that it will not trigger a strong sound and light alarm due to a trigger and affect many people around. The biggest advantages of smart light curtain detectors are: can identify stationary objects or moving objects, the detection range is not affected by the ambient temperature, the alarm time domain can be set, with intelligent functions, and the false alarm rate is extremely low. Small perimeter protection.
(5) Equipment and pipeline inspection management system
For water, electricity, coal, telecommunications, power, petrochemical and other industries and large-scale production enterprises, a large number of various types of production facilities and long-distance pipelines are the basis for ensuring the normal operation of the business, so how to ensure its normal operation has been It is a key point that managers care about. At present, the manual inspection of facilities and pipelines is one of the major operation and maintenance methods commonly adopted by various industries, and it is also a powerful segment to prevent safety accidents. However, there are many deficiencies in the management of manual inspections for a long time. For example, the quality of patrols cannot be effectively controlled, and the inconvenience of site information inquiries and preservation, and the operation information of facilities and pipelines are not effectively accumulated and utilized, which is not conducive to the operation and maintenance of facilities and pipelines.
GREAT facilities and pipeline inspection management system can provide positioning and identification of inspection personnel and facilities and pipelines; retrieval of on-site data and geographical information; input and real-time upload of on-site information; accumulation and excavation of operational data; Assisting decision making. The main technologies used in the system are RFID, GPS, GPRS, GIS, and data mining. Based on electronic tag technology, the device management platform is the core. The system installs a corresponding electronic tag for each device and establishes a corresponding database. The handheld data collector can read, record the address code of the information collection point and the date and time of collection, and at the same time, the status and data of the recording device can be input through the keyboard and LCD screen on the collector. In this way, the data collector can objectively record the time, date and related data of each equipment inspection. The data in the collector can be downloaded to the management computer of the control center at any time, and various statistical reports can be generated automatically through the computer's automatic statistics and analysis. Make sure that the timing equipment is inspected as planned, record the equipment status and related data, and conduct statistical analysis on the data archiving.
In addition to providing inspection time, the inspection quality can be evaluated to ensure the normal development of the inspection work. It also provides the record of the running status of the equipment and the input of the equipment operating data, so that the data can be easily downloaded to the computer. The management software automatically analyzes and processes the statistics and analysis of the operating status and the usage of the equipment. Analyze the historical operating data of the equipment and make decisions for equipment maintenance and replacement.
Third, the development trend of intrusion detection and alarm technology
In recent years, most intrusion detection and alarm products in the domestic and foreign markets have been continuously strengthened in terms of functions, and the types have been gradually refined. Intelligence and network technologies have also been continuously integrated into the intrusion detection field to enable innovation in the industry.
(-) More detailed alarm products
The alarm system detectors (main and passive infrared, microwave, door and window magnetic switches, emergency buttons, glass break detectors, etc.) and control host products are continuously refined in terms of types and types according to different markets and different needs of different users. , update.
Taking the alarm controller product as an example, various types of alarm controllers that can pass PSTN, GSM, CDMA, and 3G transmission modes have appeared, and the development of demand functions such as photographing, SMS/MMS transmission, video transmission, and telephone dialing has been enhanced. . For different users, products installed in public places, the use of metal box-type structure, improve the security; and the face of home products, more stylish design concepts to meet the aesthetic needs of home users.
(II) Restart of International Standards
The development of intrusion detection and alarm technology and the expansion of demand in various market segments have prompted alarm products and technologies to be highly valued internationally. In the past two years, the “Alarm System-Invasion and Robbery System†has been clearly defined in the draft of the “Alarm System-Invasion and Robbery System†issued by the Secretariat of the International Electrotechnical Commission's Alarm System Technical Committee (IEC/TC79). In points, the requirements for alarm technology and products have all been improved to varying degrees.
The international standards include "alarm systems - intrusion robbery systems - part 2-2: intruder detector - passive infrared detector", "alarm system - intrusion robbery system - part 2-3: microwave detector technical requirements", " Alarm System - Intrusion Robbery System - Part 2-4 Technical Requirements for Passive Infrared and Microwave Composite Detectors, "Alarm System - Invasion and Robbery System - Part 2-5 Technical Requirements for Passive Infrared and Ultrasound Composite Detectors", and "Alarm System - Intrusion and Robbery Systems - Part 3: Control and Pointing Devices, and Alarm Systems - Intrusion Robbery Systems - Part 4: Alarm Devices, etc. The standard clearly states the technical requirements for the subdivided products such as front-end detection equipment, alarm equipment, and wireless equipment of the alarm-intrusion robbery system. From the presentation of international standards and the development process, we can clearly see the trend of subdivision and standardization of alarm technology and alarm products.
(III) Higher requirements for intelligent and networking functions
With the development of anti-theft alarm market, traditional anti-theft alarm products and alarm system networking methods have been unable to meet the growing market demand. The improvement of intelligence and networking requirements has become the driving force behind the development of anti-theft alarm systems.
The requirements for intelligence are mainly reflected in two aspects. On the one hand, it refers to the intelligent requirements for stand-alone products, such as convenient setting/disarming and user-friendly operation interfaces.
The "Alarm System-Invasion and Robbery System-Part 4: Alarm Devices" and "Alarm System-Invasion" proposed by the International Electrotechnical Commission's Alarm Technical Committee (IEC/TC79) on the draft of the "Alarm System-Invasion and Robbery System" International Standard The Robbery System - Part 2-2: Intruder Detectors - Passive Infrared Detectors puts forward the requirements for the intelligence of stand-alone products.
Another aspect of intelligent implementation is the intelligentization of the network. Biometrics, speech recognition, and image recognition type products are added to the alarm system network to improve the intelligence of the alarm system and improve the accuracy of the alarm system.
With the development of network technology, wireless technology and GSM/CDMA/3G networks, the networked intrusion detection and alarm system has the necessary prerequisites. At present, there are many manufacturers on the market dedicated to alarm network operation services, especially for enterprises that monitor alarms in specific industries and fields. Based on the needs of users, a business network integrating alarm system and video surveillance system functions is established to make alarm control. The device tends to develop the integration of control host functions and hard disk recorder functions.
(IV) Increasing demand for equipment functions
While the alarm products are being subdivided, the functions of the equipment have also been continuously improved and strengthened. Mainly manifested in the anti-theft alarm controller can be through the remote telephone keypad to arm / disarm, listen to live sound, open / close siren, play voice, query alarm type and system status and alarm detectors, adjustable frequency, anti-blocking, anti-spray Cover and vandal-proof functions. In addition, some new technologies such as biometric identification, speech recognition, and image recognition will also be introduced into the alarm control system.
(E) Stability, Reliability, Aesthetics, and Expandability
Product performance and appearance have also been improved while adding functionality. Mainly in the following aspects: more stable / reliable: If the detector needs to be resistant to RFI (radio frequency interference) / EMI (electromagnetic interference), lightning protection, etc., to adapt to harsh climate; more beautiful, compact appearance: to comply with The demand for interior decoration with ever-increasing taste; more convenient expansion: providing a variety of interfaces, such as RS232, RS485, etc., easy to integrate other devices.
At present, intrusion detection technologies such as infrared radiation, laser radiation, and vibration cables are mature technologies and are widely used, and will remain the mainstream of the market in a short period of time. However, with the development of intrusion detection technology based on video motion analysis and detection technology, this new technology will receive more and more attention from people, its application will become more and more extensive, and its adaptability will become stronger and stronger. Will become the protagonist of the future intrusion detection technology market.
PVC High Speed Door are designed for indoor use and ensure rapid handling operations between different areas that should remain separated. These safe and efficient industrial doors are made of a shaped steel frame and covered with PVC. These high speed doors are safe and efficient and consist of a shaped steel frame covered with PVC. Safety is ensured by their photocells and barriers.
High speed doors protect us from harm, save energy and help us to separate processes for optimal productivity. A high speed door's most important job is to simply open and close quickly and safely every time you need it.
The high speed pvc roll shutter door require high strains, caused by the high operating speed and the frequency of openings, have to be taken into account during construction. In the same way, basic conditions like size and installation location add up to considerable requirements regarding safety and control technique.
PVC High Speed Door,Large PVC High Speed Door,Transparent High Speed Door,Great Performance High Speed Door
Shenzhen Hongfa Automatic Door Co., Ltd. , https://www.hfgaragedoor.com