Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
This work develops an innovative perimeter loop configuration aimed at surpassing the limitations of conventional alarm systems. The proposed design enables the integration of a large number of sensors into a single monitoring loop, using only two connecting wires, and is compatible with the commonly used normally closed (NC) connection. The custom perimeter system features simplified installation with the use of standardized parametrizing resistors, and includes a calibration method to enhance detection accuracy. A prototype was tested with 20 magnetic contacts, demonstrating that wire resistance and the tolerance of parametrizing resistors are critical factors influencing system performance. In practical trials, a maximum of 15 sensors could be reliably detected. However, the introduction of calibration procedure allowed for an increased detection of up to 20 sensors. The system, which can handle numerous closely spaced control points, also features battery backup capability to ensure operation during power failures. Overall, the system effectively manages complex monitoring requirements and provides reliable performance under various conditions.
Rocznik
Tom
Strony
33--48
Opis fizyczny
Bibliogr. 29 poz., rys., tab., wykr.
Twórcy
autor
- Department of Electronic and Telecommunications Systems, Rzeszów University of Technology, ul. Powstańców Warszawy 12, 35-959 Rzeszów, Poland
autor
- Department of Electronic and Telecommunications Systems, Rzeszów University of Technology, ul. Powstańców Warszawy 12, 35-959 Rzeszów, Poland
Bibliografia
- [1] G. Vardakis, G. Hatzivasilis, E. Koutsaki, N. Papadakis “Review of Smart-Home Security Using the Internet of Things,” Electronics 2024, vol. 13, no. 3343. doi: 10.3390/electronics13163343.
- [2] T. Shi, P. Guo, R. Wang, Z. Ma, W. Zhang, W. Li, H. Fu, H. Hu, “A Survey on Multi-Sensor Fusion Perimeter Intrusion Detection in High-Speed Railways,” Sensors 2024, vol. 24, no. 5463, doi: 10.3390/s24175463.
- [3] Andreas, C. R. Aldawira, H. W. Putra, N. Hanafiah, S. Surjarwo, A. Wibisurya, “Door Security System for Home Monitoring Based on ESP32,” Procedia Computer Science 2019, vol. 157, pp. 673-682, doi:10.1016/j.procs.2019.08.218.
- [4] M. H. Assaf, R. Mootoo, S. R. Das, E. M. Petriu, V. Groza, S. Biswas, “Sensor based home automation and security system,” 2012 IEEE International Instrumentation and Measurement Technology Conference Proceedings, Graz, Austria, 2012, pp. 722-727, doi: 10.1109/I2MTC.2012.6229153.
- [5] M. Kijima, Y. Miyagaw, H. Oshita, N. Segawa, M. Yazawa, and M. Yamamoto, “Poster Abstract: Multiple Door Opening/Closing Detection System Using Infrasound Sensor,” 2018 17th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), IEEE, Apr. 2018, pp. 126-127, doi: 10.1109/IPSN.2018.00026.
- [6] S. Smith, J. Ellis, R. Abrams, “Chapter 8 - Central Alarm Stations and Dispatch Operations”, Editor(s): IFPO, “The Professional Protection Officer”, Butterworth-Heinemann, 2010, Pages 89-103, ISBN 9781856177467, doi: 10.1016/B978-1-85617-746-7.00008-0.
- [7] George Risk Industries, Inc., “Magnetic Contacts with Built-In E.O.L Resistors and Resistor Packs,” www.grisk.com, access on 2024-11-12.
- [8] H. Ali, H. Medjadba, L. M. Simohamed and R. Chemali, “Intrusion detection and classification using optical fiber vibration sensor,” 2015 3rd International Conference on Control, Engineering & Information Technology (CEIT), Tlemcen, Algeria, 2015, pp. 1-6, doi: 10.1109/CEIT.2015.7233060.
- [9] M. Verma, R. S. Kaler, and M. Singh, “Sensitivity enhancement of Passive Infrared (PIR) sensor for motion detection,” Optik (Stuttg), Oct. 2021, vol. 244, p. 167503, doi: 10.1016/j.ijleo.2021.167503.
- [10] M. E. Kalinkina, A. G. Korobeynikov, O. I. Pirozhnikova, N. A. Shmakov, and V. L. Tkalich, “Designing of reed switches for sensors and security alarm devices,” IOP Conf Ser Mater Sci Eng, Feb. 2021, vol. 1100, no. 1, p. 012009, doi: 10.1088/1757-899X/1100/1/012009.
- [11] T. Li, D. Han, J. Li, A. Li, Y. Zhang, R. Zhang, Y. Zhang, “Your Home is Insecure: Practical Attacks on Wireless Home Alarm Systems,” IEEE INFOCOM 2021 – IEEE Conference on Computer Communications, Vancouver, BC, Canada, 2021, pp. 1-10, doi: 10.1109/INFOCOM42981.2021.9488873.
- [12] S. Ramadhani and D. P. Putri, “Design of a Home Door Security System Based on NodeMCU ESP32 Using a Magnetic Reed Switch Sensor and Telegram Bot Application,” Sinkron, Oct. 2023, vol. 8, no. 4, pp. 2059-2068, doi: 10.33395/sinkron.v8i4.12688.
- [13] M. Boroš, A. Vel’as, V. Šoltés, J. Dworzecki, “Influence of the Environment on the Reliability of Security Magnetic Contacts,” Micromachines 2021, vol. 12, no. 401, doi: 10.3390/mi12040401.
- [14] M. Boroš, A. Vel’as, Z. Zvaková, V. Šoltés, “New Possibilities for Testing the Service Life of Magnetic Contacts,” Micromachines 2021, vol. 12, no. 479, doi: 10.3390/mi12050479.
- [15] A. S. Devi, A. K, B. C, A. Shali, D. Kavitha, and S. Hemavathi, “Smart Security System,” in 2022 1st International Conference on Computational Science and Technology (ICCST), IEEE, Nov. 2022, pp. 1–3, doi: 10.1109/ICCST55948.2022.10040301.
- [16] K. Jakubowski, J. Paś, A. Rosiński, “The Issue of Operating Security Systems in Terms of the Impact of Electromagnetic Interference Generated,” Energies 2021, vol. 14, no. 8591, doi: 10.3390/en14248591.
- [17] G. Uçtu, M. Alkan, İ. A. Doğru, M. Dörterler, “Perimeter Network Security Solutions: A Survey,” 2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Ankara, Turkey, 2019, pp. 1-6, doi: 10.1109/ISMSIT.2019.8932821.
- [18] V Mach, A. Mizera, P. Stoklasek, M. Karhankova, M. Adamek, M. Bednarik, “Development of a Contact Glass-Break Detector for the Highest Security Level,” Sensors 2024, vol. 24, no. 97, doi: 10.3390/s24010097.
- [19] P. Teixidó, J. A. Gómez-Galán, R. Caballero, F. J. Pérez-Grau, J. M. Hinojo-Montero, F. Muñoz-Chavero, J. Aponte, “Secured Perimeter with Electromagnetic Detection and Tracking with Drone Embedded and Static Cameras,” Sensors 2021, vol. 21, no. 7379, doi: 10.3390/s21217379.
- [20] H. Xu, Y. Li, C. Ma, L. Liu, B. Wang, J. Li, “A Combined Sensing System for Intrusion Detection Using Anti-Jamming Random Code Signals,” Sensors 2022, vol. 22, no. 4307, doi: 10.3390/s22114307.
- [21] Ropam Elektronik, “Porównanie central i terminali Ropam Elektronik”, (Product Catalogue), ropam.com.pl, access on 2024-11-12.
- [22] Ropam Elektronik, “NeoLTE-IP-64, Neo-IP-64, NeoGSM-IP-64 Centrale alarmowe z komunikacją LTE/IP,” (Installation Instructions), Document version: 2.0, 2023-01-23, ropam.com.pl, access on 2024-11-12.
- [23] A Tyco International Company DSC, “PowerSeries Neo HS2016/HS2016-4/HS3032/HS2064/HS2064E/HS2128/HS2129 E Alarm Controller Reference Manual,” (Product Catalogue), docs.johnsoncontrols.com/dsc, access on 2024-11-12.
- [24] A Tyco International Company DSC, “CENTRALE ALARMOWE HS2016/HS2032/HS2064/HS2128,” (Installation and Programming Instructions), Document version 1.1, www.montersi.pl, access on 2024-11-12.
- [25] Paradox, “SP Spectra. Control Panel Comparision Chart,” paradox.ee, access on 2024-11-12.
- [26] Paradox, “Magellan/Spectra SP. Reference & Instalation” paradox.ee, access on 2024-11-12.
- [27] Satel, “Made to Protect,” (Product Catalogue), 2024, www.satel.pl, access on 2024-11-12.
- [28] Editorial Staff, “Why we use End of Line (EOL) Resistor in Fire and Gas System?”, Control and Instrumentation, www.controlandinstrumentation.com, access on 2024-11-12.
- [29] System Automatycznej Kontroli Obiektu, “Parametryzacja NO/NC, EOL i 2EOL w systemach kontroli dostępu i alarmowych: Zalety parametryzacji wejść i stany konfiguracji” (NO/NC, EOL and 2EOL parameterization in access control and alarm systems: Advantages of input parameterization and configuration states), GMP Power, 21 November 2023, sakokd.pl/blog, access on 2024-11-12.
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa nr POPUL/SP/0154/2024/02 w ramach programu "Społeczna odpowiedzialność nauki II" - moduł: Popularyzacja nauki (2025).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-eb5e8a73-3c20-4916-886c-a384f88c2c6e
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.