News
Industrial
Application Analysis of Microvibration Sensor in Security System
With the rapid development of network communication technology, network prevention technology and multimedia technology, the society has put forward higher requirements for the practicality, stability and reliability of security systems. At the same time, the traditional laser beam, infrared radiation, vibrating fiber can not meet the ever-changing security needs, the society's desire for more advanced and better security systems is increasing.
The Western Zhou's perimeter security system is different from the traditional laser beam, infrared beam, and vibrating fiber that can only obtain linear and planar signals. Instead, it uses a micro-vibration sensor to detect the ground vibration source. A system-wide perimeter security system with sensor information synthesis algorithm. By passing the signal to the cloud, the cloud quickly records the data and processes the data, which is then passed to the terminal. The whole process covers “perception-alert-alarm-alarm-tracking”, from the sensing data to the terminal, the process does not exceed 5 seconds.
The West Malaysian perimeter security system is like a protective circle for Sun Wukong’s paintings by Tang Wu
Anyone who has read "Journey to the West" knows that the "Three Beats of White Bone" collection, Tang Yan is tired, let Sun Wukong go to fast, Wukong said: "Master, I know that you are not sitting, I am with you." "When the golden hoop is taken, it is shaken, and a circle is drawn around the flat. Please sit down in the middle of the road, and let the eight rings and the sand squatting around, put the horse and the luggage close.
To the Tang Dynasty, he said: "This circle of the old Sun painting is like the wall of the copper wall. With his wolves, tigers and leopards, monsters and monsters, you can't get close but only let you go out of the circle, just sit in the middle and pack you innocent; But if there is a circle, it will be poisoned. Ten million! To the end! To the end!"
After saying this, Sun Wukong went away for thousands of miles, and then the pig said that it was a painting of the prison, and that the Tang Dynasty broke out of the circle, and then went into the monster cave, stole the vest and was caught.
The concept of modern security coincides with the protection circle of Sun Wukong's paintings. The West Coast’s perimeter security system is one of the most ingenious.
The difference is that the West Horse has added vibration detection and precise positioning outside this protection circle, and realized the “perception-alert-alarm-alarm-tracking-catch” to realize the whole process tracking, and simultaneously link video surveillance to confirm the alarm. And trigger video analysis to perform video tracking.
In the protection circle of Tang Yan, the monster is 10 meters away from the protection circle, Wukong can receive the signal of the monster coming; when the monster is close, it will make a sound and warn the light drive away; when the monster touches the protection circle, Wukong will be based on The size of the monster mana received different levels of tips. After Goku came back, he was able to know which monsters came to do according to the video surveillance, and tracked where the monsters brought Tang Yan.
So what are the advanced technologies used in such a magical system, and in which areas can they be applied?
The micro-vibration sensor is the core of the West Malaysian perimeter security system.
The Western Martial Security System utilizes the modern bionics principle to combine electronic domes, guns, drones, intelligent terminals, main control platforms, microphones, etc. by using intelligent microvibration sensors based on a certain topological structure. The network system can provide users with closed-loop intelligent security services for target discovery, location, identification, alarm, tracking, capture and drive-off.
The so-called bionics is the working principle of the structure and function of people's graduate objects, and invents new equipment, tools and technology based on these principles to create advanced technologies suitable for production, learning and life. Bionics believes that certain organisms have so far been much more versatile than any artificially manufactured machine, such as information acceptance (sensory function), information transmission (neural function), automatic control systems, and so on.
The Western Margin's perimeter security system is a pseudo-snake spider's sensitive perception of the surrounding environment. It uses physical methods and electronic techniques to detect the illegal intrusion and destruction in the target setting area in real time, and to make sound and light. Alarms such as electricity and electricity provide pre-warning and disposal countermeasures for the duty personnel.
The system includes a buried micro-vibration sensor, a wall-mounted micro-vibration sensor, a force sensor, a ball machine, a gun machine, a drone, a microphone, a cloud server, a smart terminal, a weather sensor, a eagle eye camera, an unmanned vehicle, and the like.
Westerner's perimeter security system
Exploring the relative advantages of other perimeter security technologies
In recent years, the perimeter security system has become more and more perfect. From information perception to uploading the cloud to passing to the terminal, the whole process is getting better and better. However, the core of the whole world is whether it can quickly capture and sense abnormalities. Intrusion information. In recent years, there are mainly the following types of detectors:
1. Infrared radiation: high false positive rate, has been gradually eliminated in the past two years;
2. Laser beam shooting: the false alarm rate is lower than infrared, but the line detection is used. Once the intruder avoids the laser line, the system will not be able to identify it;
3. Pulse electronic fence: It has certain physical protection function. When someone climbs or destroys the fence, it will generate low current and high voltage, shoot down the intruder and send out an alarm signal at the same time. The product has reliable alarm and works in the field. Without any environmental impact, the false alarm rate is extremely low, but because high voltage and low current have certain side effects on human body safety, it is not recommended in the industry;
4. Vibration Cable: The electret vibration cable is a coaxial cable with a permanently preset charge after special charging.
Its advantage is that it is easy to install and can be installed on the barbed wire fence or fence. The disadvantage is that it is susceptible to electromagnetic wave interference, easy to be struck by lightning, and the false alarm rate is high in bad weather;
5. Vibrating fiber: suitable for long-distance vibration signal transmission, currently replacing the alarm of vibration cable;
6. Leakage cable: It belongs to the anti-theft alarm device. This product is based on the principle of electromagnetic induction for anti-theft alarm. It is generally used in prisons, oil depots, etc.
7. Microwave radiation: It consists of a transmitter and a receiver. During operation, a three-dimensional invisible microwave detection area is formed between the transmitter and the receiver, and the intruder is detected by the principle of field interference or beam blocking. The advantage is that it is not affected by bad weather, the human eye is completely invisible, intangible, and has good confidentiality. The disadvantage is that it is interfered by the radar and is not suitable for the area where the radar is used.
The Western Marathon's perimeter security system uses a micro-vibration sensor that can be buried or hanged. The system uses a spherical detector to stereoscopically sense anomalies or intrusions, and the system will immediately generate an alarm signal. The passive detector is highly concealed and cannot be seen or touched by the human eye, nor will it be perceived by the detector. Affected by bad weather, reliability and stability are superior.
Wide range of applications
The Westman perimeter security system is widely used and is suitable for almost all areas that require security maintenance. Typical scenarios are as follows:
Airport
The airport has very high requirements for security. Generally, the airport perimeter is relatively long and the surrounding environment is complex. If the airport perimeter security monitoring system is to operate stably and reliably for a long time, it must have a high alarm rate and a low false alarm rate. Various disturbances caused by natural environment and airport take-off and landing noise. Based on the importance of airport perimeter security settings, more advanced technical solutions must be used to take on the responsibility of airport perimeter security.
The perimeter security of the airport has the following characteristics:
(1) High security level;
(2) The perimeter distance is long (about 10km from the regional airport and 20km from the large international airport);
(3) Requires long-term stable operation of the system, with high requirements for lightning protection and electromagnetic radiation;
(4) The environment is complex and there are many external sources of interference (natural environment/aircraft takeoff and landing);
(5) It needs to be linked with other security devices (such as video linkage).
The Western Marathon's perimeter security system can completely solve the airport security mission, mainly in:
(1) The reaction speed is fast, from the discovery of intrusion to the receipt of communication by the guards, the whole process does not exceed 5 seconds;
(2) A buried scheme with an accuracy of less than 1 m can be provided, and the recognition accuracy is high, and the wall-mounted scheme can recognize a range of less than 5 meters;
(3) High reliability, can run for 365 days in the year without downtime, even if there is abnormal power failure, the data will not be lost;
(4) Low failure rate;
(5) The system includes ball machines, guns, and drones, which can provide real-time monitoring and meet the needs of video linkage.
2. Prison:
The particularity of prison management objects determines that the application of security systems is more important and complex than other organizations or departments, and the requirements for perimeter security are also higher. The prison security system has the following characteristics:
(1) The defense level of the fence and the warning zone is high, and it is necessary to make an accurate judgment on the behavior of the intrusion warning zone;
(2) The wall needs to be covered by a high voltage grid;
(3) The alarm forecast requires multiple linkages;
(4) There are higher requirements for the mobile positioning of personnel;
(5) The speed of the early warning, identification, alarm, tracking, and arrest processes is extremely high.
The West Malaysian perimeter security system can meet the above requirements:
(1) When someone invades the warning zone, the system will issue a voice and light warning, and transmit the alarm and coordinate information to the main station. The main station records, displays, and announces the location of the alarm with voice;
(2) When there is any change in the warning area, it can quickly predict, perceive, and identify, and quickly provide abnormal information to the guards;
(3) Ability to identify the enemy and the enemy;
(4) If there is an attack or other emergency situation, the emergency alarm button can be pressed on the site.
The monitoring center screen can quickly display the location of the emergency situation and relevant information on the site to realize coordinate positioning, attendance management, patrol management, activity track management and Quick alarm and other requirements.
Pre:How does the load cell help in garbage collection? 2025-09-30
Next:What is a Load Sensor? 2025-09-30