In 2010, a calm and extraordinary year. Compared to the turmoil in the 2008 financial crisis and the Wenchuan earthquake, the peace in 2010 was reassuring. Compared to the dullness of 2009, the successful hosting of the 2010 Shanghai World Expo and the Guangzhou Asian Games were in full swing. ordinary. In 2010, the burglar alarm system in the security industry also began to be unwilling to be mediocre. It wanted to make a steady change and draw a few strokes for the design of the new layout.
Rejecting a missed/false alarm There is a new trick/false alarm that can be said to be a stubborn object of the technical battle of burglar alarm systems. The loss caused by leak/false alarm is by no means a simple waste of manpower, material resources, and financial resources. The greater cost is that the leakage/false alarm over time will reduce the sense of danger to the user and may eventually lead to disaster. "Hills must be removed first." To truly eliminate leaks/false positives, only technically. At the 2010 Beijing Expo, there were manufacturers demonstrating new ways of “refusing to report false positivesâ€.
1, two-way wireless technology, confirm the signal feedback anti-theft alarm system wireless detection technology has never been rare, has long been there, such as domestically made Kelixin, night wolf security, time, etc.; imports such as Honeywell, DSC, BOSCH and other manufacturers, Its anti-theft alarm system is equipped with wireless detection technology. The main advantage of wireless connection is that it eliminates the wiring troubles and the construction and installation are relatively simple. Therefore, wireless alarm products have attracted much attention in the application market. But its shortcomings are also obvious, such as the signal vulnerable to interference, debugging slightly more trouble.
The traditional wireless detection device has a defect, namely, whether the host successfully receives the alarm signal after the current-end detector detects that the alarm is sent to the host, both parties are not known, and such problems often cause great confusion to the user. . However, in this exhibition, Israel's RISCO's latest Agility wireless alarm system, its two-way wireless confirmation technology can be a good solution to such problems. When the front-end detector sends an alarm signal to the host, when the host successfully receives the alarm signal, it immediately returns a confirmation signal to the front-end detector to ensure the correct transmission of the alarm signal and achieve the purpose of timely confirmation and handling. It can be said that two-way wireless confirmation signal feedback technology is still rare in alarm products.
2. Electromagnetic environment and detector status monitoring The convergence of wired and wireless detection technologies is now the most common and mature form of application in burglar alarm systems and has been accepted by the market. However, with the increasing seriousness of wireless electromagnetic interference, the application environment has become very complicated, which has also hindered the application of wireless devices. The key issue is that traditional technologies cannot provide corresponding responses based on the environmental electromagnetic interference and the status of the front-end wireless detectors. Technical measures have caused the detector to be affected by environmental electromagnetic interference, weakening of the strength of the wireless detector signal, shortage of detector battery power, and the like, which makes the system unable to work properly and seriously affects the effective transmission of alarm information, which also leads to detection. The detection distance of the device becomes shorter, does not work, leakage/false alarm and other phenomena occur frequently. In this regard, at the 2010 Expo, some manufacturers introduced a wireless alarm system with an installation point electromagnetic environment, wireless detector signal status, and wireless detector battery power automatic monitoring technology, such as Israel's RISCO's Agility alarm system. It has the functions of environmental background noise, wireless detector signal strength, and wireless detector power state detection function. It can visually display the background noise size, detector signal strength, and detector electrical energy storage capacity in digital form on the system operation keyboard. It will be very convenient for engineering personnel and users to select the most suitable installation scheme and replace the battery with the detector in time, so that the alarm system will always be in a good working condition, not just a decoration.
The new detectors are the earliest applied technologies in security systems. The technology is relatively simple, such as infrared (main and passive), microwave, and digital processing. In general, after years of accumulation, alarm detection technology has become more mature. In recent years, nothing has been done on the basis of the original technology, so people feel that there has been little innovation in the development of the detector technology in recent years, and many manufacturers only work hard on the appearance and convenience of installation, such as the essence of domestic production. The detectors of Long, Momentive, Kelixin, Ai Lifu, etc. and some foreign brands have become more and more exquisite in appearance. Take the series of infrared detectors introduced by Ai Lifu as an example, the shell changes the upper outlet to a streamlined one. Under the outlet design, can play a very good waterproof effect. Therefore, the continuous improvement of the appearance and the shell, the continuous improvement of the internal circuit board and the improvement of the anti-jamming performance are all directions in which the detector product has improved its performance in recent years.
Although the overall development of the detector technology seems to be calm, the highlights of the 2010 Expo have become more apparent. The OPTEX launch of a novel detector using laser scanning technology has always let visitors stop and return. The laser scanning detector continuously performs laser scanning on the protected area at a rate of 20 times/S, a radius of 30 meters, and a range of 180 degrees, and its operation is basically not affected by environmental interference. It can be installed horizontally or vertically, with a radius of 30 meters semi-circular protection, and the vertical installation can be protected as a perimeter.
The detector can divide the semi-circular area into 4 detection zones, corresponding to 4 groups of dry contact outputs respectively. Through the 4 groups of outputs, various alarm linkage devices (systems) can be connected. In addition, the detector comes with a built-in network interface in the embedded mode. It does not need to pass through the alarm host and can be directly connected to the upper management computer. Vendors can randomly provide management platform software. The host computer loaded with the platform software can manage multiple detectors of this type. Each detector can be networked with the back-end management platform. When a mobile object invades, the back-end platform displays. Can accurately display the object's intrusion position, size, speed, and the distance from the detector, and real-time tracking and recording the alarm status of the invader movement trajectory. It is understood that in 2011, the detector will fully enter the Chinese market. The current price of this detector is still high, and it is mostly used in high-end areas such as airports, finance, and important government departments.
The emergence of a new type of network alarm host in alarm network has two meanings. One is the networking for detectors, and the other is the networking for regional alarm centers. For detector-oriented networking, the current control consoles are equipped with: wired multi-wire system + wired bus system + wireless, where wired bus has RS485, CANBUS, vendor-specific bus (such as HONGWELL, BOSCH, DSC) and other methods. Various types of mainframes are different and varied, with the aim of extending the scope of protection, expanding the number of detection zones and improving the convenience of use.
And with the regional alarm center network, the alarm host on the market today also has many forms of networking technology, such as the use of telephone line networking, TCP/IP networking, telecommunications wireless GSM networking, TCP/IP module built-in TCP/IP protocol, The alarm control host has a multi-network automatic alarm function. The regional alarm center has a professional alarm handler and load management software to manage the computer. This enables hundreds of front-end alarm masters to realize large-scale and multi-form networking through telephone or TCP/IP or telecommunication wireless networks. .
The general functions of the above-mentioned networked alarm host are very complete, and its basic functions and extended functions are mainly: zone settings, alarm response, keyboard programming, disarming operation, linkage control, and zone multi-mode expansion (multi-line + bus + wireless) And so on, and some control consoles will have simple automatic control (timetable) functions, access control functions, so-called everything.
In addition, the current alarm control host operating keyboard not only has a large LCD screen, but also displays more and more information. It not only displays alarms, but also displays all system event and status information. All of these technologies can be selected at random at this year's Expo and have highlighted that these technologies are no longer the patents of foreign brands. Most of the domestic brands have also demonstrated strong technical strength. .
As Liu Aiguo of Nanjing Ying Ante Industrial Development Co., Ltd. introduced: “The network function of some alarm consoles only adds a network module to its mature alarm host, which is only a copy of the keyboard function in terms of function. Such network methods The major drawback is that in the event of a problem with the network module, the control host cannot be monitored at the first time, because the IP module is not truly detected by the host, and the network module and the mature alarm host are not truly integrated, so from the real In a sense, this type of network alarm host is not a true network alarm control host." The network alarm control host launched by Inventec has realized the replacement of the traditional alarm host. The 32-bit ARM processor is used. In addition to all the aforementioned controller functions, a built-in network interface is provided to support various IP network accesses. The terminal's operating platform can view the working status of the alarm host in real time. It is no longer simply copying the keyboard function, but can upload all host status, system events, and the like to the regional alarm center.
The overall situation of alarm monitoring and integration has been determined. In addition to the emergence of a powerful multi-network alarm host, another development trend of the alarm system is the integration of alarm and monitoring. I believe this is also a consensus in the industry. At present, most of the domestic integrations are integrated with front-end alarm systems and monitoring systems that exist independently at the back end in a hardware low-level manner. This is also the most traditional integration method in the past; however, there are also some manufacturers that have truly integrated the two systems. Integration, such as the digital network alarm video server launched by Meitech and the network alarm video linkage server launched by Quanzhou.
Network alarm video server can be said to be an example of organic integration of video surveillance and alarm systems. It is combined with alarm technology and H. 264 An alarm video surveillance system developed by video compression technology. In the armed state, when there is an object triggering the alarm at the current end, the video recording will be automatically started, and the video will be recorded 60 seconds before and after the alarm, and then the alarm and video will be recorded. Instantly upload to the network center; at the same time, the client can automatically retrieve the surveillance video when the alarm signal arrives. The alarm management center operator or the security service center can instantly check whether it is a false alarm. If the police intelligence is true, then the phone voice Or inform the user by SMS.
In addition to the video verification function, this type of system also has a video motion detection function. In the armed state, the system monitors the scene in real time. When there is a mobile object intrusion, the system will automatically alarm and upload the video recording to the back-end center. Effectively reduce the occupancy of video files to the storage device space, and at the same time achieve the video alarm function. The system integrates anti-theft alarm, video server and IE browsing. One device can meet a variety of security requirements, effectively reducing the user's expenditure on equipment costs. The system has been widely used in factories, shopping malls, chain operations, communities, smart buildings and other places.
Perimeter Precaution: Installation Prevention Smarter Perimeter prevention systems are generally deployed in the perimeter boundary wall or in the outer wall of the interior building, often as the first link in the security system. When an object crosses an intrusion, it can threaten the intruder and at the same time, it can promptly notify the security personnel to rush to the place where the crime occurred. For a long time, the perimeter alarm detection has adopted more mature active infrared radiation technology. However, due to the fact that the technology is vulnerable to environmental factors, the technology, despite its satisfactory price, often has flaws in its leak/false positives. Headache; The pulsed cable perimeter alarm system that emerged, undoubtedly, the pulse cable system at a significant increase in price at the same time, the alarm performance has also been greatly improved, the false alarm rate of leakage is also significantly lower than the active infrared, but corresponding The difficulty of construction and the amount of works are also greatly increased. Storms, rain, trees, etc. will also interfere with the construction. The amount of construction and maintenance work is very large.
Of course, there are other technologies in recent years, such as sensing cable technology, which has a serious lack of active prevention and deterrence.
Now, we have introduced the fiber perimeter protection system, which is an alarm platform based on fiber-optic sensing technology capable of sensing weak vibration signals. The sensing fiber can be arbitrarily installed on the fence, underground or wall, and the intruder is trying to climb. Vibration will change the mode of light transmission, after analysis and processing by the signal processing unit, thus giving an alarm signal for intrusion.
The perimeter alarm technology adopts ordinary optical fiber cables as distributed sensors. The advantages are obvious: there is no electromagnetic radiation interference, and it is not affected by the electromagnetic, weather, and geographical environment of the environment. It has strong anti-interference ability and is not affected by EMI and lightning strikes. Outdoor components are passive devices. For example, at the 2010 Expo, Beifang Guo'an and Ningbo Norco launched a fiber-optic signal perimeter protection system that has made new technological breakthroughs.
·Intelligent learning function. The biggest troubles of the perimeter prevention system are that it is vulnerable to the outdoor environment, and it is easy to report false alarms and omissions, especially when storms occur, or the vibrations of passing vehicles, aircraft takeoffs and landings, etc., often lead to accidental missed timing. The perimeter protection systems launched by Beiyou Guo'an and Ningbo's Nokor have developed intelligent learning functions. They learn and memorize environmental conditions through “self-learning†techniques. When they are officially running, similar environmental conditions can be masked. For example, false alarms, such as wind, rain, and small animal activities, can be automatically “deletedâ€, making the detection of real intruder signals optimal.
One fiber goes to the end technology. As we all know, in the past, the fiber perimeter protection system used a single zone to deploy a cable. The biggest drawback of this kind of system is that the amount of fiber engineering is large, and Ningbo Nocco's fiber signal feedback system realizes that only one fiber is laid from the perimeter to the perimeter, and when an intrusion occurs at a certain position along the fiber laying The back-end control platform can accurately detect the location of the intrusion point. This system not only saves the amount of fiber cabling, but also saves the manpower and material cost of troubleshooting the exact location of the intrusion.
Summary: Integration is a major trend As can be seen from this 2010 AMB, alarm equipment manufacturers have made breakthroughs in the technology of front-end products (detectors and control consoles) of burglar alarm systems, in addition to back-end management. The software operation of the platform has also been greatly improved. At the exhibition, we have seen a very powerful management platform. In the past, users used more foreign alarm platform products, resulting in the operating interface is mostly displayed in English. It is worth noting that, at the 2010 Expo, the author was pleased to discover that there was a full Chinese software interface. For domestic users, the operation will be even more Simple and user-friendly.
On the other hand, as far as the aforementioned integration is concerned, the low-level linkage of alarm + monitoring + access control hardware is not new. The next major development is the integration of alarm + monitoring + access control from the software's integrated management platform. TYCO recently launched an integrated management platform system, which can integrate the alarm + monitoring + access control software through the agreement in the back-end management platform to ensure the first time when the alarm occurs, start the TV monitoring and access control system. Interaction, real monitoring, real-time control of access control.
It is also a time for us to welcome the new arrival time. I believe that China's anti-theft alarm industry has a “star fire†in 2010 and will surely realize the “Origin of the†in 2011. Let us wait and see.
Household Automatic Balanced Door is the new Automatic Door type developed by Ningbo Gdoor automatic door R&D group. The operating mode of Household Balanced Door is totally different from Automatic Sliding Doors. Household balanced door operator drives two door leaves till door leaves keep parallel with walls, which enhances space and achieve optimization. Imported door hardwares and self-developed balance door spare parts are installed on the household balanced door operator. Automatic Balanced Door for household is suitable for study,parlor room, etc..
Household Automatic Balanced Door
Household Automatic Balanced Door,Household Balanced Door,Automatic Doors,Household Automatic Door
Ningbo Gdoor System Control Technology Co., Ltd. , http://www.gdoor-cn.com