Traditional Culture Encyclopedia - Traditional stories - Talking about the Security Monitoring System of Intelligent Building?
Talking about the Security Monitoring System of Intelligent Building?
Home Legal Paper Accounting Paper Financial Paper Architectural Paper Medical Paper Computer Paper Free Legal Paper Free Accounting Paper Marketing Paper Graduation Paper Moral Education Paper Party School Paper MBA Consultation Competition Speech Application for Joining the Party Free Architectural Paper Human Resources Paper Free Opening Report Work Summary MBA Paper Social Practice English Learning Professional Manager Personal Resume Free Computer Paper Enterprise Management Paper Student Review Thought Report Personal Summary Report Briefing Report Competition Speech Personal Resume Project Manager Paper Final Student Review.
Website Navigation Paper Home English Learning Education Paper Year-end Summary Graduation Paper Ideological Report Free Paper Joining the Party Legal Paper Joining the Party Autobiography Architectural Paper Joining the Party Application Financial Paper Shu Lian Report Accounting Paper Debriefing Report MBA Information Teaching Paper Student Comments Computer Moral Education Paper Free Accounting Paper Free Architectural Paper Free Party School Paper Human Resources Paper Competition Speech Marketing Paper Competition Speech Professional Manager Paper Employment Speech Enterprise Management Paper Personal Summary Free Computer Paper Opening Report Social Practice Paper Theory of Three Represents Theory.
: free papers, free architectural papers
On the Security Monitoring System of Intelligent Building
[Abstract] This paper expounds the function, composition and application of intelligent building security system in detail, and puts forward some problems that should be paid attention to in design and selection.
Keywords: Intelligent Building Security Monitoring Security Monitoring System Integration
1 the concept of intelligent building security monitoring system 1. 1 the role of security monitoring system With the advancement of China's reform and opening up, a number of safe, efficient, comfortable, convenient and flexible intelligent buildings have sprung up to meet the needs of the information society.
In order to prevent the occurrence and harm of all kinds of theft and violence and ensure the safety of buildings, life and property from being damaged, it is necessary to set up an intelligent security system.
With the development of science and technology, new criminal means also put forward new requirements for security system. In today's information age, protecting money, property and personal safety is one aspect, and a large number of important documents and data stored in computers need to be protected even more.
In intelligent buildings, we should guard against not only external personnel, but also internal personnel. Special protection is also needed for some important places, objects and important people. Therefore, it is necessary to establish a multi-level and three-dimensional security system for modern architecture.
1.2 safety monitoring system level
1.2. 1 Determine the protection level.
(1) related specifications
Safety protection engineering procedures and requirements GA/T75-94 General graphic symbols for safety protection system GA/74-94 Technical specification for civil closed-circuit monitoring television system GB50 198-94
According to the above specifications, combined with the risk situation of safety prevention and the actual situation of the project, the protection level reached by the safety system is comprehensively determined.
(2) the type of safety technology system
Perimeter alarm system;
Building external wall alarm system composed of glass breakage alarm device;
Television monitoring system (image review system);
Intrusion detection and alarm system;
Audio monitoring system (sound inspection system);
Strong lighting system;
(3) Safety level and main configuration (divided into four levels)
A. Four-level protection safety system
The doors and windows of the business premises (referring to banks) should be equipped with switch-type alarm devices (such as door magnetic switches);
Set manual or pedal emergency alarm device and linkage alarm bell;
The alarm signal should be sent to the security duty room and the nearby public security organs.
B. Three-level protection safety system
The same as the four-level prevention system device;
Establish a three-dimensional space defense system: set up space (indoor, corridor) intrusion detectors;
The central control equipment has the function of monitoring and reviewing (recording) to record the time and time when the alarm occurs;
Television monitoring and alarm systems are set up in business premises and main passages, which are connected with public security alarm stations.
C. Secondary protection safety system
Same as the three-level prevention system device;
Television monitoring equipment has automatic and manual switching function and multi-screen display function;
One-to-one video recording devices shall be set up in the business place where the teller system is implemented;
Password control is operated by specialized personnel to start, stop, deploy, disarm, bypass and reset the alarm system;
The control center equipment has wired, wireless and their mutual conversion functions to ensure that alarm signals are sent to relevant alarm departments accurately;
Conditional business premises should be equipped with a population control system and implement information card access (access control system).
D. Primary protection safety system
The selected detector should have an intrusion detection system consisting of two or more different detection technologies;
Long-term video recording of business premises. In case of emergency, lighting, recording and video recording should be started automatically; Unification);
Set up the entrance and exit control system, and manage the personnel in the main division of labor through the information card;
The central control room should be able to immediately identify the location and nature (robbery, theft, fire, failure, etc.). ) receive alarm signals at the same time, and display, print, record and store the alarm time, place, nature and disposal scheme on the screen;
The rest are the same as the secondary prevention system.
1.2.2 hierarchy of safety monitoring system
(1) External invasion protection: This part is to prevent the invasion of external irrelevant personnel, and it is necessary to set corresponding alarm, re-inspection and other measures around, doors, windows, passages, entrances and exits to prevent criminals from leaving the area.
(2) Area protection: This line of defense is to detect people who illegally invade this area and send the information to the monitoring center, which will handle it.
(3) Target protection: This line of defense is to protect specific targets, such as safes and important rooms.
The structure of the security system is not only the traditional preventive facilities, such as locking, standing guard and keeping alert in today's advanced technology. No matter how strong the lock is, it can always be opened, and the energetic sentry sometimes takes a nap. Today, the intelligent anti-theft security system is manufactured by using modern computer technology, modern communication technology, modern control technology and modern graphic display technology (namely 4C technology). Each subsystem plays an independent role and is integrated into a two-in-one prevention system to ensure the safety of the building and create a good working and living environment. 2. 1 access control
2. 1. 1 control principle The so-called entry-exit control is the management of the outbound population. This system controls the access and behavior of all kinds of people in the relevant area, which is usually called access control system. Its control principle is: according to the range of human activities, cards of various grades or preset passwords are made in advance. Install magnetic card readers or password keyboards at the entrances and exits of relevant gates, vault doors, archives doors and elevator doors. , so that users can use a valid card or password to pass or enter. The card password is read by the card reader, decoded and sent to the controller for judgment. If yes, the door lock will be opened, otherwise an alarm will be given.
2. 1.2 Characteristics of card-holding mode
The password of (1) card can be cancelled from the system at any time, without fear of being lost or taken away.
(2) The password of the card is time-sensitive, and the validity period can be set in advance.
(3) The cardholder's activities at all entrances and exits are recorded by computer, which can be printed and analyzed at any time.
(4) Save management personnel. Using computer management system, all entrances and exits can be controlled in the control room. This not only improves the efficiency, saves manpower, but also avoids human error and improves the safety effect.
2. 1.3 Types of access control system
There are optical cards, magnetic matrix cards, magnetic code cards, bar code cards, infrared cards, iron code cards, induction cards, and biometric systems, such as fingerprint machines, palm print machines, retina recognition machines, voice recognition machines, and so on. From contact cards to contactless cards, from l00mm to thousands of mm induction cards are widely used.
The above cards correspond to all kinds of access control machines, mainly networked and non-networked (independent). There are single door access control machines, double door access control machines, four door access control machines and eight door access control machines. This makes the application of access control very flexible. With the access control machine, there are also door magnetic switches and buttons.
Several access control machines and slave door controllers of the access control system are connected with the master door controller. The inside of the access control machine and the door controller are controlled by the computer. The power supply required by the access control machine is often DC 12V, which is provided by the door controller. Generally, there is a power supply AC220V50Hz/DC 12V near the controller.
2. 1.4 Location of access control system
For comprehensive intelligent buildings, the locations are: important office, treasury, bank office, central control room, communication and weak current computer room, etc.
2.2 Anti-theft alarm system
2.2. 1 The function of the burglar alarm system is to guard key areas and important places inside and outside the building with detectors. When the illegal intruder is detected, the signal is transmitted to the alarm controller: sound and light alarm, and the address is displayed. After receiving the alarm, the relevant personnel on duty will take measures according to the situation to control the development of the situation. In addition to the above alarm function, the burglar alarm system also has linkage function. Such as: turning on the alarm scene lights (including infrared lights), linking the audio-video matrix controller, turning on the alarm scene camera for close observation, and a series of linkage controls of the TV matrix controller: making the monitor display images, recording with video recorder, automatic or manual operation of the multimedia controller, etc. These can check the sound and image of the alarm scene, so as to determine the nature of the alarm (illegal invasion, fire, failure, etc. ) and take effective measures.
Composition of the system
Intelligent building anti-theft alarm system is responsible for detecting points, lines, surfaces and surfaces in the building. It generally consists of detectors, regional controllers and alarm control centers.
(1) detector
The detector is responsible for detecting the illegal intrusion of personnel, giving an audible and visual alarm when there is abnormality, and sending information to the regional alarm.
Switch: Switch is a basic, simple, economical and effective detector. Commonly used are: micro switch and magnetic reed switch. Line connection is divided into normally open and normally closed. When the switch is closed or opened, the circuit is connected to start the alarm.
Beam blocking detector: At present, infrared cross beam detector is widely used, which consists of infrared transmitter and receiver. When criminals cross doors, windows or other protected areas, they will block infrared light and bow to the police. In order to ensure the accuracy of this kind of detector, it is necessary to configure the frequency and phase discrimination circuit.
Thermal infrared detector: also known as passive stereo infrared detector. It uses human body temperature to detect. As we all know, any object will emit infrared rays with different intensities due to different surface temperatures, that is, the emitted infrared rays have different wavelengths. The wavelength of human radiation is about 10μm, which is used to manufacture thermal infrared detectors. Among them, pyroelectric has the best sensitivity and response speed. So it is widely used at present. It is equipped with a band-pass filter with 7 ~ 15 n wavelength. So as to shield non-human infrared waves and ensure accurate alarm.
Microwave object moving detector: using microwave equipment to emit moving objects (including people) to resist the Doppler effect of radio frequency difference, people can be detected.
Ultrasonic object moving detector: similar to microwave moving detector, but with different wavelengths, the ultrasonic frequency is often above 20KHz.
Optical detection mobile detector: it can only be used in a well-lit environment. Its principle is to use two photovoltaic cells to form a differential detection device, which can detect the small changes of surrounding light.
Glass breakage detector: installed at the position facing the glass surface, using piezoelectric sensor. It can effectively detect and alarm the high-frequency sound of glass and has been widely used in door and window protection.
There are other types of detectors, which are omitted here.
(2) Regional alarm
Usually, an area alarm can accommodate the input signals of eight circuits. The processed signal is sent to the video matrix switching controller of TV monitoring system to realize linkage control. In general system, there are ≤8 alarm zones, that is, ≤64 loops. When there are more than 64 circuits, it is necessary to switch to the alarm system controlled by microcomputer.
(3) Alarm control center
Alarm control center, usually combined with TV monitoring center. Its function is to check the working state of the system by controlling the keyboard, and the emergency alarm can automatically pop up on the monitoring screen, and record the time and address. At present, some products are equipped with alarm input cards in the center, with the capacity of 128 channels/block, which can be increased to 2048 points as needed. The connection between alarm card and C C T V controller is RS232 port.
2.3 CCTV monitoring system
The application of TV monitoring system in security system is increasing. It can make managers see the important positions inside and outside the building in the control room, provide visual effects for the security system, and provide monitoring means for fire fighting, the operation of electromechanical equipment in the building and personnel activities.
2.3. 1 Basic structure of CCTV monitoring system
According to the basic structure of the function, it can be divided into four parts: camera, transmission, control, display and recording.
(1) camera
Camera is an important part of monitoring system. And a large number of CCD (Charge Coupled Device) cameras are used. The color of the camera can be divided into black and white and color. Choose one according to the use and economic situation. The target size of the camera is represented by 1/3, 1/2 and 2/3 inches. Pay attention to the size of the two when choosing the lens.
There are three kinds of cameras: PAL, NTSCK and SECAM, and PAL is selected in China. When choosing a camera, we should also consider the lighting requirements, and if necessary, we can choose infrared lighting.
(2) lens
The choice of lens in design is as important as the choice of camera. The choice of lens is based on the observed field of view and the range of brightness change, taking into account the size of CCD camera. The relationship between them is that the visual field determines whether to use a fixed focal length or a variable focal length lens, how much focal length is used for the fixed focal length, what range is selected for the variable focal length, and the change of brightness determines whether to use an automatic aperture lens.
Sharpness: It is an important index of lens. If you want to have a clear image, the resolution should be high, that is, the number of black and white stripes that can be distinguished per unit length should be large, which is generally obtained by the formula:
N = 180/ hour n- lens resolution (alignment/cm)
H—— Height of frame format (cm)
Usually 1/2 "frame 4.8x6.4(mm2)N=38 pairs of lines/mm h = 4.8mm.
1/3 "frame 3.6x4.8(mm2)N=50 alignment/mm h = 3.6mm.
Lens size: 1, 2/3, 1/2, 1/3, 1/4 inches. Generally, the lens is the same size as the camera or the lens size is larger than the camera size.
Focal length: The focal length of the lens and the size of the camera target surface determine the viewing angle. The target surface (camera target surface) is fixed. If the focal length is short, the field of view is large; If the focal length is large, the field of view is small. W h is used to represent the width and height of CCD target surface respectively, and f is the focal length of the lens, so the viewing angle value can be obtained.
Qh=2tan-l(w/2f)(0) horizontal viewing angle Qv=2tan-l(h/2f)(0) vertical viewing angle.
Luminous flux f: luminous flux indicates how much light enters the lens, which is the ratio of focal length to aperture; F=f/φF luminous flux (dimensionless); F- focal length (mm); φ —— aperture (mm). The maximum f value is often indicated in the lens specifications, such as 6m m/F 1.4. The aperture of this lens is 4.29mm The lens needs to automatically stop when the light changes greatly (such as outdoors).
In short, there are six factors that affect the camera effect: the size of the object, the fine size of the object, the distance between the object and the camera lens, the focal length of the camera lens, the size of the light receiver (target size), the resolution of the lens and the camera system. Comprehensive consideration should be given in the design.
(3) Signal transmission
Video signal transmission: transmission methods include common coaxial cable, balanced pair cable, cable TV coaxial cable, optical cable, telephone line, etc. The wave impedance of domestic SYV-75-2~75-2 ~ 75-33-2 is 750, the capacitance is not more than 76PF/m, and the attenuation at 30MHz is not more than 0.86 dB/m. 。
Transmission of control signals: The control center should control the field equipment, usually through the equipment demodulator. The commonly used control modes are: communication coding control mode and coaxial vision control mode. The former is serial coding of control signals: multiple control signals are transmitted by one line. Its control distance can reach 1km, and if amplification is added in the middle, it can reach 10km or more. If you use optical cable, the distance will be longer. The latter mode is coaxial video control mode, in which video and control signals are multiplexed by coaxial cable. There are two ways to do this. Firstly, the control signal is modulated in the home page rate range (50 Hz ~ 4 MHz) which is different from the video signal, and then combined with the video signal for transmission, and then decomposed (demodulated) in the field. Secondly, the control signal is transmitted during the blanking period of the video signal field. At present, the first one is used.
(4) display and record
Such equipment includes monitors, video recorders and video processing equipment, all of which are installed in the control room. At present, the ordinary tape of the special video recorder for monitoring system can record 80 minutes, and the longest can reach 960 h. In addition to long time, the video recorder needs remote control function, and it can be operated by control signals.
(5) Video switcher
Using video switcher, several monitors can see multiple monitoring points. At present, the equipment has multiple inputs, 1 output, and multiple inputs and m outputs, which greatly improves the efficiency of the display.
There is also a multi-screen splitter 2, which can simultaneously watch multi-channel monitoring signals on one display. This technology is also widely used in control centers.
2.4 Safety function of parking lot management system
Generally, there are parking lots in the basement of intelligent buildings, so it is necessary to manage the parking lots automatically. The functions of the parking lot management system are as follows: parking, population control, parking space guidance, video recording of vehicle appearance, characteristics, brand and charging by time. Among them, the license plate image recognition system has security function, which can prevent the car from being stolen. When a user picks up a ticket or uses a monthly ticket or a stored-value ticket, the computer will record the color image of the vehicle model and license plate number through the camera at the population office, and also record the numbers of the admission ticket, monthly ticket and stored-value ticket. When the user leaves to pay or check in, the computer will automatically display the license plate and model of the vehicle owned by the vehicle number holder and the license plate and model of the video left at the time of admission on the display screen and CCTV monitor. After the staff confirms, the gate will automatically open and release, and these images will be stored in the computer hard disk for future reference.
2.5 Safety function of elevator control system
The safety management of elevator control system is very important for high-rise or super-high-rise buildings. To some extent, it involves the safety of the whole building.
Safety function: elevator floor control system. The elevators in the building are managed according to needs, for example, some elevators stop running after work, and some elevators run on demand. In the running elevator, not all floors stop, but according to the floor with a valid card. This part of the elevator is equipped with a smart card reader, and the valid card is identified by the card reader, and the elevator is delivered to the relevant floor. Without a valid card, the elevator will not open the door, effectively controlling the activity space of the floor personnel. Thereby ensuring the safety of the building.
2.6 patrol management system
Intelligent buildings should be equipped with patrol management system as required. Its function is that security personnel regularly patrol and send patrol signals back to the security center to show the safety of patrol trip. If the patrol signal is in place and the signal is not returned on time, an emergency will occur during the patrol, and the security center will take corresponding measures.
Patrol system is to install patrol switch at designated patrol point. Access control machines are usually set to meet the needs of patrol.
3 The specific implementation of the security system of intelligent buildings. The implementation of the security system must first determine the security level according to the relevant specifications and the functional requirements of the building. On this basis, the site facilities of the security system are arranged, and the scale, type selection, installation and debugging are determined.
3. 1 access control system
3. 1. 1 access control machine (card reader) settings
According to the need, set up (including rooms, stairs, passages, etc. ) The distance outside the door is 1.2 ~ 1.3m from the ground. Generally, the type of induction card is selected. According to the importance, you can choose fingerprint or hole access control machine, which can be double-sided access control or single-sided access control (the door button is set indoors).
3. 12 slave controller
The connecting equipment between the access control machine and the access control host can connect one, two, four or eight access control machines from the controller as required. Select AC220V50Hz/DC 12V, l-5A from the controller power supply equipment.
3. 1.3 main controller
The main controller consists of computer hardware and software and is installed in the central control room. It includes various control expansion boards, remote control program setters, vehicle-mounted display boards, data storage and transmission modules, etc.
3. 1.4 card reader for patrol system
The card reader (reading head) is the access control machine (patrol switch). This part can be incorporated into the access control system and set together.
3. 1.5 elevator access control system
As mentioned earlier, some elevators are equipped with card readers, and you can go to the relevant floors with valid cards.
3. 1.6 Special instructions
(1) Intelligent buildings can realize one-card access control management and enter the one-card consumption system.
(2) The door system should be able to automatically open the corresponding door in case of fire. Fire linkage control device can be used to complete this function.
3.2 Anti-theft alarm system
3.2. 1 Various detector settings
According to the needs, anti-theft double identification detectors, passive infrared beam detectors, glass breakage detectors and various switches are set up at the entrances and exits of buildings, stairwells, elevator halls, doors and windows that need protection, important offices and important computer rooms. Choose different alarms and installation methods according to different layout environments (such as wall hanging and ceiling).
3.2.2 Setting of sound detection device
Micro-monitor (electronic monitor) is set in the place where sound detection is needed, generally about 2m from the ground, and it is wall-mounted. The line between monitor and audio matrix box is mostly double-core shielded twisted pair, such as RVVP 2× 0.5mm2. The control center is provided with an audio matrix box, which is connected with the video switching/control host through RS485 interface and twisted pair RVVP 2× 0.5mm2.. ..
3.2.3 Alarm Control Center Settings
In small capacity system (number of loops ≤64): Usually, 8 alarm interface boxes are set according to the area, and 8 boxes can form 64 loops. There is usually a 3-core shielded wire between the alarm head and the alarm interface box, and the RVVP is 3× 0.5mm2 The alarm interface box and video switching/control host adopt RS-485 serial interface, and the RVVP of twisted pair is 2× 0.5mm2 。
When the system is ≥64 loop, there are two solutions:
First, choose a large-capacity system with 128 alarm input cards. The system can accommodate 8 ~ 16 alarm input cards, so the capacity can reach 2048 alarms. If it is not enough, you can combine multiple systems.
Secondly, access control/alarm management system is adopted. System parameters: the number of cardholders is 65,000; Access control machine16320; Alarm protection zone (number of roads)130560; Alarm output130560; 225 local printers; Alarm status screen1020; And supports encryption transmission technology between computers. The connection mode between devices is RS-232/RS-485 interface, and the RVVP of shielded twisted pair is 2× 0.5mm2 。
3.3 Settings of CCTV monitoring system
3.3. 1 camera settings
Choose different cameras and different installation methods according to different environments, such as whether the camera is black and white or color, the choice of lens configuration, the range of focal length, the manual adjustment of autofocus, aperture and focusing, the matching of camera and lens size, whether to set the tripod head, the determination of installation method, the choice of spherical or hemispherical camera (size determination), the choice of wide-angle lens in lobby and elevator car, and the choice of camera protective cover and lighting lamp.
Control of camera (including lens): completed by controller decoder. There are many kinds of decoders because of their different functions, but all of them remotely control the actions of pan/tilt, lens and auxiliary equipment after receiving the signal from the matrix host. There are two ways to connect the decoder with the matrix/control host: C', D (coaxial control) and D (twisted pair control). As mentioned earlier, coaxial control "C? Quot Due to the high cost of equipment, it is rarely used. Twisted pair control is "D type", that is, RS485 mode can control the distance up to 3km, which can be used in optical fiber, microwave and other transmission modes.
Special note: the lines of security monitoring system are generally installed in corridors, halls and rooms, and some lines are close to the ceiling. Coaxial cables and twisted pair cables are also relatively cheap, so they are generally not suitable for supporting the use of building integrated wiring cables. Of course, the transmission of other data and images is another matter.
3.3.2 Settings of the central control room
For the convenience of safe work, the central control room is usually located on the first floor of a building with a security department. Its equipment mainly includes: video matrix switching/control host, alarm interface box, audio matrix box, character generator, video recorder, main control keyboard, auxiliary control keyboard, audio and video monitoring equipment, multimedia terminal and power supply equipment.
At present, the video matrix switching/control host has various input/output specifications, such as 8×2, 8×4, 16×6, 96×8, video 96 people /8 output, audio 96 input /8 output -64 alarm 8 control keyboard and so on. The super-large system has 2048 channels of video 4096 input /4096 output, an alarm and 32 keyboard switches/control hosts. During design and installation, margins should be reserved, scales should be set and equipment should be selected as required.
According to the input signal of the alarm system, the video master controller completes the pan-tilt control, camera motion control, lighting control and lens control, and links the audio-video monitor and video recorder. The access control system is connected to the host through the gateway, forming an integrated system of burglar alarm, TV monitoring and access control. With the help of multimedia technology, the ability to spread information with pictures and pictures is similar to that of a computer.
Interactive technology makes the security system of intelligent building intelligent, thus ensuring the safety of the building.
The above equipment is organically combined. General audio and video displays are installed on the "TV wall", and the rest are concentrated on the console. The control room area is determined by the scale of the system, with reliable power supply, controllable temperature and humidity, and anti-static raised floor on the ground.
For more information about project/service/procurement bidding, and to improve the winning rate, please click on the bottom of official website Customer Service for free consultation:/#/? source=bdzd
- Previous article:Practice of using shortening
- Next article:What did Daoxiao Noodles do and what did Daoxiao Noodles do?
- Related articles
- What are the hardware exhibitions, and what are their specific times and locations?
- High school art sketching lesson plan
- What are the advantages of tourism e-commerce compared with traditional travel agencies?
- Is blind date the only way to introduce marriage?
- In the supervision of civil litigation whether the procuratorial organs have the right to take judicial evidence
- What is the treatment of Beijing Shuang 'an Mall Co., Ltd.?
- How to create a new Chinese style with Chinese decorative wallpaper
- What do the three rites of Confucianism mean?
- What is the meaning of Zhong Kui tattoo? Is it tattooed in front or behind?
- What are the top ten brands of modern minimalist furniture?