首页    期刊浏览 2024年09月21日 星期六
登录注册

文章基本信息

  • 标题:Optimization calculated the detector and camera location of a security system.
  • 作者:Raduca, Mihaela ; Bostan, Raol ; Ghican, Adelina
  • 期刊名称:Annals of DAAAM & Proceedings
  • 印刷版ISSN:1726-9679
  • 出版年度:2009
  • 期号:January
  • 语种:English
  • 出版社:DAAAM International Vienna
  • 摘要:Security is the system ability to preserve functional characteristics of target space, protect or/and prevent unwanted events to be happened in to the surveillance areas (to avoid any risk for human life that interacted with that space and possible property damage).
  • 关键词:Infrared detectors;Mathematical optimization;Optimization theory

Optimization calculated the detector and camera location of a security system.


Raduca, Mihaela ; Bostan, Raol ; Ghican, Adelina 等


1. INTRODUCTION

Security is the system ability to preserve functional characteristics of target space, protect or/and prevent unwanted events to be happened in to the surveillance areas (to avoid any risk for human life that interacted with that space and possible property damage).

It is important that, the security system to be reliable and efficient and, in the same time the price of designed being low as possible.

This paper presents such as a program able to satisfy these requirements.

2. PROGRAM STRUCTURE

The authors have developed a monitoring system, which has the logical diagram of the program presented in the Fig.1.

[FIGURE 1 OMITTED]

The program is structured in two parts:

* alarm and warning

* surveillance and control

The first part of logical diagram conceive for alarm and warning functions calculate the location of detectors based on the distance of the detection and display graphics (symbolic) their location in the surveillance areas.

The second part of logical diagram design for surveillance and control functions, allows the calculation of video cameras location take in consideration the distance of the detection and display graphics (symbolic) location of these video cameras in the surveillance areas.

To make the calculation of the location of the PIR detectors and video cameras in a room is necessary to introduce the keyboard length (L), width (l) and height (h) of the room.

To confirm the choice, must be press the OK button for the new data can be processed by this program.

After processing the data entered, the program will display the following information:

* the total number of video cameras or PIR detectors required for monitoring the surveillance areas

* graphics location of PIR detectors or video cameras

* number of areas in which the space is divided for a complete surveillance

* graphical display this areas

* shadow cone of video cameras or PIR detectors needed for the supervision of the space vertical direction

* types of video cameras or PIR detectors that can be used for surveillance areas monitoring

* technical details about the video cameras or PIR detectors used by the program (from program database).

The program provides a database that includes types of video cameras and PIR detectors that can be used for surveillance. Of course, these types of video cameras or PIR detectors are informative and not necessarily using them for surveillance of the target space but may be equivalent to them (the same technical features).

When we finished viewed information offered by the program for entered data, and we want to reenter new data then we press "Cancel" button and we will return to the homepage where we can introduce new data and resume cycle or use the "Exit" button to leave the program if we no longer perform operations.

3. ELEMENTS OF THE SOURCE CODE OF THE

PROGRAM

The authors have developed a program named "Optimization calculated the detector and camera location of a security system" using programming language "Delphi v6" (Teixera & Pacheco, 2006).

This program language is very easy used for this application.

Next, will be present a part of the source code used for the program.

Source code for the farthest point of a video camera or PIR detector is as follows:
Video cameras:
{
d1:=lat*sqrt(2);
d:=sqrt(sqr(lat)+sqr(lung/2));
p:=2*lat-abs(sin(dl*pi/180));
calc.Lines.Add('Farthest point of the video camera 1 is:
'+makeitastring(d) + ' m');
calc.Lines.Add('Farthest point of the video camera 2 is:
'+makeitastring(d) + ' m');
calc.Lines.Add('Farthest point of the video camera 3 is:
'+makeitastring(p) + ' m');
 }
Detectors:
{
d:=sqrt(sqr(lat)+sqr(lung));
x:=lung-lat-abs(sin(d*pi/180));
p:=sqrt(sqr(lung-x) +sqr(lat));
calc.Lines.Add(Farthest point of the detector 1 is:
'+makeitastring(d)+' m');
calc.Lines.Add('Farthest point of the detector 2 is:
'+makeitastring(p)+' m');
 }


The source code for dividing the room in areas and the source code for calculating the shadow cone of a video camera or PIR detector have the same topics like the source code.

In the source code above is also calculated the highest distance from the ceiling where you can put the video camera or PIR detector to provide a complete surveillance.

To determine the type of video cameras or PIR detector that can be used for surveillance of the target space is necessary to calculate the remote points of them.

These distances are compared with the distance detection cameras in the database program. When we found a video camera with detection distance greater than the distance to the most remote point then we considered that the camera is suited to be located. If the detection distance of video camera is less than the distance to the most remote point then we look for a proper camera.

4. APPLICATION AND RESULTS

This program has applied for the surveillance of electronic laboratory of the University "Eftimie Murgu" from Resita city, Romania country. For this location we introduce the following entered data have:

* location length is 12.14m

* width location is 4.45m

* height location is 3.05m

It notes that for the sizes of electronic lab are needed only three cameras for a complete surveillance, laboratory representing one area (figure 2).

The types of cameras that can be used for surveillance and which are recommended by the program are (www.magazinalarme.ro, 2009):

* first video camera: model MD497CIR or model Sharp BIS127

* second video camera: model CS003

If you want to use only PIR detectors for monitoring the electronic laboratory, you choose the option of "Alarm and warning". Electronic laboratory represents one area and need only two sensors for a complete surveillance (figure 3).

Sensors that can be used for surveillance are (www.sepaplus.com, 2009):

* first PIR detector: model 525D

* second PIR detector: model PIR JFX-IR01-A

[FIGURE 2 OMITTED]

[FIGURE 3 OMITTED]

5. CONCLUSION

The program was used to implement the security system in the electronic laboratory of the University "Eftimie Murgu" from Resita city, Romania country.

The system was tested and is already functional (Raduca, 2003). In case of unauthorized penetration in laboratory the currently head of the laboratory will be notice using GSM network (Bordea et al., 2008) of mobile phone.

In the future we intend also transmit images in real time using the Internet and 3G system (Raduca et al., 2006).

6. REFERENCES

Bordea, N.; Sintea, S.;Moraru, S.A. & Kristaly, D.M. (2008). Serial Data Communication Connection Over Gsm Data Channel, Proceedings of the 19th International DAAAM Symposium, Katalinic, B. (Ed.),0143, ISSN 1726-9679, ISBN 978-3-901509-68-1,2008, Vienna

Raduca, E. (2003). Electronica aplicativa, Orizonturi universitare, ISBN 973-638-048-3, Timisoara, Romania

Raduca, E.; Lindenmeier S.; Mituletu C. & Raduca M. (2006). Investigation on Detection Circuits for Fast Level Detection within a SDARS Diversity System. Analele Univ.Eftimie Murgu,Vol.XIII, No.1, pp 297-302, ISSN 1453-7394, Resita

Teixera S. & Pacheco X. (2006). Delphi 6 Developer's Guide, Sams Editore, ISBN-10: 0-7686-5879-9

*** http://www.sepaplus.com, Accesed on:2009-04-15

*** https://www.magazinalarme.ro, Accesed on:2009-04-12

*** http://www.avideo.com, Accesed on:2009-04-15
联系我们|关于我们|网站声明
国家哲学社会科学文献中心版权所有