Optimization calculated the detector and camera location of a security system.
Raduca, Mihaela ; Bostan, Raol ; Ghican, Adelina 等
1. INTRODUCTION
Security is the system ability to preserve functional
characteristics of target space, protect or/and prevent unwanted events
to be happened in to the surveillance areas (to avoid any risk for human
life that interacted with that space and possible property damage).
It is important that, the security system to be reliable and
efficient and, in the same time the price of designed being low as
possible.
This paper presents such as a program able to satisfy these
requirements.
2. PROGRAM STRUCTURE
The authors have developed a monitoring system, which has the
logical diagram of the program presented in the Fig.1.
[FIGURE 1 OMITTED]
The program is structured in two parts:
* alarm and warning
* surveillance and control
The first part of logical diagram conceive for alarm and warning
functions calculate the location of detectors based on the distance of
the detection and display graphics (symbolic) their location in the
surveillance areas.
The second part of logical diagram design for surveillance and
control functions, allows the calculation of video cameras location take
in consideration the distance of the detection and display graphics
(symbolic) location of these video cameras in the surveillance areas.
To make the calculation of the location of the PIR detectors and
video cameras in a room is necessary to introduce the keyboard length
(L), width (l) and height (h) of the room.
To confirm the choice, must be press the OK button for the new data
can be processed by this program.
After processing the data entered, the program will display the
following information:
* the total number of video cameras or PIR detectors required for
monitoring the surveillance areas
* graphics location of PIR detectors or video cameras
* number of areas in which the space is divided for a complete
surveillance
* graphical display this areas
* shadow cone of video cameras or PIR detectors needed for the
supervision of the space vertical direction
* types of video cameras or PIR detectors that can be used for
surveillance areas monitoring
* technical details about the video cameras or PIR detectors used
by the program (from program database).
The program provides a database that includes types of video
cameras and PIR detectors that can be used for surveillance. Of course,
these types of video cameras or PIR detectors are informative and not
necessarily using them for surveillance of the target space but may be
equivalent to them (the same technical features).
When we finished viewed information offered by the program for
entered data, and we want to reenter new data then we press
"Cancel" button and we will return to the homepage where we
can introduce new data and resume cycle or use the "Exit"
button to leave the program if we no longer perform operations.
3. ELEMENTS OF THE SOURCE CODE OF THE
PROGRAM
The authors have developed a program named "Optimization calculated the detector and camera location of a security system"
using programming language "Delphi v6" (Teixera & Pacheco,
2006).
This program language is very easy used for this application.
Next, will be present a part of the source code used for the
program.
Source code for the farthest point of a video camera or PIR
detector is as follows:
Video cameras:
{
d1:=lat*sqrt(2);
d:=sqrt(sqr(lat)+sqr(lung/2));
p:=2*lat-abs(sin(dl*pi/180));
calc.Lines.Add('Farthest point of the video camera 1 is:
'+makeitastring(d) + ' m');
calc.Lines.Add('Farthest point of the video camera 2 is:
'+makeitastring(d) + ' m');
calc.Lines.Add('Farthest point of the video camera 3 is:
'+makeitastring(p) + ' m');
}
Detectors:
{
d:=sqrt(sqr(lat)+sqr(lung));
x:=lung-lat-abs(sin(d*pi/180));
p:=sqrt(sqr(lung-x) +sqr(lat));
calc.Lines.Add(Farthest point of the detector 1 is:
'+makeitastring(d)+' m');
calc.Lines.Add('Farthest point of the detector 2 is:
'+makeitastring(p)+' m');
}
The source code for dividing the room in areas and the source code
for calculating the shadow cone of a video camera or PIR detector have
the same topics like the source code.
In the source code above is also calculated the highest distance
from the ceiling where you can put the video camera or PIR detector to
provide a complete surveillance.
To determine the type of video cameras or PIR detector that can be
used for surveillance of the target space is necessary to calculate the
remote points of them.
These distances are compared with the distance detection cameras in
the database program. When we found a video camera with detection
distance greater than the distance to the most remote point then we
considered that the camera is suited to be located. If the detection
distance of video camera is less than the distance to the most remote
point then we look for a proper camera.
4. APPLICATION AND RESULTS
This program has applied for the surveillance of electronic
laboratory of the University "Eftimie Murgu" from Resita city,
Romania country. For this location we introduce the following entered
data have:
* location length is 12.14m
* width location is 4.45m
* height location is 3.05m
It notes that for the sizes of electronic lab are needed only three
cameras for a complete surveillance, laboratory representing one area
(figure 2).
The types of cameras that can be used for surveillance and which
are recommended by the program are (www.magazinalarme.ro, 2009):
* first video camera: model MD497CIR or model Sharp BIS127
* second video camera: model CS003
If you want to use only PIR detectors for monitoring the electronic
laboratory, you choose the option of "Alarm and warning".
Electronic laboratory represents one area and need only two sensors for
a complete surveillance (figure 3).
Sensors that can be used for surveillance are (www.sepaplus.com,
2009):
* first PIR detector: model 525D
* second PIR detector: model PIR JFX-IR01-A
[FIGURE 2 OMITTED]
[FIGURE 3 OMITTED]
5. CONCLUSION
The program was used to implement the security system in the
electronic laboratory of the University "Eftimie Murgu" from
Resita city, Romania country.
The system was tested and is already functional (Raduca, 2003). In
case of unauthorized penetration in laboratory the currently head of the
laboratory will be notice using GSM network (Bordea et al., 2008) of
mobile phone.
In the future we intend also transmit images in real time using the
Internet and 3G system (Raduca et al., 2006).
6. REFERENCES
Bordea, N.; Sintea, S.;Moraru, S.A. & Kristaly, D.M. (2008).
Serial Data Communication Connection Over Gsm Data Channel, Proceedings
of the 19th International DAAAM Symposium, Katalinic, B. (Ed.),0143,
ISSN 1726-9679, ISBN 978-3-901509-68-1,2008, Vienna
Raduca, E. (2003). Electronica aplicativa, Orizonturi universitare,
ISBN 973-638-048-3, Timisoara, Romania
Raduca, E.; Lindenmeier S.; Mituletu C. & Raduca M. (2006).
Investigation on Detection Circuits for Fast Level Detection within a
SDARS Diversity System. Analele Univ.Eftimie Murgu,Vol.XIII, No.1, pp
297-302, ISSN 1453-7394, Resita
Teixera S. & Pacheco X. (2006). Delphi 6 Developer's
Guide, Sams Editore, ISBN-10: 0-7686-5879-9
*** http://www.sepaplus.com, Accesed on:2009-04-15
*** https://www.magazinalarme.ro, Accesed on:2009-04-12
*** http://www.avideo.com, Accesed on:2009-04-15