The solution of the anti-theft alarm system for the perimeter of the community apartment
[ad_1]
1. General description of scheme design:
1.1 Preface:
With the deepening of reform and opening up and the rapid development of urban and rural economy, the large increase in urban floating population has brought many factors of social instability, the public security situation has become increasingly severe, and the incidence of criminal cases, especially burglary and robbery, has increased. Therefore, the relevant state departments have proposed comprehensive management of social security, and the creation of safe and civilized communities is one of the important contents. In addition, in order to further standardize the intelligent construction of residential quarters, the Ministry of Construction has specially formulated the grading standards for smart communities. According to its requirements, smart communities must have subsystems such as security protection, information management, property management, and information network. Therefore, the construction of community security systems has gradually been incorporated into many necessary projects for community construction. Taking Shenzhen as an example, almost all newly built residential buildings are pre-installed with building intercom anti-theft systems, and the installation of anti-theft nets is prohibited. After spending a lot of money to remove the anti-theft net, its anti-theft function will inevitably be transferred to the electronic anti-theft system. Therefore, the construction of security systems for residential quarters will have a great development in the past two years, and it will also spread from developed cities such as Beijing, Shanghai, Guangzhou, and Shenzhen to coastal areas and inland areas.
The security protection technology of this program is a product of the collection of modern science and technology. It embodies the perfect combination of modern electronic technology, modern communication technology, modern control technology and modern computer technology. Its characteristic lies in the collection and transmission of multiple information , Monitoring, recording, management and integration of a series of high-tech. Practice has proved that the security system (referred to as the security system) formed by this technology can provide a safe, convenient and comfortable protected space for the construction environment. The perimeter anti-theft alarm system is an indispensable part of the security system. It can not only monitor the surrounding walls of the community 24 hours a day in real time, but also notify the security personnel through the alarm signal and the display keyboard. Accident handling. Therefore, the establishment of a complete infrared alarm system in the community can improve the safety factor of the community, strengthen the safety protection and prevention, play a role in guaranteeing the property and personal safety in the community, and can create a modern safety management for the community. Very favorable conditions. Chengdu Quanlong Co., Ltd. focuses on the specific conditions of the perimeter wall of Zhicheng Real Estate Company’s Yidu Apartment and the third floor office of the complex building, and conforms to the planning of the construction party; it will focus on the perimeter anti-theft alarm system as this key construction project.
1.2 Design principles and basis
1.2.1 Design principles
a. Advancement: Under the condition that the investment cost permits, the system adopts today’s advanced technology and equipment. On the one hand, it can reflect the advanced level of the system, and on the other hand, it can make the system have a strong development potential so that the system can be used to its fullest. Adapt to social development within the possible time.
b. Reliability: Using mature technology products, try to improve the reliability and easy maintenance of the system in equipment selection and system design.
c. Safety: For the safety protection system, its own safety performance cannot be ignored. When designing the system, a variety of measures must be taken to prevent the illegal destruction of the system in various forms and ways.
d. Scalability: The system design should fully consider the future development needs, and the system should have the possibility of expansion and upgrading of the reserve capacity.
e. Standardization: Since this system is a strict comprehensive system, various standards and specifications should be referred to in the design and construction of the system, and various technical regulations should be strictly followed, and the standardized design and construction of the system should be done well.
1.2.2 Design basis The design of this scheme is based on Party A’s conventional requirements and meets the requirements of the following design specifications: “Smart Building Design Standards” (DBJ08-47-95), “Civil Building Electrical Design Codes” (JGJ/T16-92), and “Electrical Installations” Code for Engineering Construction and Acceptance (GBJ232-82), “Interim Provisions on the Management of Engineering Design of Intelligent Building Systems” (Ministry of Construction 1997-290), “Safety Protection Industry Standard of the People’s Republic of China” (GA/T74-94), “Procedures for Safety Protection Engineering And requirements” (GA/T75-94) the design plan, construction management and quality control procedures prepared by the company 1.3 Design Ideas This design is based on industry standards, combined with the specific conditions of the community, and the best design plan reflects the highest performance Price ratio is the guiding ideology of this scheme design, as well as the basic starting point and goal pursued by the scheme design.
This design mainly implements the two main ideas of “high quality” and “low price”.In order to cooperate with the community perimeter anti-theft alarm system, the three-prevention security system of “human defense, technical defense, and physical defense” will be implemented after completion.
A full-measure management system. This system sets up a ceiling-mounted omnidirectional dual-element infrared detector at the entrance and exit of the office on the third floor of the Zhicheng Complex. This detector emits a cone-shaped infrared ray to close the entire aisle. As long as someone breaks in in the standby state, the detector will automatically send an alarm message to the alarm host after detecting the human body to complete the security precautions at the entrance and exit. In the first phase, the gate and the perimeter wall of the community are equipped with active infrared through-beam detectors with different emission distances. This detector can block the entire community within infrared rays, completely eliminating the possibility of overstepping the wall and robbery. This system all adopts wired connection, which reliably guarantees the false alarm of the product due to the influence of rain, snow, fog, and electromagnetic wave interference. The alarm host of the system is placed in the guard room of Phase 2, and a high-power siren is installed on the outer wall of the guard room to realize the effective transmission of alarm information.
2. System structure and function description
2.1 System function overview
Perimeter alarm is a key point of community safety precautions, which eliminates hidden dangers outside the community. This week’s defense adopted the common method of installing infrared through-beam detectors on the outer walls of the community. Here we chose the Japanese product ALEPH HA, which has stable working performance and wide power supply voltage range, which can effectively prevent errors. Reported. Each detector is connected to the alarm host in the corresponding zone through a 4-core cable. The main unit sets each detector as a 24-hour defense zone type and is in a state of defense throughout the day. As long as someone illegally crosses the fence, it will immediately generate an alarm; the alarm main unit will generate an alarm sound at the sub-control site through a siren to alert the security personnel; alarm; The host computer displays the number (zone number) of the corresponding infrared beam probe. According to the display of the alarm host, the security personnel can know in which section an alarm event has occurred and issue an alarm; this product has a beautiful appearance and a very low false alarm rate. And the price is lower among similar products. Moreover, after receiving the alarm, the management center can query the location of the incident through the host, and the management center can notify the security personnel in time to deal with emergencies.
2.2. System features:
The ALEPH HA dual-beam series adopted by the company has the following features: the perimeter alarm detector is composed of active infrared beam probes, which can aim at a long distance, has high accuracy, and has the characteristics of stable performance and extremely low false alarm rate. , Good waterproof performance, suitable for northern weather, showing strong adaptability to outdoor working environment.
1. Low false alarm rate
2. The system is easy to install and easy to operate
3. The outdoor warning distance is 20m, 40m, 60m, 100m, 150m;
4. In severe weather, it can maintain a sensing margin of more than 140 times;
5. The large-scale optical system with synchronous up and down two beams can easily correspond to rain, fog, snow and other severe weather that is easy to attenuate and scatter light;
6. The upper and lower beams can be adjusted simultaneously. Compared with the separate adjustment mechanisms of other similar products, the upper and lower optical lenses can be adjusted at the same time, making the adjustment process faster, more convenient and more accurate.
7. The night adjustment mechanism adopts the night automatic photo mechanism, even one person can easily make quick adjustments.
8. The LED device is adopted to make the adjustment of the optical axis easier. The adjustment result can be confirmed by the lighting status of the LED on the light receiver. In addition, a test terminal is provided to confirm the optical axis adjustment result.
9. Corresponding to various surrounding environments, the response speed and the shading time are continuously adjustable from 50MSEC to 500MSEC, which can prevent misoperation caused by the environment to the greatest extent.
10. The beautiful appearance design does not see the warning direction from the appearance, does not damage the beauty of the surrounding environment, and is waterproof at the same time.
2.3 The main equipment and technical parameters of the system
2.3.1 Perimeter alarm host CK-238
●Has a doorbell function
●Visitor code can be set
●The performance of all defense zones are programmable
●Unique callback feature to ensure system safety
●Double, classification, or post-report format
●Support all major report signal formats
●Including CFSKⅢ, ADEMCO4/9DTMF, 4+2 sum checksum 1/3 expansion, 4/2 and sum check
●It can dial and call repeatedly until it is connected. *Password protection to prevent illegal operation
● EEPROM program memory that is not afraid of power failure
●Watchdog reset circuit
●Using C&K Commander II software, it can program the control/communication remotely and remotely. 3.3.2 Infrared beam probe ABT-150/100/80/30/10
●The gain loop automatically adjusts the sensitivity control to adapt to harsh weather such as rain, fog, and snow.
●Wide-angle aspheric lens, small size, large effective aperture.
3. Project construction and quality assurance
3.1 Construction preparation
a. The plan documents and construction drawings are complete, and have been reviewed and approved;
b. The construction personnel are familiar with the drawings and related materials, such as engineering characteristics, work technical requirements, construction quality standards, etc.;
c. The equipment, instruments, equipment, materials, auxiliary materials, tools, etc. required for construction are ready to meet the construction requirements.
3.2 The following inspections and verifications should be made before construction
a. The site conditions of the buildings in the construction area, the laying of trunking, pre-embedded management and routing conditions;
b. Occupied road conditions;
c. The pole road conditions allowed to be erected with poles;
d. Need to set up poles or wall stacks;
e. Necessary equipment, equipment power and performance test conditions.
3.3 Line laying Mark the location where the pipeline is scheduled to be laid, organize the excavation of a trench no less than 40 (width) X 50 (depth), and then carry out the work of threading and burying the pipeline.
3.4 Equipment installation After the wiring is laid in place, proceed with the installation of equipment and equipment.
3.5 After the system debugging equipment is installed, the individual equipment and equipment are energized and debugged first, and then the function debugging and system programming of the entire system are set.
3.6 On-site training During the installation and commissioning of the system, the relevant operators of the system should be briefed on the performance and characteristics of each equipment of the system one by one at any time, and on-site system training should be carried out after the completion of the construction.
3.7 Project acceptance and standard system construction is completed and put into operation, relevant personnel should be organized to carry out project acceptance. Acceptance standards: a. Test according to the functions of the system design and the indicators and requirements provided by the equipment to determine whether the predetermined design effect is achieved; b. Check and accept in accordance with relevant national standards and regulations to ensure that the system is installed correctly, reasonably and reliably.
3.8 Construction schedule (to be determined)
3.9 Construction organization arranges 1 project leader, 3 installation engineering technicians, 4 construction assistants, 4 quality inspection supervisors, and 1 (concurrently) the project leader is responsible for scheduling, coordinating and cooperating with the construction unit for the construction personnel on site. Responsible for overall engineering technical issues, and contact Party A for construction coordination and cooperation. The function of the quality inspection supervisor is mainly to check the quality of each link of the construction, find problems in time, solve them in time, and assist in the phased (on-the-job) acceptance of the project.Chapter 4 System Maintenance and After-sales Service
Four, system maintenance
A: Daily maintenance: Relevant personnel who have received preliminary training can perform daily maintenance. The maintenance content is: l Check the operation of the system equipment l Check the connection between the system equipment l Check the implementation of the system functions l Fill in the daily maintenance work record.
B: Regular maintenance: once every two months, during the warranty period, the company’s professional and technical personnel will cooperate with trained personnel to carry out, and the management unit will arrange related personnel to carry out by themselves at other times. The specific maintenance content includes: l Confirmation of daily maintenance work Verification l Performance test confirmation of all terminal equipment of the system l System connection and communication validity confirmation and repair l System function software testing and necessary changes l Management center equipment working status confirmation and adjustment l Necessary system equipment expansion, update, and replacement 4.2 Follow-up service
A. From the date of acceptance of the project, 12 months of free warranty (excluding man-made damage) and lifetime maintenance are provided;
B. Rush to the scene within 24 hours after receiving the system failure call or written notification and repair it within a time limit;
C. During the exemption period, if the component is damaged or the equipment itself is defective under normal use, the company is responsible for replacing it;
D. The company arranges professional engineers to conduct elementary training for relevant management personnel and residents of the community;
E. After the system is completed, the company can upgrade the system or update the software version as needed.
[ad_2]