TITLE

Main Control System Design for Balanced Tension-type Electronic Fence

AUTHOR(S)
Zhijie Tang; Pinglong Liu; Qian Luo; Zhifeng Ye
PUB. DATE
November 2014
SOURCE
Applied Mechanics & Materials;2014, Vol. 687-691, p349
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Since the 1990s, with the defense, deterrence, alarm in one of the electronic fence system is gradually being widely developed in the field of public safety. The composition and control system design of a balanced tension electronic fence alarm system is described in this paper. This system has a balanced without fatigue characteristics, adapting to a variety of complex terrain environment and leaving no guard dead. It can be widely applicable to all establishments that have the perimeter guard need.
ACCESSION #
100067906

 

Related Articles

  • IP PHONE HOME.  // Popular Mechanics;Feb2008, Vol. 185 Issue 2, p104 

    The article provides an answer to a question on how an electronic alarm system links to an emergency call center.

  • New options in alarm sounds. Colombo, Allan B. // SDM: Security Distributing & Marketing;Mar1999, Vol. 29 Issue 4, p53 

    Explains how electronic drivers clarify and simplify the annunciation of events, status reports, and command features and functions in security systems. Alarm notification; Voice annunciation; Voice annunciated sensors; Power options. INSET: Why end users want voice prompting..

  • Alarm management life cycle provides process insight. Pai, Prasad // Plant Engineering;Apr2008, Vol. 62 Issue 4, p53 

    The article provides information on the stages of the life cycle of an alarm management system. It cites that the generation stage is the brain of the system which can be coupled with alarm suppression to reduce noise signals. Moreover, it stresses that the notification and distribution stage is...

  • Device Designed to Reduce False Alarms.  // SDM: Security Distributing & Marketing;Jun2006, Vol. 36 Issue 6, p51 

    The article focuses on the electronic false alarm reduction device for burglars designed by medical doctor Randall Wang in the U.S. The device is connected to an alarm panel in order for the passive infrared zones be intercepted and interpreted. A real break-in has been installed to identify...

  • Complete Alarm Protection.  // Security: Solutions for Enterprise Security Leaders;Jan2006, Vol. 43 Issue 1, p56 

    The article features the Total Surge Solution, a complete alarm protection from Ditek Corp. The alarm protector is easy to install with 120 volts system power. It has also ten pairs of signaling line circuits, initiating device circuits and notification appliance circuits with field replaceable...

  • Using artificial anomalies to detect unknown and known network intrusions. Fan, W.; Miller, M.; Stolfo, S.; Lee, W.; Chan, P. // Knowledge & Information Systems;Oct2004, Vol. 6 Issue 5, p507 

    Intrusion detection systems (IDSs) must be capable of detecting new and unknown attacks, or anomalies. We study the problem of building detection models for both pure anomaly detection and combined misuse and anomaly detection (i.e., detection of both known and unknown intrusions). We show the...

  • Burglars Can Be Smoked Out.  // SDM: Security Distributing & Marketing;Mar2005, Vol. 35 Issue 3, p13 

    Reports on the intrusion technology being marketed in the U.S. Concept of the technology; Aim for the installation; Features of the product.

  • Video and Access Control Integration Can Provide an Edge.  // SDM: Security Distributing & Marketing;Jan2007, Vol. 37 Issue 1, p82 

    The article assesses that the integration of video surveillance and access control protection can provide an advancement towards security protection. According to the author, several central stations are adding this technology needed to monitor video and alarm systems for their customers. The...

  • Sergeant at alarms. Hackney, Claire // InTech;Sep2008, Vol. 55 Issue 9, p44 

    The article discusses the benefits of operations-owned alarm management (OOAM) in plant safety. According to the article, OOAM defines the need for the valuable alarms and identify unnecessary alarms. As much as possible, it troubleshoots the issue using the resources at their disposal. The...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics