Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Leaky cable perimeter intrusion detection system

A detection system and technology for leaking cables, applied in the field of radio detection, can solve the problems of high use cost, low anti-interference ability, complicated installation and manufacturing, etc., and achieve low false alarm rate and false alarm rate, strong anti-interference ability, and positioning accuracy. high effect

Inactive Publication Date: 2014-06-25
王斌
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Chinese Patent No. 03209915.0, titled "Perimeter Intrusion Prevention System Based on the Principle of Radio Electromagnetic Field", discloses a system that uses leaky cables to detect the intrusion of foreign objects. The principle is the principle of radio electromagnetic field leakage, and the amplitude and phase of the signal in the detection channel are completed. The disadvantage of target detection is that it needs to be divided into sections of equal length along the entire length of the perimeter, and the total number of sections is an even number. In the same laying section of two cables, the sending module connected to the sending cable and the receiving module connected to the receiving cable It is placed on both sides of the same laying section and cannot be placed in one place. Therefore, its installation and manufacture are complicated, its use cost is high, and its anti-interference ability is low; The detection performance of the system has been greatly improved, but the location of the intrusion target cannot be achieved alone, and interference is prone to occur when adjacent equipment is working

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Leaky cable perimeter intrusion detection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] The present invention will be further described below in conjunction with the accompanying drawings.

[0012] figure 1 It is the leaky cable perimeter intrusion detection system according to the present invention. The system is composed of three parts: a detection system host A, a leaky cable module B and a terminal module C. The detection system host A is the center of the leaky cable perimeter intrusion detection system. processor. The detection system host A includes many small modules, which are: carrier signal generation module 1, pseudo-random code generation module 2, transmission signal synthesis module 3, signal transmission module 4, signal reception module 5, signal processing module 6, information Processing module 7 , alarm module 8 , display module 9 , power supply module 10 and lightning protection module 11 . The leaky cable module B is provided with two leaky cables, which are a transmitting cable and a receiving cable respectively. Two matching resi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of radio detection and especially relates to a leaky cable perimeter intrusion detection system. The system is mainly formed by three portions: a detection system main machine, a leaky cable module and a terminal module. The detection system main machine comprises a carrier wave signal generation module, a pseudo random coding generation module, an emission signal synthesis module, a signal emission module, a signal reception module, a signal processing module, an information processing module, an alarm module, a display module, a power supply module and a lightning-protection module. The leaky cable module is provided with an emission cable and a reception cable. The terminal module is provided with two matched resistors. One end of the emission cable and one end of the reception cable are connected with the detection system main machine, and the other ends are connected with the terminal module. The leaky cable perimeter intrusion detection system is relatively-high in anti-interference capability, strong in imperceptibility, high in positioning accuracy and low in alarm missing rate and mis-alarming rate; and no interference is generated between adjacent equipment.

Description

technical field [0001] The invention relates to the field of radio detection, in particular to a leakage cable perimeter intrusion detection system. Background technique [0002] The perimeter intrusion detection system based on leaky cables is an application of radio in the field of detection. Chinese Patent No. 03209915.0, titled "Perimeter Intrusion Prevention System Based on the Principle of Radio Electromagnetic Field", discloses a system that uses leaky cables to detect the intrusion of foreign objects. The principle is the principle of radio electromagnetic field leakage, and the amplitude and phase of the signal in the detection channel are completed. The disadvantage of target detection is that it needs to be divided into sections of equal length along the entire length of the perimeter, and the total number of sections is an even number. In the same laying section of two cables, the sending module connected to the sending cable and the receiving module connected to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G08B13/24
Inventor 王斌
Owner 王斌
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products