Leaky Cable Intrusion Detection Method Based on Frequency Selective Coding Multicarrier Modulation

A technology of frequency selectivity and multi-carrier modulation, applied in multi-frequency code system, modulated carrier system, baseband system, etc., can solve the problems of system sensitivity drop, low detection sensitivity, false alarm, etc., and achieve high-precision positioning, high Detection sensitivity and the effect of expanding the range of application fields

Active Publication Date: 2020-11-06
上海微波技术研究所(中国电子科技集团公司第五十研究所)
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Most of the existing leaky cable intrusion detection devices adopt a single-frequency signal system. By transmitting a single-frequency signal, high-frequency energy is generated and fed into the transmitting leaky cable, and part of the energy radiates to the surrounding space through the gap, forming a joint with the receiving leaky cable. Spatial three-dimensional electromagnetic field warning area. When an intruder enters the area, it will disturb the electromagnetic field and form a Doppler frequency shift. The receiver circuit realizes the purpose of intrusion detection by detecting the energy of the Doppler frequency shift. This technology is used throughout the There is no positioning and partition sensitivity setting capabilities in the detection area, and the detection sensitivity is low. When encountering short-term co-frequency signal interference, the working conditions will be completely destroyed, resulting in serious false alarms
A small number of leakage cable intrusion detection devices use pseudo-random phase coding to modulate broadband signals to detect and locate intrusion targets. They have high detection sensitivity and partition sensitivity setting functions, but when encountering random in-band interference, the system will experience a decrease in sensitivity , Serious false alarms or even complete inability to work
When the electromagnetic coverage environment becomes more complex, the existing leaky cable detection technology is less able to ensure that the system can work normally when there is in-band random interference, and the detection sensitivity is basically not reduced, which seriously affects the complex distribution of leaky cable detection technology in the electromagnetic environment. The scope of application in the environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Leaky Cable Intrusion Detection Method Based on Frequency Selective Coding Multicarrier Modulation
  • Leaky Cable Intrusion Detection Method Based on Frequency Selective Coding Multicarrier Modulation
  • Leaky Cable Intrusion Detection Method Based on Frequency Selective Coding Multicarrier Modulation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several changes and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0022] Such as figure 1 As shown, the leakage cable intrusion detection method based on frequency selective coding multi-carrier modulation technology provided by the present invention includes:

[0023] Step 1: Perform constellation modulation on the pseudo-random coding sequence according to QAM, PSK, GSM, GPRS, spread spectrum signal or other modulation signals, perform frequency selective coding and symbol mapping according to spectrum detection and interference estimation vector, and then perform i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a leakage cable intrusion detection method based on the frequency selective coding multi-carrier modulation technology. The method comprises the following steps: step 1: performing constellation modulation on a pseudo-random coding sequence according to a desired modulation signal, performing frequency selective coding and symbol mapping according to a frequency spectrum detection and interference estimation vector, then performing inverse Fourier transform, and feeding a transmission signal to a transmission leakage cable input end after filtering and amplifying the same; and step 2: performing parallel cross-correlation operation on receiving signals and the transmission signals with uniform delay input from a receiving leakage cable, and performing moving target indication, threshold detection and delay estimation on the signal after the correlation operation in each parallel processing unit.

Description

technical field [0001] The invention relates to the technical field of leaky cable detection, in particular to a broadband leaky cable intrusion detection method using frequency selective coding multi-carrier modulation technology. Background technique [0002] Most of the existing leaky cable intrusion detection devices adopt a single-frequency signal system. By transmitting a single-frequency signal, high-frequency energy is generated and fed into the transmitting leaky cable, and part of the energy radiates to the surrounding space through the gap, forming a joint with the receiving leaky cable. Spatial three-dimensional electromagnetic field warning area. When an intruder enters the area, it will disturb the electromagnetic field and form a Doppler frequency shift. The receiver circuit realizes the purpose of intrusion detection by detecting the energy of the Doppler frequency shift. This technology is used throughout the There is no positioning and partition sensitivity...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L25/03H04L27/26G08B13/24
CPCG08B13/2497H04L25/03159H04L25/03305H04L27/2602H04L27/2627
Inventor 吴美武张文济宋祖安张一鹏祁巍
Owner 上海微波技术研究所(中国电子科技集团公司第五十研究所)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products