Talk about the security technology of small districts and look at the confrontation of doubts in community security monitoring.

by banjia5q on 2012-02-29 21:31:24

Smart communities are derived from the combination of intelligent building technology and modern residential areas. In terms of housing, the concepts of smart homes, smart communities, and smart neighborhoods have emerged successively. The main difference between smart communities and intelligent buildings in public structures is that smart communities emphasize individual residential units and focus on property management functions.

Residential community security technology

The safety prevention system of a residential community mainly includes perimeter defense alarm systems, security video surveillance systems, household anti-theft alarm systems, building visual intercom systems, and access control systems. Among these, new technologies widely used in communities include biometric recognition, wireless alarm technology, monitoring technology, laser radar technology, intelligent video analysis technology, etc., which are primarily applied in high-end residential areas.

Application of laser radar in perimeter alarms

Typically, the scope around a community is large, with different surrounding conditions and environments for various communities. Traditional walls plus human defense are difficult to achieve comprehensive and effective management. Perimeter defense alarms can implement 24-hour round-the-clock monitoring of the community's perimeter, allowing security personnel to promptly and accurately understand the situation around the community. This enables automatic alarms and incident records for future inquiries.

Traditional perimeter defense alarm technologies mainly include infrared beam, microwave beam, vibration cable, leakage cable, and electronic fence technologies. Laser radar technology, as a new technology, solves the problem of false alarms caused by small animals, trees, and weather conditions in other protective technologies.

When deploying laser radar products, the laser beam moves along a fan-shaped surface. The reflected laser beam is captured by the receiving window, creating a detection plane in real time. The laser perimeter system's laser emits 7000 pulses per second, averaging one scan of any point in the deployment area every 0.2 seconds. Once an intruder enters this area, the system will calculate the target's distance and direction in real time, determine the target's location through identification algorithms, immediately send the target coordinate information back to the monitoring center, and control the zoom camera to monitor the alarm point.

Digital Video Surveillance System

The video surveillance system in the community mainly sets up monitoring points in important areas such as the perimeter, entrances and exits, main roads, unit door entrances and exits, underground garage entrances and exits and interiors, elevator lobbies, inside elevator cabins, and security centers. It sends the image signals from each monitoring point at the scene in real time to the monitoring center, enabling security personnel to monitor the above-mentioned areas in real time. Thus, it provides dynamic security information across the entire monitored area, strengthens management, avoids the inconvenience and errors of manual management, and improves management efficiency and level.

Currently, video surveillance technology is mainly divided into two categories: the first is the analog surveillance system; the second is the digital surveillance system. Among them, the digital surveillance system is further divided into two modes: the IP video surveillance method with analog cameras plus encoders, and the fully digital IP video surveillance method composed of network cameras. Compared to the analog surveillance system, the digital surveillance system transmits via Ethernet, requiring fewer transmission cables, saving pipeline resources, making expansion easier, having no limit on image transmission distance, and supporting multi-point management. Currently, digital surveillance systems are already being used in large communities.

Due to the application of digital surveillance systems, various new products and technologies have also been more widely applied in digital surveillance systems, such as megapixel cameras and intelligent video analysis technologies.

Digital Visual Intercom System

Building visual intercom systems are indispensable safety prevention systems in contemporary intelligent communities. They are mainly used to prevent unauthorized individuals from entering the community or building, ensuring the personal and property safety of residents within the community.

Based on Ethernet visual intercom systems, they achieve digital compression transmission of audio, video, and control signals, making images brighter, sounds clearer, improving networking stability, and enhancing resistance to interference. They solve the line occupation problems of bus-based intercom systems and support simultaneous use of multiple channels.

Currently, some Ethernet-based visual intercom systems integrate functions such as visual intercoms, access control, home security, and smart homes. The system integrates the operation interfaces of multiple subsystems, reducing the number of operation panels, allowing users to control various systems on a single control screen.

Wireless Alarm Application

Household theft alarm systems install various types of detectors (including dual-detection detectors and emergency buttons) at vulnerable locations and important places. When abnormal situations occur, such as someone attacking nearby, illegal intrusion, emergencies, or injuries requiring urgent assistance, pressing the emergency button can trigger timely alarms and requests for help.

The control host at the user end forms an alarm network with the management center. Once illegal intrusion occurs, pressing the emergency button will cause the detector to detect the alarm signal and transmit the alarm signal to the alarm control host through cables.

Previously, fixed emergency buttons were basically used in emergency alarm button settings, which were not suitable for users with mobility difficulties. To address this issue, both fixed buttons and wireless alarm buttons are installed simultaneously in residential communities to adapt to different user groups.

Wireless Electronic Patrol System

Electronic patrol systems install patrol points in the community’s underground garages, important equipment rooms, and surveillance blind spots, setting reasonable patrol routes to ensure security personnel conduct patrols according to specified times and routes. Managers can use system software to check and orderly manage the work of security personnel, strengthening the management of daily patrol work for security personnel.

Electronic patrol systems are mainly divided into online and offline types. Online patrol technology can promptly transmit patrol point information to the management center, facilitating timely understanding of patrol personnel's patrol conditions but has drawbacks such as extensive wiring and difficulty in modifying patrol points once set. Offline patrol technology allows arbitrary setting of patrol points but the delayed transmission of patrol information prevents the management center from understanding patrol conditions in real time.

To address the technical defects of these two patrol modes, a domestic wireless walkie-talkie coverage-based electronic patrol method has emerged, avoiding the shortcomings of online and offline patrol technologies, demonstrating the system's functionality, and enhancing the internal security assurance capabilities and management of patrol personnel in communities. Within the coverage area of the wireless walkie-talkie network, patrol points can be arbitrarily set. Patrol personnel do not need to carry additional patrol batons but rely on walkie-talkies equipped with patrol chips to emit patrol point information, transmitting information through the wireless walkie-talkie coverage network.

Application of Biometrics in Access Control

Typically, community security installs access control systems at entrances and exits, unit doors, entrance doors, treasure rooms, wine cellars, etc. The access control technologies used in residential communities include contactless IC cards, biometric recognition technologies such as fingerprints, palm scanners, and vein scanning. Biometric recognition technology does not have issues like loss or impersonation, which IC card technology cannot achieve, and thus has certain applications in high-end residential communities.

Biometric recognition technology is a technique that uses computer and optical, acoustic, biological sensor, and biostatistical principles closely combined with human biological characteristics for identity authentication. During interactive identity verification, the biometric recognition system acquires its features and compares them with recorded biometric features. After determining whether they match, it decides whether to accept or reject. Biometric recognition technology does not require remembering passwords or carrying IC cards, and it has advantages such as being easy to remember, good anti-counterfeiting performance, and being difficult to forge, gradually gaining favor among owners of luxury villas and high-end properties.

Common Issues and Solutions in Security Monitoring

During the use and operation of community intelligence, various problems may arise due to design flaws, installation issues, or improper use. Below is a summary of common problems and solutions!

Disorderly or Missing Line Labels during Comprehensive Wiring

Here, all system wiring is included in comprehensive wiring. The wiring system engineering is the longest construction period and the most labor-intensive part of the entire project and is also the most important part of the whole system. In modern community construction, it is mostly hidden engineering and permanent links.

In wiring, there are often phenomena of disordered or missing line labels, causing considerable trouble for project installation, debugging, and maintenance. Without labels, additional manpower must be invested to measure lines during equipment installation and debugging. If the labels remain unclear or missing after the project is completed, it will create difficulties for maintenance work. Therefore, during the wiring process, each line must be clearly labeled. This not only saves installation costs but also facilitates project installation and debugging.

The reason for such phenomena is often due to inadequate project management. The solution is to provide comprehensive training for construction personnel and strictly require them during construction.

Lack of Waterproofing and Sunscreen Measures at Outdoor Wiring Endpoints

Lines that need to be connected outdoors must have waterproofing and sunscreen measures to extend the system's lifespan and stability.

Without waterproofing and sunscreen treatment at line endpoints, aging easily occurs, leading to system instability, high repair rates, and even system paralysis if repairs are untimely.

Solutions:

1. Lines should be connected indoors wherever possible, even if it means extending some lines. A hand-in-hand wiring method can be used in the bus system.

2. Outdoor connections can be sealed to slow down aging. The disadvantage of this method is that it is inconvenient during system repairs and line inspections. If lines need to be disassembled, they must be resealed.

3. An outdoor distribution box can be added where all lines connected outdoors enter the distribution box for connection. This method not only solves the waterproofing and sunscreen problems outdoors but also makes inspections convenient.

Unsuitable Installation Height of Intercom Hosts

Most intercom host installations use the bottom of the host 1.5 meters from the ground as the standard, but because the height of hosts varies among manufacturers, the specific installation height must depend on the actual situation. It should be based on the height of the camera so that visitors can be seen more clearly on the indoor subunit. Some unit doors have steps, causing visitors to stand not at the bottom of the doorframe but one or two steps lower. Therefore, the installation height of the host must fully consider the site conditions.

Some intercom hosts are not rainproof, possibly because the canopy is too small, exposing the host to sunlight and rain, affecting the stability and lifespan of the equipment.

Solutions:

1. The entrance machine can be installed on the unit door, preventing the host from being exposed outside the canopy.

2. If the host must be installed on the wall, the canopy size can be increased or a protective device added to the host.

Closed-Circuit Surveillance System with Lines and Strong Electric Circuits in the Same Conduit

In closed-circuit surveillance wiring, strong electric lines often appear parallel or even in the same conduit, mainly due to poor design considerations. However, we should not randomly wire in such cases. With efforts during construction, the stability and reliability of the system can still be improved; otherwise, serious distortion of the monitoring image may occur.

Solutions:

1. Use shielded or even double-shielded cables.

2. Even in the same conduit, try not to wire in the same tube as the strong electric circuit.

3. Especially in elevators, since elevators have strong power electricity, the impact is greater. Strive to keep a distance from the strong electric circuit, even one centimeter can make the image signal several times better.

4. Add anti-interference equipment.

Privacy Exposure in Closed-Circuit Surveillance Systems

Community surveillance can easily see into residents' homes, exposing their privacy without them realizing it. If recording materials are improperly transferred, it can cause significant harm to the residents, potentially leading to legal disputes.

Solutions:

1. Install cameras in appropriate positions, mainly in public places such as squares and main roads.

2. Cameras should avoid facing residential areas.

Improper Installation Position of Parking Lot Card Readers

There are two types of card readers in the market: ID and IC, with reading distances ranging from 10 cm to 10 m. For medium and long-distance card readers, since the reading distance is far, drivers usually don't need to take out their cards actively. Just placing the card inside the vehicle will automatically read it as the car passes by the reader. For short-distance card readers (10 cm), drivers must roll down the window, take out the card, and swipe it in front of the reader for data collection. Therefore, the card reader must be installed in a position easily accessible to the driver. In some communities, due to site restrictions, vehicles cannot smoothly turn in and out, resulting in drivers having to get out of the car to swipe the card, causing inconvenience to the residents. Solution: Fully examine the site and choose a suitable and reasonable position to install parking lot management equipment.

Perimeter Defense System Installed with Normally Closed Alarm Mode

General alarm methods can be divided into two types: normally open alarm and normally closed alarm. The normally closed alarm mode is not suitable for perimeter defense systems because under normal conditions, the system remains normal when the signal line is open. However, if the signal line breaks due to some factors, the system still indicates a normal state without alarming. On the contrary, the normally open alarm mode will alarm as soon as the line breaks, achieving the purpose of automatic system detection. Regardless of which alarm mode is chosen, the probability of line breakage is much higher than short circuits. Therefore, I suggest using the normally open alarm mode for perimeter defense systems.

Unsuitable Electronic Patrol Routes

Electronic patrol can be divided into wired patrol and wireless patrol. Due to the convenience of installation, simplicity of maintenance, and system stability, wireless electronic patrol has gradually replaced traditional wired patrol systems. Poor patrol routes can distract patrol personnel. For example, patrol personnel may have to cross lawns to reach patrol points, especially bringing inconvenience to patrol personnel in rainy or snowy weather.

Solutions:

1. Design patrol routes in an S-shaped pattern to minimize blind spots.

2. Install patrol points in places easily reachable by patrol personnel, generally at roadside or in front of unit entrances.

Infrared Detectors Facing Windows in Home Networked Alarm Systems

Home networked alarm systems bring a sense of security to each household, but frequent false alarms can be annoying. Besides product selection, the installation of equipment is also closely related to the rate of false alarms. Anti-theft devices installed inside homes are mostly infrared detectors. If infrared detectors face windows or appliances with significant temperature changes, more false alarms will occur. The most common issue in installation is that the effective range of the detector reaches outside the window, causing environmental factors outside to trigger many false alarms.

Solution: Orient the detector towards a more stable indoor environment.

Various problems may arise during the installation and debugging process, but we should strive to reduce the occurrence of these problems to avoid more issues and difficulties in future use and maintenance.