Research and Application on a Visualized Optical Fiber Fence Alarm System

Article Preview

Abstract:

A new visualized fiber fence alarm system was put forward in this paper, which was used Sagnac interferometric sensor of optical fiber fence on the surrounding invasion of signal detection and positioning, and sent alarm information and video monitoring system linkage, in order that the monitoring equipment switch to intrusion scene view timely. Finally the video record the intrusion events. This visualized alarm system makes full use of advantages of optical fiber detection and video surveillance, which improved the level of intelligence of security system and the security performance of the system.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3-7

Citation:

Online since:

February 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] I. Cernak and L.J. Noble-Haeusslein: Journal of Cerebral Blood Flow & Metabolism Vol. 30 (2010), p.255.

Google Scholar

[2] B. Zhao, H.G. Zhang, J. Li, L. Chen and S. Wen: Chinese Journal of Computers Vol. 1 (2010), p.82.

Google Scholar

[3] A.R. Metke and R.L. Ekl: Innovative Smart Grid Technologies Vol. 1 (2010), p.1.

Google Scholar

[4] A.R. Metke and R.L. Ekl: Smart Grid, IEEE Transaction on Vol. 1 (2010), p.99.

Google Scholar

[5] B. Liu, Y.F. Yang and W.C. Niu: Photon Technology Vol. 4 (2004), p.208.

Google Scholar

[6] S.M. Li, S.X. Qian, L.J. Kong, Z.C. Ren, Y. Li, C. Tu and H.T. Wang: Europhysics Letters Vol. 105 (2014), p.105.

Google Scholar

[7] A. Bhattachryya, D.K. Gayen and T. Chattopadhyay: Optics Communications Vol. 293 (2013), p.31.

Google Scholar

[8] P.V.N. Kishore, M.S. Shankar, P. Kishore, P.V. Rao and S. Roy: Microwave and Photonics Vol. 1 (2013), p.1.

Google Scholar

[9] D. Sven, C. Carsten, F. Carsten and G. Petra: Journal of Chemical Physics, Vol. 137 (2012), p.174201.

Google Scholar

[10] C. Tang, X.L. Lu and H.J. Wu: Security and Safety Technology Magazine, Vol. 9 (2010), p.20.

Google Scholar

[11] L.X. Wang, Q. Luo and X.G. Liu: System and Research, Vol. 4 (2007), p.60.

Google Scholar