StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Evaluation of the Efficacy of an Internal Dual Technology Sensor Device - Term Paper Example

Cite this document
Summary
This term paper "Evaluation of the Efficacy of an Internal Dual Technology Sensor Device" discusses dual technology sensors that are very instrumental in ensuring that your security system is more effective owing to the fact that they are able to detect any form of an adversary within your area…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.7% of users find it useful

Extract of sample "Evaluation of the Efficacy of an Internal Dual Technology Sensor Device"

Evaluation of the efficacy of an internal dual technology sensor device Author’s name Institutional affiliation Evaluation of the efficacy of an internal dual technology sensor device Introduction Dual technology sensors or otherwise known as the motion sensors are very instrumental in ensuring that your security system is more effective owing to the fact that they are able to detect any form of adversary within your area (Biggs, & Mitroff, 2015). Additionally, the dual technology sensors employs one or a number of sensors to detect any form of motion in the protected area .In other words if the sensor is triggered, the security system is able to send a signal to the control panel of the security system that is linked to the monitoring center which then alerts the owner of any adversary or security threat within the protected area. Therefore, in order to understand dual technology sensors, it is essential to explore the applications, advantages and limitations of balanced magnetic switch, microwave sensors and the PIR sensor (Lian, Hsiao & Sung, 2013) Balanced magnetic switch Operation principles It is universally accepted that the magnetic switch is one of the most ubiquitous security sensor technologies globally since it is used for both window and door protections (Lian, Hsiao & Sung, 2013). Additionally, it is made up of a magnet that is internally located on a door or a window coupled with an operational switch unit that is installed right inside the window frame. In this case, when the window or the door in which the sensor is installed on is in a closed operational position, it is believed that the circuit that has been created is closed and it only opens when the window is open which as a result, makes the alarm bell to be initiated (He et al, 2015). The simple magnetic switch device which goes for a cost of approximately 10 dollars is employed in most small businesses and residential security system (Lian, Hsiao & Sung, 2013).However, very little information or rather knowledge is needed to defeat the security systems managed by a simple switch. To deal with such cases, the balanced magnetic switch BMS was established over three decades ago. The BMs needs a more skillful person to bypass it as compared to the simple magnetic switch. In other words, a BMS uses a magnet in both the magnetic units and the switch (Cattaneo, Motta & Gurtner, 2015). For instance, a switch unit is made up of a magnetic reed switch, a supervisory/temper circuitry and a bias magnet that is installed on the stationary part of the window or door unit. Moreover, the component that possesses the vast magnet is installed on the movable part of the window or door; adjacent to the installed switch unit on the frame when the window or door is closed. The diagram below shows a simple magnetic switch model. Whenever the window or the door is closed the magnets are then modified or rather adjusted in order to establish a magnetic loop making the reed switch to incur zero magnetic fields (Lian, Hsiao & Sung, 2013). In this case, the moment the window or the door is opened and the influence of the magnetic field limited, then the door contacts will at the same time open hence triggering an alarm that basically indicates that the security system has been tempered with (Biggs, & Mitroff, 2015). Additionally, in some security models, the impact of the magnetic field is modified through the adjustment of the bias magnet whereas in other complex models, the impact is varied by adjusting the impact of the magnetic unit as far as the switch unit is concerned. Therefore, anything that may cause the switch reed to adjust may trigger an alarm including moving an external magnet closer (Cattaneo, Motta & Gurtner, 2015). Characteristics, applications, advantages and limitations of BMS A BMS can be said to be a very visible and passive security systems that detects internal boundary penetration as a window or a door is being breached. Additionally, these switches are built in a variety of shapes and sizes and they basically achieve different levels of performance depending on their model types and where they were manufactured. One worrying trend is the fact that if a magnetic field is introduced externally, there is a high possibility that BMS can be defeated (Posey et al. 2014). However, if A BMS is manufactured with multiple reed switches and sensors, it is very challenging to bypass. Nevertheless, if an individual can find a way of removing the window or the door without detection, it is possible then for BMS to be defeated. Besides, if the intruder can find a way of ejecting the door magnet without detection then the BMS may be bypassed. In other words, BMS is only effective if the intruder tries to enter through the window or the door .Apparently, if the intruder cuts through the wall near the door, breaks the door or window pane or cuts through the door, then it is possible that the BMS will be bypassed (Lian, Hsiao & Sung, 2013). Interior microwave sensors Operation principles Internal microwave sensors are basically dual active volumetric technological sensors that are typically monostatic in the sense that they use a single antenna for both the receiver and transmit functions and all its component parts are located inside a single housing (Biggs, & Mitroff, 2015). Additionally, microwave sensors are known to emit an extensive energy field. Moreover, any movement in an area that is manned by a microwave will basically cause adjustments to the microwave energy in the form of a Doppler frequency shift. Furthermore, an object or an individual moving within or close to the microwave energy field will result into minute adjustments in the microwave frequency. Since the microwave sensor understands clearly the frequency it normally transmits, then whenever it notices any different frequency, it is possible for it to process the difference that exists between the two frequencies. In this case, the alarm will be triggered if the identified difference in the frequency will be slightly higher than the preset threshold (Posey et al. 2014).. Characteristics, applications, advantages and disadvantages It is universally accepted that microwave sensors are the most effective and sensitive internal dual security sensors when they are implemented so that any intruder would necessarily walk towards or away from the intruder (Lian, Hsiao & Sung, 2013). Additionally, microwave sensors can be employed to monitor internal spaces that are very confined like vaults service passageways, hallways and special storage areas. Moreover, they can as well be used as early indicators of impending terror attack that is approaching a window or a door wall. In situations where an extensive coverage of a well-defined area is needed, the application of monostatic microwave sensors is very much recommended (Cattaneo, Motta & Gurtner, 2015). To enhance the security detection ability, it is argued that a facility can be able to implement a complementary PIR sensor-a passive infrared detector. In simple terms, PIR detector is assumed to be complementary to a microwave detector in the sense that it works best whenever an intruder moves across the detection zone which is directly the opposite of what the microwave needs to operate (Posey et al. 2014). Additionally, the employment of a complementary detection system offers a second defense line while at the same time providing the much needed security personnel with additional data that is important in assessing an alarm more accurately and discriminate potential or actual penetrations from any adverse activities. One limiting factor of the microwave sensors revolve around the fact that they are least sensitive if they are basically installed in such a way that an intruder may be in apposition to reduce their motion in the paths that lie across the pattern of detection (Jo & Kim, 2013). In simple terms, it is argued that as much as it is very challenging to defeat a microwave sensor, a very slow motion by an adversary can as well be challenging for the microwave to sense (Biggs, & Mitroff, 2015). However some of its advantages lie in the fact that it has a special type of properties that makes them to penetrate in any kind of surfaces excluding metals. It is for this reason that makes most microwave sensors to detect any kind of movement in an area that is presumed undesirable and fail to detect movement in those areas that can be classified as undesirable. Passive infrared sensors Operational principles It is universally known that the most commonly employed volumetric sensors around the globe for interior applications are the PIR sensors (Posey et al. 2014). Additionally, most facilities are known to use PIRs basically for screening particular areas of interior rooms. Moreover, PIR sensors are believed to detect any form of electromagnetic radiated energy that is produced by materials that radiate temperatures that lies below the normal visible light. Furthermore, the PIR sensors do not necessarily emit any form of energy field into the field they are screening and they do not determine the extent and the level of infrared energy (Murphy, Magno & Popovici, 2014). In other words, PIRs are known to determine any notable changes in thermal radiation. They perform their function by detecting the change in contrast that is witnessed between the source of heat and the ambient background temperature values (Biggs, & Mitroff, 2015). Using Fresnel optics or rather parabolic mirrors, the infrared energy is redirected to the chip responsible for detecting in the sensor (Jo & Kim, 2013). Additionally, by employing a number of lenses, the detection pattern is then subdivided into what is classified as solid angular segments. Moreover, as an individual passes across the detection areas, it is assumed that each segment that has been affected will produce a decrease or an increase in temperature which will then indicate a security breach (Pang, 2013). In other words, the infrared energy that is witnessed is detected with the help of a pyro-electric device or a thermopile and it is then converted into an electrical signal. Besides, the signal that is produced is then passed to the circuitry situated in the sensor for processing in order to establish whether the signal is an alarm or not. In simple terms an electronic alarm is annunciated whenever the ambient background temperature difference with the intruder reaches a predetermined value (Posey et al. 2014). Furthermore, as far as some sensors are concerned, the witnessed difference can be as low as a degree Celsius Characteristics, applications, advantages and disadvantages PIR are installed as a security detection device in such a way that the pattern of detection covers the asset or the area that needs to be protected. Additionally, the detection pattern can in one way or the other be witnessed in the form of a searchlight beam that expands as the protection area widens farther with some parts of the protective area being illuminated with the beams while others miss out (Biggs, & Mitroff, 2015). In simple terms, with such a simple design attribute, the PIR is able to gives room for the use to concentrate the beam on that detective area where security is much needed while at the same time ignoring the areas that security is deemed as a minor are of concern. Any changes in the infrared indicative signature are witnessed whenever an adversary or an intruder moves laterally through the searchlight beam or rather the detective range. In other words, positioning the detective indicator in such a way that an adversary has no choice but to walk through the searchlight beam range is arguably what will make the PIR to work more effectively as compared to setting it so that the intruder walks towards the detector (Posey et al. 2014). Additionally, the presence of a passive detective sensor is more challenging for an adversary to establish as compared to an active sensor which makes the object or the security adversary to be at a disadvantage( Catalano et al 2014). However, in a setting where explosive vapors can be found, passive sensors are universally accepted as the safer ones as compared to the more renowned active sensors since there is no emission of potentially explosion-initiating energy. Several passive sensors can be established in a volume without necessarily interfering with the working of each other since no radiation signals are emitted (Pang, 2013). One disadvantage of PIR revolves around the fact that, it is easier to bypass if the intruder moves away or towards the sensor. Moreover since it can generally be assumed to be a line-of-sight detector, the detector range can be blocked easily by cubicle furniture or partitions (Biggs, & Mitroff, 2015). Conclusions and recommendations The best action that an individual can take to improve the effectiveness of the dual technology sensors an in the process, help, in reducing false alarms is to ensure that they go through the instructions that are bought with the sensors in order to deal with issues of false alarms. Therefore, to improve the efficacy of dual technology sensors, it is suggested that The PIR sensors should be installed 10-15 feet away from any form of heat where there are radiators and sunlight shines in. In this case, the sensor can trigger a false alarm if it notices excessive sunlight or light into your room hence triggering a false alarm (Dechesne, Warnier & van den Hoven, 2013). The motion sensors should be established at chokepoints like areas where movement is guaranteed like the main hallway or the stairwell such that the intruder will be able to trigger the sensor whenever they try to sneak in regardless of where they are going through (Dechesne, Warnier & van den Hoven, 2013). References Biggs, A. T., & Mitroff, S. R. (2015). Improving the efficacy of security screening tasks: A review of visual search challenges and ways to mitigate their adverse effects. Applied Cognitive Psychology, 29(1), 142-148. Catalano, A., Bruno, F. A., Pisco, M., Cutolo, A., & Cusano, A. (2014). An intrusion detection system for the protection of railway assets using Fiber Bragg Grating sensors. Sensors, 14(10), 18268-18285. Cattaneo, A. A., Motta, E., & Gurtner, J. L. (2015). Evaluating a Mobile and Online System for Apprentices' Learning Documentation in Vocational Education: Usability, Effectiveness and Satisfaction. International Journal of Mobile and Blended Learning (IJMBL), 7(3), 40-58. Dechesne, F., Warnier, M., & van den Hoven, J. (2013). Ethical requirements for reconfigurable sensor technology: a challenge for value sensitive design. Ethics and Information Technology, 15(3), 173-181. He, W., Stottinger, M., de la Torre, E., & Diaz, V. (2015, November). A self-tuned thermal compensation system for reducing Process Variation influence in side-channel attack resistant dual-rail logic. In Design of Circuits and Integrated Systems (DCIS), 2015 Conference on (pp. 1-6). IEEE. Jo, K., & Kim, W. J. (2013). SAPE Database Building for a Security System Test Bed. Lian, K. Y., Hsiao, S. J., & Sung, W. T. (2013). Intelligent multi-sensor control system based on innovative technology integration via ZigBee and Wi-Fi networks. Journal of network and computer applications, 36(2), 756-767. Murphy, F. E., Magno, M., & Popovici, E. (2014). Design and Implementation of a Heterogeneous, Power Efficient Wireless Sensor Network for Smart Toys. In International Workshop on Robotic Sensor Networks, Cyber-Physical Systems Week. Pang, Z. (2013). Technologies and Architectures of the Internet-of-Things (IoT) for Health and Well-being. Posey, C., Roberts, T. L., Lowry, P. B., & Hightower, R. T. (2014). Bridging the divide: a qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders. Information & management, 51(5), 551-567. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Evaluation of the Efficacy of an Internal Dual Technology Sensor Term Paper, n.d.)
Evaluation of the Efficacy of an Internal Dual Technology Sensor Term Paper. https://studentshare.org/technology/2067302-evaluation-of-the-efficacy-of-an-internal-dual-technology-sensor-device
(Evaluation of the Efficacy of an Internal Dual Technology Sensor Term Paper)
Evaluation of the Efficacy of an Internal Dual Technology Sensor Term Paper. https://studentshare.org/technology/2067302-evaluation-of-the-efficacy-of-an-internal-dual-technology-sensor-device.
“Evaluation of the Efficacy of an Internal Dual Technology Sensor Term Paper”. https://studentshare.org/technology/2067302-evaluation-of-the-efficacy-of-an-internal-dual-technology-sensor-device.
  • Cited: 0 times

CHECK THESE SAMPLES OF Evaluation of the Efficacy of an Internal Dual Technology Sensor Device

Internet of things and sun spot

legal and privacy issues; need for adequate technology; importance of energy efficiency; smart devices and smart systems; smart grid; smart lighting systems; sensors and devices; java sun spot; building a remote light control.... Currently, the level of technology would this a very expensive proceeding, but nevertheless this has been demonstrated on a small scale.... For example, most buildings have a lighting system, a heating system and internal devices such as microwaves, televisions and computers....
17 Pages (4250 words) Essay

Evolution of Internet: TRENDNet, D-Link and Linksys

A router is a networking device that analyzes data and forwards it to a certain destination.... D-link is another company which has developed technology products for two and half decades.... The third company that deals with high speed routers is Linksys, which has been providing technology solutions for long.... The company has high speed routers with high performance like; Linksys E4200 dual band wireless-N router and RV042 router (Zdnet 2012)....
4 Pages (1000 words) Essay

Velocity sensors

During an evaluation of velocity, it is essential to track the direction of the object.... For instance, the device determines change of position when an object moves forward or backwards.... For instance, the device determines change of position when an object moves forward or backwards.... Name: Instructor: Task: Date: Velocity Sensors Abstract of sensor A velocity sensor is a crucial tool that is used to determine the rate of change of position of an object....
3 Pages (750 words) Research Paper

Heat stroke monitoring device

Name: Course: Tutor: Date: Heat Stroke Monitoring device Over the years, there have been attempts to come up with effective techniques to detect and prevent heat stroke.... At first, developers thought that a simple and cheap device could monitor body temperature of a group.... This heat sensor monitor can calculate Wet bulb globe temperature values lower than 2.... Design Goal, Criteria, and Constraints There is need for heat stock sensor that is easy to use by someone without any medical expertise (Croce and Jenna)....
3 Pages (750 words) Essay

Sensory Evaluation Method

"Sensory evaluation Method" paper examines the test that requires analysis in getting information regarding a subject's reaction to differences between samples.... hellip; Analytical sensory tests are the sensory evaluation methods that require analysis in getting information regarding a subject's reaction to differences between samples.... A single sample is presented at a time but the evaluation is passed on several samples that are successfully presented....
7 Pages (1750 words) Assignment

The Internet of Things

The information regarding the activities of a sensory monitored truck help in the evaluation of driver efficiency and credibility through reports filed over the internet from the sensor.... For instance, a truck with a sensory device has to stick to a set course where any redirection from the course would serve as a case for alarm for truck owners (Giusto 117).... Therefore, network convergence in this case reduces losses through theft and other risks that allow truck owners with this technology stay ahead of the business chain....
2 Pages (500 words) Assignment

The Science of Sensory Evaluation

This paper "The Science of Sensory Evaluation" focuses on the fact that sensory evaluation is the science that refers to the measurement and study of evaluation of food and drinks items on the basis of their texture, taste, temperature, odour, and appearance.... The sensory evaluation would help discover the differences and likenesses between different food items or drinks.... Food products are examined, analyzed, and rated using the process of sensory evaluation....
8 Pages (2000 words) Assignment

Miniature Sensor and Absolute Orientation Measurements

Performance The level of performance of a device of this nature comes from a lot of factors such as different types of functioning sub-components built in the device.... Though stocked with complex operations and specifications such as the ability to compute and output a real-time drift-free 3D orientation solution that is continuous over the complete 360 degrees of motion (Vector Nav, 2011), the device can be trusted to work for long if not forever....
3 Pages (750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us