According to statistics, in the first two quarters of 2005, there were more than 550 cases of theft and destruction of power facilities in the Sichuan Electric Power Company system, with direct economic losses exceeding 2.6 million yuan. Relevant people made a conservative estimate that in recent years, the direct economic losses caused by the theft of power facilities alone exceeded 200 million yuan. The safety of the power grid has become a sword hanging over the heads of power companies. The supply of electricity, especially the safe and reliable supply of electricity, has always been the focus of attention of society, enterprises, people and the media. Because safe, stable and reliable power supply is related to the development of the national economy, the construction of a harmonious society, and the vital interests of the people.
According to the survey, the current maintenance, management and anti-theft situation of power facilities is summarized as follows:
1. Most power facilities such as transformers are outdoors and scattered in various streets, urban-rural fringe areas, rural areas, etc., which brings a lot of trouble to the safety management of transformers.
2. It is impossible for the power department to allocate a large number of manpower to monitor each transformer in real time manually to prevent the equipment from being stolen or damaged.
3. In China, some provinces have also adopted methods such as infrared, limited-distance wireless communication, and physical anti-theft cards to solve the anti-theft problem of transformers. However, due to the limitations of the principles of these systems or products, false alarms, weak anti-interference capabilities, and failure to receive alarm signals in a timely manner, a large amount of manpower, material resources, and financial resources have been wasted. At the same time, the wireless transmission method has high power (energy consumption) and requires the permission of the wireless management committee, which also has certain restrictions on the promotion of the system and products.
In summary, the theft of power lines and transformers is quite serious, and the relevant national departments attach great importance to it. Human defense plus technical defense is the most effective way. Our company has developed a power transformer MMS anti-theft alarm system for actual conditions. This system is mainly used for power transformer anti-theft alarm. Its characteristics are: not limited by distance, not limited by quantity, and not affected by climate. It has the characteristics of practical functions, excellent quality, stable and reliable operation, and is suitable for use in various outdoor environments. It is widely used in the safety protection of all outdoor working equipment such as electricity, petroleum, base stations, and mines. It is currently the most advanced MMS alarm system among similar products in China.
2. System Principle and Composition
1. System principle:
The MMS alarm host is installed next to the monitored power transformer or on the pole. Once the power transformer is stolen, the three-phase line is disconnected or the power is cut off, the monitoring alarm host will immediately detect it and send it to the user's mobile phone via short messages and pictures taken on the spot . At the same time, it will call the phone number set by the user. The siren on the spot will sound immediately. After receiving the alarm, the on-duty personnel will immediately send police to the scene to check the situation and deal with related problems.
2. System composition:
GSM/GPRS terminal alarm: host 1, door sensor 1, infrared camera 1 and some supporting wires, high-decibel speaker 1, antenna 1, camera power supply , host power supply, host built-in lithium battery.
2.1 Transformer MMS anti-theft alarm host
GSM (850M/900M/1800M/1900MHz) wireless cellular network controlled alarm host uses GSM short message data transmission mode and voice function platform to complete intelligent alarm data remote transmission and control. This series of hosts has the characteristics of practical functions, excellent quality, stable and reliable operation, etc. It is suitable for use in various outdoor environments and is widely used in the safety protection of all equipment working outdoors, such as electricity, petroleum, base stations, and mines. Due to the wide coverage area of GSM global wireless mobile communication network signals, it truly realizes low-cost and high-quality ultra-long-distance convenience, flexible intelligent wireless control and alarm, and solves the limitations of fixed-line wired or wireless high-power alarm control.
2.2 Basic features of the product:
1. Built-in three-phase power detection circuit, when it detects that the power line is considered to be cut off, it will immediately trigger the alarm;
2. Solar power supply interface: users can connect external solar panels for power supply;
3. Real-time monitoring of the on-site situation. If there is any abnormality on the site, the on-site pictures will be sent to the user's mobile phone immediately. The number of pictures and the sending frequency can be set by yourself;
4. 1-3 mobile phones can be bound, and the authorized person can receive SMS and MMS alarm signals at the same time;
5. Fully wireless design, GSM network, no need for complicated installation, easy and convenient operation;
6. The system is compatible with various formats, whether CMOS or CCD, it can be applied; wired defense area, wireless defense area, three-dimensional protection, seamless;
7. Customers can install infrared, smoke, gas and other detectors according to their needs;
8. Control the terminal to arm, disarm, capture photos, etc. through SMS commands or phone calls;
9. In addition to the MMS alarm function, you can also make a phone call to the police;
10. Video storage function: this product has a built-in SD card that can store video files.
3. Product Innovation:
The host incorporates many of the latest innovative technologies and is the first high-tech security product in China designed specifically for transformer theft prevention:
Remote monitoring via mobile phone, and browsing images directly via mobile phone;
Built-in three-phase power detection circuit, when it detects that the power line is considered to be cut off, it will immediately trigger the alarm;
Automatically capture on-site pictures when an alarm occurs and send MMS messages to designated mobile phones;
When an alarm occurs, a loud siren will sound automatically;
Remote control host via mobile phone text messages;
High-definition image monitoring, digital video and audio recording;
You can capture live images with your mobile phone at any time;
In case of an alarm, the on-duty personnel can make a remote call via mobile phone;
[page]
Base station anti-theft principle:
According to the on-site conditions of the mobile base station and the current network resources of the base station, we designed a wireless transmission method, through data images, voice, and text messages based on the China Mobile and China Unicom platform, to upload the images and alarm information (alarm types include: door magnetic alarm (entrance and exit control), infrared alarm, air conditioner theft alarm, battery theft alarm, feeder theft alarm, wire cutting alarm, power failure alarm, temperature alarm, infrared alarm, smoke and fire alarm, etc.) of the communication site to the central computer room and related leaders and maintenance personnel for processing. After the alarm occurs, the alarm will sound and the alarm will be automatically dialed through the China Mobile and China Unicom communication network. The 5 pre-set alarm phone numbers will be automatically cycled to intelligently identify whether the staff will receive the alarm. Once the alarm is received, the number will no longer be dialed; and Chinese and English text messages will be sent to the pre-set staff mobile phones, and the alarm base station will be identified by the content of the text message; the mobile phones of the heads of each base station can receive the alarm text messages (China Mobile and China Unicom) in time, and the monitoring center can also receive the alarm image information of the monitoring site. The alarm center is connected to the network for alarm, and the central computer room can remotely deploy, disarm, and monitor the site through software and telephone. At the same time, users can also play on-demand images of the front base station as needed, and understand the indoor and outdoor conditions of the base station at any time through the sent-back images; they can also let the wireless image host send images to the control center at a certain time every day.
Base station Anti-theft alarm Configuration
We can divide the security and anti-theft system into two levels for China Mobile and China Unicom base stations
1. The first-level security base station should be installed for remote monitoring and video storage. Key areas such as base station entrances and exits, battery placement areas, feeder windows, etc. should be monitored. The camera must be linked with other detectors such as access control, anti-theft alarm detectors, vibration alarm detectors, displacement alarm detectors, etc. Once an illegal intrusion occurs, it can be linked to turn on the lighting fixtures and start recording or uploading to the monitoring center.
2. The secondary security base station should be equipped with a snapshot image alarm function, and key areas such as base station entrances and exits, battery placement areas, feeder windows, etc. should be monitored. The camera must be linked with other detectors such as access control, anti-theft alarm detectors, vibration alarm detectors, displacement alarm detectors, etc. Once an illegal intrusion occurs, it can be linked to turn on lighting fixtures and start taking pictures; the photos taken should be stored locally and uploaded to the monitoring center in real time.
3. The third-level security base station should be equipped with infrared anti-theft alarm detectors, and the detection area should cover important parts such as the base station entrance and exit, feeder window, etc. The anti-theft alarm detector should have functions such as intrusion alarm, anti-dismantling alarm, and fault alarm, and should be linked with the access control system to achieve automatic deployment and withdrawal, and report the alarm situation to the monitoring center in the form of dual networks (China Mobile, China Unicom and PSTN).
System composition:
An alarm control host is installed in the base station. The control host is used to collect image monitoring signals such as anti-theft, fire prevention, vibration prevention, water intrusion, humidity, and temperature, and upload the monitoring image signals to the monitoring center or local storage via the China Mobile and China Unicom networks.
(1) Access control and anti-theft
(2) Wired and wireless infrared detection intrusion alarm (three identifications, namely: multi-element, microwave, pet-proof, and weather-proof)
(3) Transformer anti-theft (AC sensor, alarm when three-wire AC power is missing phase)
(4) Smoke detector (laser detection)
(5) Water intrusion detector
(6) Anti-vibration detector
(7) Alarm occurs when temperature or humidity exceeds the threshold
(8) Air conditioner The outdoor unit is protected from theft (wrap with wires to alarm for wire breakage), and a GPSONE positioning tracker is installed inside the air conditioner to monitor the movement of the air conditioner at any time. (Using the latest anti-theft technology, the host is set to anti-theft status via SMS. Once the target moves, the host will automatically start and send an SMS or phone alarm to the monitoring phone , which can immediately monitor and locate the target).
(9) Light control, alarm (when alarm occurs, linkage switch)
(10) Image monitoring equipment (optional: remote transmission or local storage)
(11) Important equipment such as batteries in the station: under video surveillance, GPSONE positioning trackers are also installed
(12) Displacement detector: (pipeline and air conditioning outdoor unit)
System Construction Principle
Through voice and text messages based on the China Mobile and China Unicom platforms, the alarm information of communication sites (including smoke and fire alarms, wire cutting alarms, water intrusion alarms, air conditioning theft alarms, temperature alarms, intrusion alarms, vibration alarms, power outage alarms, etc.) can be notified to the central computer room and related leaders and maintenance personnel for processing.
When an alarm occurs, the siren will sound and the system will automatically and cyclically dial several pre-set alarm phone numbers through the China Mobile and China Unicom communication networks. It will intelligently identify whether the staff has answered the alarm. Once the alarm is answered, the number will no longer be dialed. The system will also send a snapshot of the image in the form of MMS or Chinese text messages to the pre-set staff mobile phones. The alarm base station will be identified through the content of the text message. At the same time, the alarm center will be connected to the Internet to alarm. The central computer room can remotely deploy, de-arm, and monitor the scene through software and telephone, and can even immediately view the on-site images to see if there is any situation.
Previous article:Design and implementation of coal mine gas alarm wireless sensor network nodes
Next article:Security modernization: Look at the fingerprint smart lock technology of anti-theft doors
- Mir T527 series core board, high-performance vehicle video surveillance, departmental standard all-in-one solution
- Akamai Expands Control Over Media Platforms with New Video Workflow Capabilities
- Tsinghua Unigroup launches the world's first open architecture security chip E450R, which has obtained the National Security Level 2 Certification
- Pickering exhibits a variety of modular signal switches and simulation solutions at the Defense Electronics Show
- Parker Hannifin Launches Service Master COMPACT Measuring Device for Field Monitoring and Diagnostics
- Connection and distance: A new trend in security cameras - Wi-Fi HaLow brings longer transmission distance and lower power consumption
- Smartway made a strong appearance at the 2023 CPSE Expo with a number of blockbuster products
- Dual-wheel drive, Intellifusion launches 12TOPS edge vision SoC
- Toyota receives Japanese administrative guidance due to information leakage case involving 2.41 million pieces of user data
- Innolux's intelligent steer-by-wire solution makes cars smarter and safer
- 8051 MCU - Parity Check
- How to efficiently balance the sensitivity of tactile sensing interfaces
- What should I do if the servo motor shakes? What causes the servo motor to shake quickly?
- 【Brushless Motor】Analysis of three-phase BLDC motor and sharing of two popular development boards
- Midea Industrial Technology's subsidiaries Clou Electronics and Hekang New Energy jointly appeared at the Munich Battery Energy Storage Exhibition and Solar Energy Exhibition
- Guoxin Sichen | Application of ferroelectric memory PB85RS2MC in power battery management, with a capacity of 2M
- Analysis of common faults of frequency converter
- In a head-on competition with Qualcomm, what kind of cockpit products has Intel come up with?
- Dalian Rongke's all-vanadium liquid flow battery energy storage equipment industrialization project has entered the sprint stage before production
- Allegro MicroSystems Introduces Advanced Magnetic and Inductive Position Sensing Solutions at Electronica 2024
- Car key in the left hand, liveness detection radar in the right hand, UWB is imperative for cars!
- After a decade of rapid development, domestic CIS has entered the market
- Aegis Dagger Battery + Thor EM-i Super Hybrid, Geely New Energy has thrown out two "king bombs"
- A brief discussion on functional safety - fault, error, and failure
- In the smart car 2.0 cycle, these core industry chains are facing major opportunities!
- Rambus Launches Industry's First HBM 4 Controller IP: What Are the Technical Details Behind It?
- The United States and Japan are developing new batteries. CATL faces challenges? How should China's new energy battery industry respond?
- Murata launches high-precision 6-axis inertial sensor for automobiles
- Ford patents pre-charge alarm to help save costs and respond to emergencies
- Why is home automation so popular? Will it continue to be so popular?
- LSM6DSO Zynq FPGA Test Project
- STM32WB55 official resources
- Toshiba Bluetooth
- Successfully Integrate ST's VL53L5CX Sensor into Your Application: Cover Glass Selection
- Problems with paste layer and solder layer
- Prize-giving event: Show off your favorite electronic products
- Introduction of TMS320C6713
- Low-cost intelligent fire and burglar alarm system based on single chip microcomputer
- Share negative pressure power supply design