Kontaktujte nás | Jazyk: čeština English
dc.title | Limitation of the advanced technology zone | en |
dc.contributor.author | Mach, Václav | |
dc.contributor.author | Adámek, Milan | |
dc.contributor.author | Valouch, Jan | |
dc.contributor.author | Mušálek, Miroslav | |
dc.relation.ispartof | Annals of DAAAM and Proceedings of the International DAAAM Symposium | |
dc.identifier.issn | 1726-9679 Scopus Sources, Sherpa/RoMEO, JCR | |
dc.identifier.isbn | 978-3-902734-20-4 | |
dc.date.issued | 2018 | |
utb.relation.volume | 29 | |
utb.relation.issue | 1 | |
dc.citation.spage | 719 | |
dc.citation.epage | 724 | |
dc.event.title | 29th International DAAAM Symposium on Intelligent Manufacturing and Automation, DAAAM 2018 | |
dc.event.location | Zadar | |
utb.event.state-en | Croatia | |
utb.event.state-cs | Chorvatsko | |
dc.event.sdate | 2018-10-24 | |
dc.event.edate | 2018-10-27 | |
dc.type | conferenceObject | |
dc.language.iso | en | |
dc.publisher | Danube Adria Association for Automation and Manufacturing, DAAAM | |
dc.identifier.doi | 10.2507/29th.daaam.proceedings.104 | |
dc.relation.uri | https://daaam.info/29th-proceedings-2018 | |
dc.relation.uri | https://www.daaam.info/Downloads/Pdfs/proceedings/proceedings_2018/104.pdf | |
dc.subject | intruder alarm system | en |
dc.subject | control and indicating equipment | en |
dc.subject | advanced technology zone | en |
dc.subject | detector | en |
dc.description.abstract | This article deals with the limitation of the Advanced Technology Zone (ATZ) which is one of the common methods of connecting analogue alarm detectors to the Control and Indicating Equipment (CIE). The ATZ model can handle up to three independent detectors. The modern alarm system can have thousands of detectors. However, the standard ATZ mode is not able to provide the sufficient number of alarm detectors. The new design should determinate and increase the maximal number of connected detectors to the CIE by using the low-tolerance bypassing resistors. All created ideas come with the technical details and the design was tested to ensure flawless and reliable operation in real time. © 2018, Danube Adria Association for Automation and Manufacturing, DAAAM. All rights reserved. | en |
utb.faculty | Faculty of Applied Informatics | |
dc.identifier.uri | http://hdl.handle.net/10563/1011230 | |
utb.identifier.obdid | 43878754 | |
utb.identifier.scopus | 2-s2.0-85060099028 | |
utb.source | d-scopus | |
dc.date.accessioned | 2023-01-06T08:03:56Z | |
dc.date.available | 2023-01-06T08:03:56Z | |
dc.description.sponsorship | IGA/CebiaTech/2018/004; Ministerstvo Školství, Mládeže a Tělovýchovy, MŠMT: LO1303, MSMT-7778/2014; European Regional Development Fund, ERDF: CZ.1.05/2.1.00/03.0089 | |
utb.contributor.internalauthor | Mach, Václav | |
utb.contributor.internalauthor | Adámek, Milan | |
utb.contributor.internalauthor | Valouch, Jan | |
utb.contributor.internalauthor | Mušálek, Miroslav | |
utb.fulltext.affiliation | Václav Mach, Milan Adámek, Jan Valouch and Miroslav Mušálek | |
utb.fulltext.dates | - | |
utb.fulltext.references | [1] Mach, V. (2016). Hardware Protection of Metallic Loops Against Sabotage, Trilobit, pp 1804-1795. [2] McLaughlin, R. Brooks, D. (2006). A study of the compliance of alarm installations in Perth, Western Australia: Are security alarm systems being installed to Australian Standard AS2201.1, Australian Information Warfare and Security Conference, pp. 0955-1662. [3] Hanacek, A, Sysel, M. (2015). The methods of testing and possibility to overcome the protection against sabotage of analog intrusion alarm systems, Intelligent Systems in Cybernetics and Automation Theory, pp 119–128. [4] Hanacek, A, Sysel, M, (2016). Design and Implementation of an Integrated System with Secure Encrypted Data Transmission, Automation Control Theory Perspectives in Intelligent Systems, pp 217-224. [5] CSN EN 50131-1 ed. 2. (2007). Alarm systems - Intrusion and hold-up alarm systems - Part 1 System requirements. Prague. [6] Shahnewaz, A. (2016). Embedded Home Surveillance System, 19th International Conference on Computer and Information Technology (ICCIT), pp 42-47 [7] Juhana, T; Anggraini, V, (2016). Design and Implementation of Smart Home Surveillance System, 10th International Conference on Telecommunication Systems Services and Applications (TSSA), pp 2372-7314 [8] Valouch, J. (2015). The Proposal of Methodology for Evaluating the Effectiveness of Alarm Systems. Applied Mechanics and Materials. pp 183-88. doi:10.4028/www.scientific.net/amm.736.183. [9] Landa, J, Chu J, and Miao J. (2017). Implementation of a Remote Real-Time Surveillance Security System for Intruder Detection. 9th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA), doi:10.1109/icmtma.2017.0032. | |
utb.fulltext.sponsorship | This work was supported by the Ministry of Education, Youth and Sports of the Czech Republic within the National Sustainability Programme Project No. LO1303 (MSMT-7778/2014) and also by the European Regional Development Fund under the project CEBIA-Tech No. CZ.1.05/2.1.00/03.0089 and by the Internal Grant Agency of Tomas Bata University under the project No. IGA/CebiaTech/2018/004 | |
utb.fulltext.projects | LO1303 (MSMT-7778/2014) | |
utb.fulltext.projects | CZ.1.05/2.1.00/03.0089 | |
utb.fulltext.projects | IGA/CebiaTech/2018/004 | |
utb.fulltext.faculty | - | |
utb.fulltext.ou | - |