Publikace UTB
Repozitář publikační činnosti UTB

Limitation of the advanced technology zone

Repozitář DSpace/Manakin

Zobrazit minimální záznam


dc.title Limitation of the advanced technology zone en
dc.contributor.author Mach, Václav
dc.contributor.author Adámek, Milan
dc.contributor.author Valouch, Jan
dc.contributor.author Mušálek, Miroslav
dc.relation.ispartof Annals of DAAAM and Proceedings of the International DAAAM Symposium
dc.identifier.issn 1726-9679 Scopus Sources, Sherpa/RoMEO, JCR
dc.identifier.isbn 978-3-902734-20-4
dc.date.issued 2018
utb.relation.volume 29
utb.relation.issue 1
dc.citation.spage 719
dc.citation.epage 724
dc.event.title 29th International DAAAM Symposium on Intelligent Manufacturing and Automation, DAAAM 2018
dc.event.location Zadar
utb.event.state-en Croatia
utb.event.state-cs Chorvatsko
dc.event.sdate 2018-10-24
dc.event.edate 2018-10-27
dc.type conferenceObject
dc.language.iso en
dc.publisher Danube Adria Association for Automation and Manufacturing, DAAAM
dc.identifier.doi 10.2507/29th.daaam.proceedings.104
dc.relation.uri https://daaam.info/29th-proceedings-2018
dc.relation.uri https://www.daaam.info/Downloads/Pdfs/proceedings/proceedings_2018/104.pdf
dc.subject intruder alarm system en
dc.subject control and indicating equipment en
dc.subject advanced technology zone en
dc.subject detector en
dc.description.abstract This article deals with the limitation of the Advanced Technology Zone (ATZ) which is one of the common methods of connecting analogue alarm detectors to the Control and Indicating Equipment (CIE). The ATZ model can handle up to three independent detectors. The modern alarm system can have thousands of detectors. However, the standard ATZ mode is not able to provide the sufficient number of alarm detectors. The new design should determinate and increase the maximal number of connected detectors to the CIE by using the low-tolerance bypassing resistors. All created ideas come with the technical details and the design was tested to ensure flawless and reliable operation in real time. © 2018, Danube Adria Association for Automation and Manufacturing, DAAAM. All rights reserved. en
utb.faculty Faculty of Applied Informatics
dc.identifier.uri http://hdl.handle.net/10563/1011230
utb.identifier.obdid 43878754
utb.identifier.scopus 2-s2.0-85060099028
utb.source d-scopus
dc.date.accessioned 2023-01-06T08:03:56Z
dc.date.available 2023-01-06T08:03:56Z
dc.description.sponsorship IGA/CebiaTech/2018/004; Ministerstvo Školství, Mládeže a Tělovýchovy, MŠMT: LO1303, MSMT-7778/2014; European Regional Development Fund, ERDF: CZ.1.05/2.1.00/03.0089
utb.contributor.internalauthor Mach, Václav
utb.contributor.internalauthor Adámek, Milan
utb.contributor.internalauthor Valouch, Jan
utb.contributor.internalauthor Mušálek, Miroslav
utb.fulltext.affiliation Václav Mach, Milan Adámek, Jan Valouch and Miroslav Mušálek
utb.fulltext.dates -
utb.fulltext.references [1] Mach, V. (2016). Hardware Protection of Metallic Loops Against Sabotage, Trilobit, pp 1804-1795. [2] McLaughlin, R. Brooks, D. (2006). A study of the compliance of alarm installations in Perth, Western Australia: Are security alarm systems being installed to Australian Standard AS2201.1, Australian Information Warfare and Security Conference, pp. 0955-1662. [3] Hanacek, A, Sysel, M. (2015). The methods of testing and possibility to overcome the protection against sabotage of analog intrusion alarm systems, Intelligent Systems in Cybernetics and Automation Theory, pp 119–128. [4] Hanacek, A, Sysel, M, (2016). Design and Implementation of an Integrated System with Secure Encrypted Data Transmission, Automation Control Theory Perspectives in Intelligent Systems, pp 217-224. [5] CSN EN 50131-1 ed. 2. (2007). Alarm systems - Intrusion and hold-up alarm systems - Part 1 System requirements. Prague. [6] Shahnewaz, A. (2016). Embedded Home Surveillance System, 19th International Conference on Computer and Information Technology (ICCIT), pp 42-47 [7] Juhana, T; Anggraini, V, (2016). Design and Implementation of Smart Home Surveillance System, 10th International Conference on Telecommunication Systems Services and Applications (TSSA), pp 2372-7314 [8] Valouch, J. (2015). The Proposal of Methodology for Evaluating the Effectiveness of Alarm Systems. Applied Mechanics and Materials. pp 183-88. doi:10.4028/www.scientific.net/amm.736.183. [9] Landa, J, Chu J, and Miao J. (2017). Implementation of a Remote Real-Time Surveillance Security System for Intruder Detection. 9th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA), doi:10.1109/icmtma.2017.0032.
utb.fulltext.sponsorship This work was supported by the Ministry of Education, Youth and Sports of the Czech Republic within the National Sustainability Programme Project No. LO1303 (MSMT-7778/2014) and also by the European Regional Development Fund under the project CEBIA-Tech No. CZ.1.05/2.1.00/03.0089 and by the Internal Grant Agency of Tomas Bata University under the project No. IGA/CebiaTech/2018/004
utb.fulltext.projects LO1303 (MSMT-7778/2014)
utb.fulltext.projects CZ.1.05/2.1.00/03.0089
utb.fulltext.projects IGA/CebiaTech/2018/004
utb.fulltext.faculty -
utb.fulltext.ou -
Find Full text

Soubory tohoto záznamu

Zobrazit minimální záznam