TBU Publications
Repository of TBU Publications

Design of shielding enclosure to protect security devices

DSpace Repository

Show simple item record


dc.title Design of shielding enclosure to protect security devices en
dc.contributor.author Kovář, Stanislav
dc.contributor.author Mach, Václav
dc.contributor.author Valouch, Jan
dc.contributor.author Adámek, Milan
dc.relation.ispartof 2017 Progress in Electromagnetics Research Symposium - Fall (PIERS - Fall)
dc.identifier.issn 1559-9450 Scopus Sources, Sherpa/RoMEO, JCR
dc.identifier.isbn 9781538612118
dc.date.issued 2018
utb.relation.volume 2018-November
dc.citation.spage 2424
dc.citation.epage 2429
dc.event.title 2017 Progress In Electromagnetics Research Symposium - Fall, PIERS - FALL 2017
dc.event.location Singapore
utb.event.state-en Singapore
utb.event.state-cs Singapur
dc.event.sdate 2017-11-19
dc.event.edate 2017-11-22
dc.type conferenceObject
dc.language.iso en
dc.publisher Electromagnetics Academy
dc.identifier.doi 10.1109/PIERS-FALL.2017.8293543
dc.relation.uri https://ieeexplore.ieee.org/document/8293543/
dc.description.abstract Currently, electromagnetic interference poses a threat to all electrical and electronic devices, especially for security devices where reliability represents the key factor. The shielding of security devices is not sufficiently resistant in terms of electromagnetic immunity because devices consist mainly of plastic material, except control panels which are equipped with a simple metallic shield with holes. The components leading to the central unit are also potential vulnerabilities for the system. The paper described here is focused on a design of shielding box regarding electromagnetic susceptibility using CST Studio Suite simulation software which is useful to determine the vulnerabilities of design. Shielding enclosure should be able to resist to effects of electromagnetic interference acting against the security device in the electromagnetic environment, and at the same time, the box should be able to protect vicinity of the device against an effect of disturbance from the enclosure interior. The paper should investigate with the level and layout of the electromagnetic field inside the shielding enclosure composed of different kinds of material because it can be different in individual areas of the interior. Therefore, the position of the probe working in the x, y, and z axes should be changed depending on the location of the radiation source in this case wave plane. The purpose of the paper described here is to create and describe a simple design of shielding box for security device using suitable shielding materials and CST simulation software. The knowledge described in the paper will help to improve the current state of security devices. © 2018 Electromagnetics Academy. All rights reserved. en
utb.faculty Faculty of Applied Informatics
dc.identifier.uri http://hdl.handle.net/10563/1007896
utb.identifier.obdid 43878639
utb.identifier.scopus 2-s2.0-85045305137
utb.identifier.wok 000428518302079
utb.source d-scopus
dc.date.accessioned 2018-05-18T15:12:04Z
dc.date.available 2018-05-18T15:12:04Z
dc.description.sponsorship Ministry of Education, Youth and Sports of the Czech Republic within the National Sustainability Programme project [LO1303 (MSMT-7778/2014)]; European Regional Development Fund under the project CEBIA-Tech [CZ.1.05/2.1.00/03. 0089]; Internal Grant Agency of Tomas Bata University [IGA/Cebia Tech/2017/006]
utb.ou CEBIA-Tech
utb.contributor.internalauthor Kovář, Stanislav
utb.contributor.internalauthor Mach, Václav
utb.contributor.internalauthor Valouch, Jan
utb.contributor.internalauthor Adámek, Milan
utb.fulltext.affiliation Stanislav Kovář, Václav Mach, Jan Valouch, and Milan Adámek Faculty of Applied Informatics, Tomas Bata University in Zlín Nad Stráněmi 4511, Zlín 760 05, Czech Republic
utb.fulltext.dates -
utb.fulltext.references 1. Kovář, S., “Immunity of camera systems against electromagnetic interference,” Faculty of Applied Informatics in Zlín, Zlín, 2017. 2. Paul, C. R., Introduction to Electromagnetic Compatibility, 2nd Edition, Wiley-Interscience, Hoboken, N.J., 2006, ISBN 978-0-471-75500-5. 3. “IEEE standard method for measuring the effectiveness of electromagnetic shielding enclosures,” IEEE Std 299-2006 (Revision of IEEE Std 299-1997), 1–52, Feb. 28, 2007, doi: 10.1109/IEEESTD.2007.323387. 4. Svacina, J., “Electromagnetic compatibility: Principles and notes,” Issue No. 1, 156 Pages, University of Technology, Brno, 2001 (in Czech), ISBN 8021418737. 5. Pospisilik, M., T. Riha, M. Adamek, and R. M. S. Silva, “DSLR camera immunity to electromagnetic fields — Experiment description,” WSEAS Transactions on Circuits and Systems, 14, 10 [cit. 2017-25-07], 2015. Available at: http://www.wseas.org/multimedia/journals/circuits/2015/b105801-436.pdf. 6. Kovář, S., J. Valouch, H. Urbančoková, and M. Adámek, “Comparison of security devices in terms of interception,” The Tenth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2016, 141–145, 5 Pages, Nice, France, 2016, ISBN: 978-1-61208-493-0. 7. Kovář, S., J. Valouch, H. Urbančoková, and M. Adámek, “Impact of security cameras on electromagnetic environment in far and near-field,” International Conference on Information and Digital Technologies 2016, 156–159, 4 Pages, Poland, Rzeszów, 2016, ISBN 978-1-4673-8860-3. 8. Eugene, R. and C. Kim, “Feature analysis of electromagnetic interference measurement facilities,” International Journal of Digital Content Technology and Its Applications, Vol. 7, No. 10, 155–162, [cit. 2017-04-01], Jun. 30, 2013, DOI: 10.4156/jdcta.vol7.issue10.16, ISSN 1975-9339, Available at: http://www.aicit.org/jdcta/global/paper detail.html?jname=JDCTA&q=3345. 9. Valouch, J., “Technical requirements for electromagnetic compatibility of alarm systems,” International Journal of Circuits, Systems and Signal Processing, Vol. 9, 186–191, 6 Pages, North Atlantic University Union, Oregon, USA, 2015, ISSN: 1998-4464. 10. Valouch, J., “Integrated alarm systems,” Computer Applications for Software Engineering, Disaster Recovery, and Business Continuity. Series: Communications in Computer and Information Science, Vol. 340, 369–379, XVIII, Springer Berlin Heidelberg, Berlin, 2012, ISSN 1865-0929.
utb.fulltext.sponsorship This work was supported by the Ministry of Education, Youth and Sports of the Czech Republic within the National Sustainability Programme project No. LO1303 (MSMT-7778/2014) and also by the European Regional Development Fund under the project CEBIA-Tech No. CZ.1.05/2.1.00/03.0089 and by the Internal Grant Agency of Tomas Bata University under the project No. IGA/CebiaTech/2017/006.
utb.wos.affiliation [Kovar, Stanislav; Mach, Vaclav; Valouch, Jan; Adamek, Milan] Tomas Bata Univ Zlin, Fac Appl Informat, Nad Stranemi 4511, Zlin 76005, Czech Republic
utb.scopus.affiliation Faculty of Applied Informatics, Tomas Bata University in Zlín, Nad Stráněmi 4511, Zlín, Czech Republic
utb.fulltext.projects LO1303 (MSMT-7778/2014)
utb.fulltext.projects CZ.1.05/2.1.00/03.0089
utb.fulltext.projects IGA/CebiaTech/2017/006
Find Full text

Files in this item

Show simple item record