April 08, 2025

How to select, analyze and evaluate home anti-theft alarms

With the progress of society, people's living standards have gradually improved, and the importance of family property and home safety has also been increasing. In the process of social commodification, some unstable factors brought about by the transformation of the social system are also increasing people's alarm against family theft The demand for devices; the popularization and advancement of technology have made the original noble and mysterious anti-theft alarms begin to enter ordinary families. Why, how can we buy a set of practical home burglar alarms that are practical and affordable for our families?

We recommend that users pay attention to the following points:

1. The legality of the product. First, we must pay attention to whether the product has been approved for production by the relevant state departments. The national industrial and commercial department should have clear regulations on the business scope of security product manufacturing enterprises; local public security agencies will also issue production licenses for security products and sales licenses for security product sales meetings; for security products that alert via telephone lines, national information The Ministry of Industry will also issue telecommunications equipment network access licenses. For products with the above one license (business license) and three certificates (security product production license, security product sales license, telecommunications equipment network access license), users can be included in the scope of purchase. Because the relevant state departments will verify the qualifications of the production (sales) factory / commercial in accordance with the strict approval process during the process of issuing the above-mentioned licenses, in particular, it requires random sampling and Submit to the national statutory inspection department: the Ministry of Public Security's "Safety and Police Electronic Product Quality Inspection Center" and the Ministry of Information Industry's "National Telephone Quality Inspection Center" for product network inspection, this process is a strict test of product quality, only Only products that can pass the test may obtain the conditions for certification. For imported security products, only those who pass the above-mentioned inspection can meet the basic conditions for obtaining (sales, telecommunications equipment network access) licenses.

2. The basic composition of home anti-theft alarm. The home anti-theft alarm is usually composed of an alarm host, various types of defense probes, and user operation components (keyboard, remote control, etc.). It can be divided into three parts in terms of function: detection part, on-site processing part, follow-up processing part Sensor / fire alarm probe, flammable gas probe) Alarm host (on-site siren) Alarm host and transmission medium (telephone line transmission: voice alarm for dialing preset phone, (dedicated data line transmission: computer on duty processing)

3. The practicality of the product. The selection of home anti-theft alarms should be considered in consideration of multiple factors such as home area, building structure characteristics, property value, and surrounding environment, but there are several general reference guidelines: Wired mode has the advantages of reliable communication, strong anti-interference ability, and low device cost. It is suitable for newly-built buildings that can reserve connection lines in the wall; but its mobility is poor, it is inconvenient to adapt to the changing requirements of users and products, and the maintenance and replacement of reserved connection lines is difficult and costly; wireless methods can be avoided The connection line between the probe and the host affects the interior decoration, which has the advantages of flexibility and simplicity, but it also has the disadvantages of being easily disturbed by various external factors and the relatively high cost of the device. The method of preventing thieves from entering the door is mature, that is, using the reed switch tube / magnet pair to detect the opening of the room door. However, it should be noted that there are two different alarm trigger methods, instant alarm and delayed alarm. The former one can immediately generate an on-site alarm, which can immediately act as a deterrent to intruders, but if the user does not perform the disarming operation before opening the door, It will generate false alarms and cause harassment to users and their neighbors. The latter delay-triggered alarm method will sound a prompt when the door is opened, prompting the user who has forgotten to disarm to disarm in time. If the host does not receive the disarm signal within a certain period of time, the host will alarm. Obviously, the latter method is more practical. The current common way to prevent thieves from entering the window is to use passive infrared probes. The initial single-check (only a single thermal element) type is susceptible to light, temperature and other factors, causing false alarms; more susceptible to mice, cats, dogs, etc. False triggers caused by small animals. Later, it gradually developed a multi-type (using multiple thermal components), and a double-detection (using both thermal and microwave components), or a triple-detection (using thermal and microwave components and then processed by a single-chip microcomputer) type In order to reduce the incidence of false alarms. This type of probe is prone to false alarms and can only be used in indoor environments. There is another problem that restricts its use in the home: The defense area of ​​this type of probe is three-dimensional rather than flat, when there is a master activity indoors , It is not possible to arm the room completely. The latest method is to use the infrared radiation stealth anti-theft network. This equipment has two models: the outdoor type needs to be powered by an adapter; the wireless transmission method can be used for outdoor walls, gates, and the same wall plane within a distance of 5 "30m. The fan or multiple windows form a net-shaped planar defense, which can achieve a truly "fully enclosed" defense of the building; the indoor type is battery-powered; the wireless transmission method can be installed on both sides of the balcony and indoor windows, doors, and aisles. 1 "8m distance to implement linear defense; this equipment can achieve a truly" fully enclosed "defense of the building; indoor type is more practical because of the convenience of DIY (customer self-installation), which can realize mobile defense. . The prevention of robbery and first-aid assistance are realized with the emergency button, and should also become a necessary equipment in the home anti-theft alarm. If the remote control and the emergency button are integrated, the ability of the emergency button to prevent false triggering should be evaluated. Fire prevention and anti-flammable gas leakage are also indicators for evaluating the performance of alarms. The reporting method of the police situation is an important indicator for evaluating the performance / price ratio and practicality of the alarm. The most original reporting method is to use the on-site siren to alert people nearby; the more popular reporting method is that the alarm host can automatically dial the user's preset phone number, and after dialing, it can play the pre-recorded instructions of the user who touched the location of the alarm Voice; and as a joint defense application for commercial housing, residential quarters or communities, the alarm host is required to have a networked alarm function. The traditional method to realize networked alarm is to use a computer to receive data information from a dedicated line or a telephone line. In comparison, the use of telephone lines to transmit data information has obvious advantages such as high line reliability, maintenance-free, and easy expansion. However, the use of computers to receive data information from the telephone line has its shortcomings: ordinary PCs are difficult to undertake continuous work without downtime, such as the use of industrial control microcomputers that can adapt to continuous work without downtime, and the price of the product soars 3 " 5 times, resulting in waste of funds; the use of microcomputers has high requirements on the skills of operators, resulting in waste of human resources; the use of microcomputers has always faced fatal flaws such as virus intrusion, data loss, and restart of crashes. An important indicator for evaluating the performance of the alarm. A host with a networked alarm function should be able to distinguish the alarm situation (such as intrusion, emergency, fire, etc.), and the police area (doors, windows, room parts, etc.). The practicality and standards of certain product functions Conflict (such as not using power supply), some product functions conflict with the purpose of defense (such as remote disarm).

MBED>

High Bay Light

High Bay Light,High Bay Lamp,Highbay Light With Sensor,Outdoor High Bay Light

Fuonce-Lighting , https://www.gdfuonceled.com