StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Best Dual Detector for Security Purposes - Essay Example

Summary
The paper "The Best Dual Detector for Security Purposes" highlights the advent of fire detectors. The dual detectors have taken security to another level. They can be able to single out faces, sort out animals and masks and consider whether any smoke detected is fire…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful

Extract of sample "The Best Dual Detector for Security Purposes"

Efficacy of Dual-Technology Sensor Name Institution Affiliation Introduction Sensor is a designed object that has a purpose to detect events and changes that take place in the surrounding environment and thus it provides a corresponding output of changes. Sensor is a type of transducer that produces different types of outputs and that typically use electrical or optical signals to detect changes taking place in the environment[Ben93]. For instance, the thermocouple generates the known output of voltage depending on the amount of temperature on the surrounding environment [Lin05]. Most the sensors are used on the daily basis on different objects like the touch sensitive elevator, lamps and on other more objects. The development made in the micro machinery field involves the easy use of microcontroller’s platforms that involve the use of sensors that have excided the traditional fields of temperature and pressure. The analog sensors are also commonly used in the manufacturing machines, airplanes and the aerospace appliances, cars, and also in the medicine equipments and also in the common day to day life [Kov04]. Various sensor affect what they measure and thus giving inaccurate results towards the measurement. The dual technology sensors, on the other hand, are based on two technologies. The dual detectors primarily have a microwave sensor and a passive infrared sensor[Sir15]. The given assessment helps in providing the overview of the efficacy of dual technology detectors. Types of detection sensor technologies The occupancy sensors use different types of technologies, this technologies include the ultrasonic, dual technology and the passive infrared (PIR)[Ale13]. The different technologies are used in detecting the presence and absence of the occupants in a space. The acoustic type of detection is also used by other types of sensors [Sol04]. The passive infrared (PIR) senses and measures the heat between the moving people and the emitted heat at the background thus generally detecting the presence of occupants[Soy09]. These types of sensors require direct lines of sight that exist between the sensor and the space occupants. The PIR are more suitable for the enclosed spaces like rooms and thus it might be affected negatively or positively by the level of motions of the occupants in the detection area [Ber101]. The ultrasonic sensor detect the presence of occupants in the detection area by sending ultrasonic sounds waves into the surrounding area and space so as to take accurate measurements of the amount of speed they return with thus indicating the amount of frequency changes that may be caused by a moving people[Jay13]. These ultrasonic sensors tend to cover the whole space thus having no need of the sight line thus having the ability to detect the people behind the obstacles (Wallace, Nair, Colaco, & Kapa, 2001). The detection sensor technology has worked efficiently as it has improved the ability of detecting and making change in a system automatically. The sensor technology uses various methods in detecting movements and changes made in an area. For instance, the motion monitors and detects the availability of people and the moments made in the area. The security system sensors detects when a sensor is tripped and signal sent to the security system control panel for regulation (Swann, Hass, Dalton, & Wolf, 2004). The main purpose of the detecting sensor technology is sensing the changes in the environment and sending the changes the control panel. For instance, the motion detection sensor senses when an intruder has intruded a premises it sends an alert to the monitoring center. The detecting on sensor is always ready to capture and react in respect to the duty that it has been assigned to react to. For examples, there are sensors that are capable of alerting an owner of a premise about an event that may take place in his absence. Sensors can be used in performing various activities like opening and closing doors, turning on and off lights, controlling the displays of ATM machines and many more activities[Ada]. The dual technology sensors detectors are special types of sensors because they use both the passive infrared (PIR) sensor and the ultrasonic technologies in the act of lights activation. This activation of lights takes place when the occupants are present. The dual technology eliminates all possibilities of false on various problems by enacting technology that is involved in the holding of lights significantly. This technology is mostly used on the areas that require high degree of detection is needed (Solly, Wang, Xu, Strulovici, & Zheng, 2004). The advantages of using detection sensor technology Some of the sensor detectors are small, highly sensitive and of low cost, for instance the photo resistor. This characteristic makes the detectors to be easily accessed (Wallace, Nair, Colaco, & Kapa, 2001). Moreover, the sensing detectors technology has led to the invention of sensors that are fast with good linearity and low amount of noise, for instance photodiode has such characteristics. The sensor detector technology has also generated great detectors that are fast and accurate in detecting things at a low cost while consuming less power too and also the detector provides a chance for making adjustments of the detection range. An example of detector with such characteristics is the ultrasonic detector. This feature makes it be efficient for use in most situations (Wallace, Nair, Colaco, & Kapa, 2001). Disadvantages of using detection sensor technology There various different types of regulators that moderate the level of power consumption thus being expensive to maintain them (Bergenstal, Tamborlane, Ahmann, Buse, Dailey, Davis, & Willi, 2010). Some of the detectors have low detection rate thus being of less importance to the user. Some of the detectors also detect unwanted information thus complicating the detection information. Different detectors tend to have much noise thus creating disturbance to the people surrounding it and polluting the surrounding environment with noise (Wallace, Nair, Colaco, & Kapa, 2001). Therefore, the aspect of sensor development depends on the type of the control strategy that is selected thus helping one to acquire process and convert signals into various types of useful information that may be of great demand in a project (Bergenstal, Tamborlane, Ahmann, Buse, Dailey, Davis, & Willi, 2010). Many different sensors can be used and identified in the initial proposal that involves the selection of the temperature and the electrical sensors of consumption. Some of the pros and cons of the sensors entail: Dual Technology Detectors  Dual technology detectors are associated with a passive infrared (PIR) sensor that contains high frequency microwave sensor with Doppler Effect. Passive infrared detector takes part in detecting the variations in temperature in the actual field of detection during any sort of intrusion taking place (Wallace, Nair, Colaco, & Kapa, 2001). The Doppler detector uses microwave transmitter and receiver antenna when receiving and carrying out the transmit ion of high frequency. The information about the objects in the detection area is provided by the differences that take place between the transmitted signals and the signals received at the area of detection (Bergenstal, Tamborlane, Ahmann, Buse, Dailey, Davis, & Willi, 2010). The modern detectors employ two types of technologies to ensure that they are accurate in their sensing capabilities. This has developed from the olden sensors which were only detecting using one sensor. The one sensor detectors were susceptible to make wrong alarms. This led to the development of the dual detectors which depended on two different sensors before raising an alarm. The dual detectors primarily have a microwave sensor and a passive infrared sensor[Sir15]. A combination of these two sensors allows the gadgets to be more accurate before raising an alarm. Types of Dual Detectors, Underlying principles, Strengths and Vulnerabilities With the development of the dual cameras, the need to make them adaptable to different situations has led to more technology being built up on them[Dav11]. This has led to more and more types of more accurate dual detectors being introduced in the market. The various types of dual technology detectors include the motion detectors, the dual technology sensors with mask alert technology, motion detector with pet alert and pet immunity, ceiling mount dual detectors and fire detectors. All these detectors have underlying technologies, advantages and strengths as well as vulnerabilities. These are well expounded below. The motion detectors employ the PIR sensors and the microwave sensors before raising an alarm. The two sensors are firsts activated before the alarm is raised at the end. The strengths in them is that the possibility that a false alarm as a result of one sensor being triggered is reduced. They are also better compared to human watch. They are however vulnerable in that if the intruders are able to evade one sensor, then the detectors will not detect them at all. This increases the possibility that the intruders will be able to access the premises so protected. This reduces their overall effectiveness in combating attacks. Lastly, they have the disadvantage of in that they are dependent on power. For the microwave, it is power dependent. The intruders can therefore be able to tamper with the power and the dual detector will not work as needed. This increases the vulnerability of the security system. However, some motion dual detectors have inbuilt power supply which increases their fitness for purpose. The second type is the motion detectors with mask alert[Hon16]. These are motion detectors which primarily have the same technology as the motion detectors earlier described but they are a notch higher in that they can be able to identify the masks. They employ video technology and sensing algorithms to identify a masked individual if and when they cannot trace the approaching individuals face metrics such as the eyes. This adds another level of accuracy in that the owner of the protected premises will know at the beginning the type of intruder. This reduces the possibility of a false alarm when a person is friendly with two types of alarms. The effectiveness of these detectors is highly depended upon by top security companies. Thirdly, there is the third type of dual detector which has the characteristics of the motion detectors but has tolerance to pets. This ensures that the alarm will not be raised when the detected intruder is a pet such as a dog[Saf15]. This ensures that there is no false alarms from pets in a given premises. This sensor has strengths in that it is cognizant of animals and only raises the alarm when the intruder is a human being. It is also strong in the aspect of face detection ensuring that the individuals approaching are well scanned before raising an alarm. The only downside for this camera is that it can be fooled by skilled attackers. Its tolerance to the animals and pets makes it vulnerable such that the intruders can use a pet to achieve their purpose. The intruders can also come in costumes that make the look exactly like pets. This will make the security system allow them in although they are bandits. However, there are such detection gadgets which raise two types of alarms such that even when the detected animal is a pet, they will raise an alarm to notify the security personnel. This increases the effectiveness. Others also have optional provision for this functionality such that at night, all intruders, including pets are counted as alarm raisers and during the day, they are activated when most pets are bound to be found in the compound. This increases the overall security but does not entirely remove the vulnerabilities earlier outlined. The fourth type is the fire alert dual detectors. These detectors are installed in almost all places. The first fire detectors were employing a poorer technology where the smoke detectors were used. This meant that even after a person lit cigarette, the alarm would go off, raising false alarms. The introduction of sensors using two and three sensors solved this issue[Kim16]. The three dual detectors have the smoke detector, the heat detector as well as light detector. These three sensors have to be activated before the alarm goes off. The two sensors fire detector employs the smoke and heat detectors. This increased their effectiveness and reduced false alarm rates in institutions. They have strengths in that they reduce the possibility of false alarms. Conclusion In conclusion, in the advent of fire detectors, the dual detectors have taken security to another level. They can be able to single out faces, sort out animals and masks and consider whether any smoke detected is fire. These dual detectors technologies have increased accuracy and reduced the cases of false alarms which had rocked many institutions before they were introduced in the market. They have strengths such as more increased accuracy but they still can be fooled by skilled persons as described above. Considering all these factors, the best dual detector for security purposes is the dual detector with mask uncovering technology since an individual will be able to understand the kind of an intruder they face. References Ben93: , (Bennett, 1993), Lin05: , (Lindemann, Hock, Stuber, Keck, & Becker, 2005), Kov04: , (Kovatchev, Gonder-Frederick, Cox, & Clarke, 2004), Sir15: , (Sirius, 2015), Ale13: , (Wilson & Piepkorn, 2013), Sol04: , (Solly, Wang, Xu, Strulovici, & Zheng, 2004), Soy09: , (Soyer, 2009), Ber101: , (Bergenstal, et al., 2010), Jay13: , (Hughes, 2013), Ada: , (Zungeru & Abraham-Attah, n.d.), Dav11: , (Brooks, 2011), Hon16: , (Honeywell Security, 2016), Saf15: , (Safe Wise, 2015), Kim16: , (Kulimski, 2016), Read More

CHECK THESE SAMPLES OF The Best Dual Detector for Security Purposes

Analyzing and contrasting data mining based network intrusion detection system

The need for security has spawned in the creation and design of firewalls, cryptography, authentication and most of all intrusion detection systems.... This research discusses data mining and the significance of IDSs for network security followed by few drawbacks, provides data mining and its various techniques in an elaborate manner, in relation to the present topic apart from various methodologies implemented till date, concludes the work done and gives plan for future work....
46 Pages (11500 words) Essay

Enterprise Networking and Security

This report "Design for Computer Network security" discusses network vulnerabilities that are constantly at a rise, the current network security vulnerabilities are evaluated in three categories i.... logical security, internal security, and external security.... The logical security domain will cover technical controls such as the deployment of IDS, Virtual LAN, monitoring violation logs, auditing on domain environment, ISA server, and VPN security as well....
12 Pages (3000 words) Report

Door Locking System With Using The Motion Sensor

Panels and the enclosure both incorporate glass for purposes of safety and for reasons of aesthetic.... Most of the revolving door automatic version consists of a powered central shaft, as well as sensors used for purposes of stopping and starting the door in potential unsafe situations.... Generally, there is the presence of speed control characteristics, which makes the doors to be folded back in a way to create a clear space in the opening for purposes of emergency, and for moving objects that are large in and out of the building....
32 Pages (8000 words) Essay

An Electrical Alarm System for a Residential Building

The paper "An Electrical Alarm System for a Residential Building" is being carried out to evaluate and present what can a security alarm system comprise.... It may also be used to warn others of the commission of an illicit act within a structure; resulting in the emission of sound or transmission of a signal or message when actuated and which may result in the speedy response by the security personnel.... typical electric alarm security system may contain the following basic elements: ...
12 Pages (3000 words) Case Study

Computed Tomography Scanner in Airport

However, the rapid advancement of security technology in addition to its application in security purposes is dependent on the capacity of the security personnel to understand the principles of its functions and operations in detecting, recognizing, and identifying threats (Kolokytha et al, 2014).... Their application in airports for purposes of augmenting security management by assisting the security personnel at the terminals to prevent carrying of explosives into plans has fast gained acceptance due to heightened focus on preventing terrorism (Adey, 2004)....
14 Pages (3500 words) Coursework

The Components of an Alarm System

The effective implementation of this system in the building will enhance the security of the premises by ensuring that potential fire or even intrusion is detected.... He further informs that depending on the security requirements of a particular space, volumetric sensors can be classified as being either passive sensors or active sensors....
12 Pages (3000 words) Term Paper

Marine Fire Systems

This has prompted the idea of inventing a system that can replace the heavy piping work by having a space generator for purposes of fighting fire accidents.... Even though a lot of security measures against fires have to be put in place, carbon iv oxide increases the overall weight and building costs of any shipping vessel making it uneconomical to use....
21 Pages (5250 words) Research Paper

Android Malware Detection Using Machine Learning or Other Techniques

This research paper "Android Malware Detection Using Machine Learning or Other Techniques" focuses on one of the main challenges in technology today that is security.... Malware poses threats, such as loss of data to unauthorized access to confidential information.... .... ... ... Android malware has been growing in scale and complexity, making the traditional methods of scanning and stopping malware irrelevant in the anti-malware war....
14 Pages (3500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us