First, the basic concept of security precautions General concept of security precautions According to the interpretation of the current Chinese dictionary, the so-called security, that is, no danger, no infringement, no accident; the so-called prevention is preparedness, alert, and preparedness is ready to deal with To attack or avoid victimization, alert refers to protection and protection.
Based on the above explanations, whether the security precautions can be defined as follows: be prepared and protected in order to cope with the attack or avoid the victim, so that the object to be protected is in a safe state free from danger, infringement and accident. Obviously, security is the purpose, and prevention is the means. The purpose of achieving or achieving security through the means of prevention is the basic connotation of security.
There are two kinds of safety concepts in Chinese: safety, safety and security in English. The main explanations of the word “Safety†in the modern high-level English-Chinese dictionary published by Oxford University are: safety, peace, security, insurance (lock), insurance (box), etc.; and the main explanation of the word “Security†is: safe and non-hazardous. Do not worry, provide security, eliminate dangers or worries, collateral, collateral, security (police), security (forces), etc.
In fact, the security in Chinese is a generalized security. He includes two layers of meaning: one refers to the safety of natural or quasi-natural properties. It corresponds to Safety in English, and the other refers to social and humanistic security. There are obvious attributes of security, and it corresponds to Security. The destruction of the security of natural or quasi-natural properties is not mainly caused by the purposeful participation of people; social and cultural destruction is mainly caused by the purposeful participation of people. Therefore, in a broad sense, security should include the two meanings of safety and security, and we often say that security precautions mainly refer to security security in a narrow sense, and foreign countries often call it "security."
Loss Prevention and Crime Prevention – The essence of security prevention In the West, the term “security prevention†is used instead of loss prevention and crime prevention (Loss Prevention & Crime Prevention). Just as Chinese security and prevention are used together to form a new compound word, in the West, Loss Prevention and Crime Prevention are also used together. Loss prevention and crime prevention constitute two aspects of Safety/Security. In foreign countries, Loss Prevention usually refers to the focus of work in the social security industry, and Crime Prevention is the focus of police enforcement. The organic combination of these two can guarantee social stability and security. In this sense, loss prevention and crime prevention are the essence of safety precautions.
In summary, security protection is not only a public security business (police executive department), but also a social and social economic undertaking. Their development and progress depend not only on the development and progress of science and technology, but also providing and creating a good social environment for the progress and development of science and technology.
The concept of big public safety The so-called concept of big public security is the concept of comprehensive security. It is a comprehensive security service that provides security from time to time for security and public safety. The so-called social public security service security system is an integrated security system project (hardware, software) jointly implemented by the government, government organizations, and all walks of life (not by the Ministry of Public Security, and even not by a certain internal agency of the Ministry of Public Security). Management service system. The comprehensive safety required by the public includes not only the “security precautions†in the narrow sense of theft, looting, intrusion, and vandalism, but also fire safety, traffic safety, communication security, information security, human protection, and medical assistance. Gas leakage and many other things.
Second, the three basic precautionary measures for security: People's air defense, physical defense, and technical security are part of the social public safety. The security industry is a branch of the social public security industry. As far as prevention measures are concerned, security precautions include three categories: human protection, entity (material) prevention, and technology prevention. Among them, human protection and physical prevention are the old traditional methods of prevention. They are the basis of safety precautions. With the continuous advancement of science and technology, these traditional precautions are constantly integrated into the content of new technologies. The concept of technology prevention is a new concept of defense that arises in the course of modern science and technology (initially electronic warning technology) used in the field of security protection and gradually formed as an independent defense method. Due to the continuous development and popularization of modern science and technology, the concept of "technology prevention" is becoming more and more popular. It is increasingly recognized and accepted by the law enforcement agencies of the police and the general public, resulting in a new vocabulary that is frequently used and technology. The content of prevention is also constantly updated with the progress of science and technology. In the current era of rapid development of science and technology, it can be said that almost all high and new technologies will be transplanted to safety prevention work sooner or later. Therefore, the status and role of "technology prevention" in security technologies will become more and more important. It has brought about a new revolution in security.
The three basic elements of security are: detection, delay and response. Detection refers to the occurrence of awareness of occult and recessive risk events and alarms; Delay refers to the process of prolonging and delaying the occurrence of risk events; Response refers to the power taken by organizations to prevent the occurrence of risk events. The quick action. In the three basic methods of security prevention, to achieve the ultimate goal of prevention, all work must be carried out and measures must be taken in order to prevent and prevent risk events. Of course, the three types of preventive measures play different roles in the implementation of prevention.
The basic human defense method (human defense) is to use people's own sensors (eyes, ears, etc.) to detect and detect or hinder the safety goals and respond; use voice warnings, intimidation, obstacles, weapons, etc. to delay or To prevent the occurrence of danger, when it is lacking in its own strength, it is necessary to send out a signal for seeking assistance in order to expect further reactions to stop the occurrence of danger or to deal with the danger that has already occurred.
The main role of physical defense (physical defense) is to delay the occurrence of danger and provide sufficient time for "reaction". Modern physical defense is no longer a passive defense against simple material barriers. Instead, it uses more and more high-tech means. On the one hand, the possibility of physical barriers being destroyed is reduced, increasing the delay time; on the other hand, The physical barrier itself adds probing and reaction capabilities.
Technology prevention means can be said to be the extension and strengthening of the functions of human defense measures and physical defense measures. It is the supplement and strengthening of the human defense and physical prevention technologies. It must integrate human protection and physical prevention so that manpower prevention and physical defense constantly increase the high-tech content among the three basic elements of detection, delay, and response, and constantly improve detection capabilities, delay capabilities, and response capabilities, so that prevention measures can be truly implemented. Play a role to achieve the desired purpose.
The three basic elements of detection, delay and response are interrelated and indispensable. On the one hand, the detection should be accurate and the delay time should be appropriate, and the response should be rapid; on the other hand, the total response time should be less than (at most equal to) the total time of detection plus delay.
Third, security technology and security technology Security technology is used to prevent security technology, in foreign countries, security technology is generally divided into three categories: Physical Protection (Physical Protection), Electronic Protection Technology (Electronic Protection), biological Biometric Protection. The physical prevention technologies here mainly refer to physical prevention technologies, such as building and physical barriers, and various physical facilities, equipment, and products (such as doors, windows, cabinets, and locks) matched with them; electronic defense technologies mainly refer to security applications. Prevention of electronic, communications, computer and information processing and related technologies, such as: electronic alarm technology, video surveillance technology, access control technology, computer network technology, and its related software, system engineering. Biometrics prevention technology is a combination of forensic identification technology in forensic science and pattern recognition in safety precaution technology. He mainly refers to a special technology category that uses human biological characteristics to prevent security technology and is now widely used. There are fingerprint, palmprint, eye lines, voiceprint and other identification control technology.
Security technology prevention is based on security technology as a precursor, human protection as a basis, and technology prevention and physical prevention as a means of establishing a security protection service security system with the combination of detection, delay, and response. He is a public security and social public utility company that aims to prevent losses and prevent crimes. For the law enforcement departments of the police, security technology prevention is a public security business that uses security precautions to carry out security precautions; for the social and economic sectors, security technology prevention is to use security precautions to provide a safe service for the public. industry. Since it is an industry, there must be the research and development of products, and there must be systematic design and engineering construction, service, and management.
IV. Professional System of Security Protection Technology Security technology prevention, as a branch of social public safety science and technology, has its relatively independent technical content and professional system. According to the technical status quo and future development of China's security industry, we can classify the security technology according to the discipline, product attributes, and application areas as follows:
Intrusion detection and anti-theft alarm technology Video surveillance technology Entrance and exit target identification and control technology Alarm information transmission technology Mobile target anti-robbery, anti-theft alarm technology Community security and social assistance Emergency alarm technology Physical protection technology Explosion-proof security technology Security prevention Network and system integration Technology Security Engineering Design and Construction Technology Since the security technology is an emerging technology area that is currently evolving, the division of the aforementioned professions only has relative significance. In fact, each of the aforementioned professional technologies involves many different types of natural sciences and technologies, and they interpenetrate and infiltrate each other. The boundaries of the profession will become more and more inconspicuous, and the same technology will be used at the same time. There will be more and more professional situations.
1.1 Overview “Safeguards†is a technical term for the public security system. It refers to measures aimed at maintaining social and public security, such as preventing invasion, preventing theft, preventing vandalism, preventing fire, preventing riots, and inspecting safety. In order to achieve intrusion prevention, anti-theft, and vandalism, we have adopted equipments based on electronic technology, sensor technology, and computer technology as the basis for security and prevention technologies, and formed them into a system, resulting in the emergence of security technologies. It is gradually developing into a specialized public security technology discipline.
The equipment and equipment of the safety precaution technology and the system formed by it can quickly respond to intruders and detect and arrest criminals in time, which has a powerful deterrent effect on criminals. The security technology can detect the hidden dangers of accidents in a timely manner, prevent damage, reduce accidents and prevent fires, so it is an important prevention measure in public security work. Especially in today's highly developed modern technologies, crimes have become more intelligent and their means have become more subtle, and modern security technologies have become even more important.
Security protection technology involves all aspects of society. The important units and key sectors in society, such as party and government agencies, military installations, national power systems, radio and television, communication systems, national key cultural relics units, banks, warehouses, department stores, etc., are very important in the security and security of these units. Therefore, it is also the focus of safety and security technology work.
Party and government organs, which contain a large number of major decision-making documents and materials such as politics, economics, military affairs, culture, diplomacy, and science and technology, are absolutely confidential materials. They are related to the development of the national economy, and these secrets share the fate of the party and the country. It is closely related. Once stolen or stolen, it will cause heavy losses to the party and the country and interests, and even endanger national security.
Party and government organs are also the workplace of party and government leaders and others. Their security is directly related to the future of the party and the country. Therefore, the public security and security department regards ensuring the safety of party and state leaders as an important task. We use civil air defense and modern prevention techniques to ensure the safety of our lives. We are mainly doing a good job of preventing the perimeter of foreign defense lines, preventing and controlling civil air defenses at the entrances and exits, archives, database, and office systems to prevent intrusion, theft, and fire.
In military units, scientific research and production units for national defense, there are or are developing advanced weapons or strategic weapons, such as nuclear weapons, missiles, aircraft, and supporting electronic or mechanical products, and their research, production, and The outcome is directly related to the modernization of national defense and the safety of the country. It is a secret in itself. Once leaked, it will cause irreparable serious consequences. The perimeters, entrances and exits, production lines, warehouses and data archives of these units are the focus of safety precautions.
The state’s key construction projects, which have advanced technology, high mechanization, high degree of automation, and good economic returns, are an important part of the national economic development. Its development directly affects China’s fiscal revenue and meets the growing material life of the people. And the needs of cultural life play an important role. These key construction projects are large in scale, large in investment, and have a long construction date. Therefore, the entire process of construction is also the entire process of our security work. All raw materials, plans, materials, files, Key key equipment, funds, etc. are all the targets of our protection.
The important cultural relics and sites of the country have preserved my cultural and historical heritage for thousands of years. It reflects the true features of social systems, social production, and social life in all stages of our country’s historical development. It is the most important image of research history and research revolution. The physical object has permanent preservation value. Many artworks and handicrafts reflect the contributions of various historical world civilizations. The value of these cultural relics is difficult to measure with money and is often said to be priceless. With the continuous deepening of the market economy, the struggle for the theft and anti-theft of cultural relics has become increasingly fierce. We will resolutely implement the “Provisions on the Safeguarding of Museums†issued by the state, and the protection of the safety of cultural relics, anti-theft, and anti-destruction are among the focuses of our security work.
Banks, financial systems, and treasuries have always been important sites for criminals to choose to commit crimes. These units are the dialectic for the manufacture, distribution and storage of money and gold and silver. If they are stolen and destroyed, not only will the country suffer major economic losses, it will also affect the country’s construction and market stability. Saving houses, especially those located in remote places, are the main places for cash flow. Establishing a security system that combines television monitoring, alarm, and communication is an effective means of defense. Practice has shown that it has achieved significant preventive effects.
Large-scale shops and warehouses are the reserves of state materials. It is an important part of the national economy. The concentration of goods and the concentration of funds here is an important component of the state's fiscal revenue. Every day, tens of thousands of people flow. Criminals often use this as an important place for committing crimes. Therefore, security and fire prevention at these sites are the focus of security work.
The safety precautions in residential areas are related to the stability of society and are the focus of social security. They must not be taken lightly. The quality of public security directly affects the personal safety and property safety of each citizen, and directly affects the enthusiasm of each citizen in building socialism. Stability and solidarity are the indispensable basic conditions for building socialism with Chinese characteristics. Therefore, we must strengthen the functions of fire prevention and anti-theft, install flood prevention and flood prevention safety doors, and establish a community security system with a door and window switch alarm as the main component. Effective defense measures.
The use of security technology to conduct security precautions has a deterrent effect on criminals, making them afraid to commit crimes. Such as the district's security system, doors and windows of the switch alarm can detect criminals in time and place to commit the crime, so that they dare not easily hands-on. The television monitoring system for commodities and self-selected markets greatly reduced the theft of goods and self-selected markets in the north. The bank teller system and the monitoring system of the hall also made criminals intimidated, so it is quite effective in crime prevention.
Secondly, once intrusion, theft, and other criminal activities have occurred, the security system can promptly discover and promptly report to the police. The television monitoring system can automatically record the crime scene and the criminals' criminal process so as to solve the case in time and save a lot of manpower and material resources. The important units and key departments installed multi-functional and multi-level security monitoring systems, greatly reducing the number of patrolling officers, thereby increasing efficiency and reducing expenditures.
The installation of a fire prevention alarm system can be extinguished in a timely manner in the bud of a fire to avoid major fire accidents.
The joint design of the fire protection, anti-intrusion, anti-theft, vandal-proof, anti-riot and communications and other sub-systems to form a comprehensive, multi-functional security control system is the direction of the public exhibition of our security and prevention technical work.
1.2 Security Technology Content, equipment and systems According to the division of work of various departments in China, the intrusion burglar alarm, fire prevention, and riot prevention are collectively referred to as social public safety prevention technologies. Internationally, the International Electrotechnical Commission's IEC-TC79 Alarm Committee is an international professional standardization organization. The alarm system standardization technical committee has divided 12 working groups according to its task of establishing revised standards.
Among them: 79.1 is the general requirement of the alarm system 79.2 is the invasion and rush alarm system 79.3 is the fire alarm system 79.4 is the social alarm system 79.5 is the transmission alarm system 79.6 is the term 79.7 is the screen purpose alarm system 79.8 is the environmental alarm system 79.9 is the technical alarm System 79.10 is the transport warning system 79.11 is the product-to-air warning system 79.12 is the entrance control system. At the National Technical Prevention Conference in 1979, the contents of the anti-theft alarm technology and the work of public security agencies in this area were called technical prevention. In order to more accurately reflect the content and substance of the technical field, and the global and corresponding international standardization organizations to strengthen the technical residence communication and contact, but also with the "National Security and Alarm System Standardization Technical Committee established by the Ministry of Public Security in 1987 approved by the Ministry of Public Security. Consistent with the name, the technical field of intrusion burglar alarm, fire prevention, riot protection, and security inspection is called "security protection technology." The National Security and Alarm System Standardization Technical Committee established four specialized technical committees for standardization.
1. Anti-theft alarm equipment and system professional standardization sub-committee.
2. Fire alarm equipment and system professional standardization technical committee.
3. Anti-riot and safety inspection equipment and system professional standardization subcommittee.
4. Security Precaution Engineering System Specialization Technical Committee.
Afterwards, according to the actual situation in China and the needs of the society, a specialized sub-committee corresponding to IEC-TC79 will be gradually established to revise domestic standardization work in this field.
China's security technology has developed in the course of fighting against criminals. With the maturing and reliable electronic technology, security equipment and equipment have also been greatly developed. In the process of fighting against criminals, public security organs and security departments everywhere deeply feel that relying solely on "human defense" methods to protect the safety of society and people's property is not enough. We have begun to develop and produce a variety of security equipment. From door locks, security doors, safes to various high-tech production alarms, these devices have played an active role in security work. In December 1977, the National Public Security Working Conference proposed to strengthen the prevention of criminal cases, and to actively carry out crime prevention work, implement the four defenses of mass prevention, anti-theft, fire prevention, and prevention and control of disaster accidents, and strive to eliminate crimes in premeditated plans. Stage, reduce the number of cases and improve the detection rate. In 1979, the Ministry of Public Security's No. 77 document clarified that technical prevention work is an important means to fight criminal criminals and it is an important part of the entire crime prevention work, thus further establishing the unshakable position of preventive technologies in safety prevention. Since then, a large number of public security research institutes, colleges and universities, and large and small enterprises have developed and produced a number of security technology products and system-controlled equipment. Since the reform and opening up, the introduction of a large number of advanced and reliable security technologies and products abroad has further promoted the development of domestic security technologies and formed a new pattern of openness, invigoration and system support. Afterwards, in order to standardize the security technology market, the Ministry of Public Security began to take charge of the management of safety precautions, take charge of the quality inspection of security technology products, ensure the function and reliability of security products, and gradually implement the production of safety products and engineering construction design. Certification system to ensure the quality of security technology products and the level of system design and construction.
Security systems usually consist of detectors, signal transmission channels, and controllers.
Intrusion detectors are devices made up of electronic and mechanical components used to detect intruder movements or other movements. It usually consists of a sensor and a pre-signal processing circuit. According to different prevention sites, we use different signal sensors, such as air pressure, temperature, vibration, and amplitude sensors, to detect and forecast various dangerous conditions. For example, the infrared sensor in the infrared detector can detect the thermal change rate of the surface of the measured object, thereby judging the motion of the measured object and causing an alarm; the vibrating electromagnetic sensor can detect the vibration of the object and fix it on the ground or the safe , can detect the intruder walking or digging safe move. The pre-signal processing circuit places the electrical signal output by the sensor into an electrical signal that is transmitted in the channel after processing, and this signal is often referred to as a detection electrical signal.
There are many types of signal transmission channels, usually divided into cable channels and wireless channels. Wired channel constants use twisted pair, power line, telephone line, cable or optical cable to transmit detection electrical signals, while wireless channels modulate control electrical signals to specified radio frequency bands and use radio waves to transmit electrical signals.
The controller is usually composed of a signal processor and a thousand-earth alarm device. The detection electrical signal sent by the wired or wireless channel is processed in-depth by the signal processor to judge whether there is a “presence†or “nothing†danger signal. If there is a situation, the controller controls the warning device and emits an audible and visual alarm signal, causing the on duty The staff is alert to take corresponding measures; or directly to the public security department to issue an alarm signal.
A wide variety of detectors for various types of sensors used in security technologies have been applied to different locations and occasions and have achieved good results. There are many types of alarm equipment, and the classification of alarm equipment is helpful to grasp its working principle, structure and applicable occasions.
Alarm equipment is usually distinguished by its sensor type, working method, and alert range.
1, according to the type of sensor classification According to the type of sensor, that is, the physical industry detected by the sensor to distinguish, usually: switch alarm, vibration alarm, ultrasonic, infrasound alarm, infrared alarm, microwave, laser alarm, smoke Sense and temperature alarms, etc.
2. Classified according to work methods: According to the working methods, there are active and passive alarms.
Passive detection alarms do not need to send a signal to the detection site during operation, but they detect the energy existing in the detected object itself. A stable signal is usually output on the receiving sensor. When a condition occurs, the stable signal is destroyed and an alarm signal is processed.
While the active alarm device is working, the detector must send some form of energy to the detection site. A stable signal is formed on the sensor by reverse or direct radiation. When a dangerous situation occurs, the stable signal is destroyed and the signal is processed. Alarm.
3, according to the scope of alert classification According to the police range can be divided into point, line, surface and space detection alarm.
Point control alarm organ alarm is only a certain point, such as doors and windows, counters, safes, when this monitoring point appears dangerous, that is issued an alarm signal, usually by the micro switch or magnetic switch mode alarm control.
Line control alarm is a line alert, when there is a dangerous situation on this cordon, an alarm signal. Such as photoelectric alarm or laser alarm, a light or laser light is emitted by the light source or the laser, and is received by the receiver. When the light and laser are interrupted, the alarm device will send an alarm signal.
The alarm range of the surface control alarm is one surface. When the hazard appears on the guard surface, an alarm signal is issued. If the vibration alarm is installed on a wall, an alarm signal will be issued when any point on the wall is vibrated.
The scope of the space control alarm is a warning signal when an intrusion hazard occurs anywhere in a space. In the space that the microwave Doppler alarm is alerting, an intruder will generate an alarm signal from any entry point of the door, window, ceiling or floor.
Magnetic switches and micro switch alarms are often used as control alarms.
Active infrared and inductive alarms are often used as line control alarms.
Vibrating and inductive alarms are often used as surface control alarms.
Voice-activated and acoustic emission-type, ultrasonic, self-serving, video-moving, temperature-sensitive and smoke-sensitive alarms are commonly used as space-prevention control alarms.
There are also classified according to the use of alarm equipment, such as anti-theft alarm, fire alarm, anti-explosion alarm and so on.
Sometimes classified according to the detection of electrical signal transmission channels, sub-wired alarms and wireless alarms.
1.3 Safety precautions Technical engineering procedures Safety precautions are those for alarm, television monitoring, communication, entrance/exit control, explosion protection, and safety inspections that are used for the purpose of maintaining public safety and disaster prevention. The project shall be entrusted by the construction unit and shall be designed and constructed by the professional design and construction unit that has the design and construction qualification certificates approved and issued by the public security technology prevention and management department at or above the provincial or municipal level. The project establishment, design, tendering, commissioning, construction, and acceptance must be conducted in strict accordance with the procedures required by the competent public security department.
The safety precaution project divides the project scale according to the level of risk or project investment and is divided into three levels.
Level 1 project: First-level risk or project with an investment of over 1 million yuan.
Second-grade engineering: Secondary risks or projects with an investment of more than 300,000 yuan and less than 1 million yuan.
Third-class engineering: Three-level risk or projects with an investment of 300,000 yuan or less.
The construction unit must implement the feasibility study of the project before implementing the safety precautions. The research report can be prepared by the construction unit or the designing unit. It should be related to the relevant regulations of the government department, the risk level and protection level of the protected target, and the project The content and purpose requirements, construction period, and social benefits analysis of the project cost estimates are demonstrated. Only after the feasibility study report has been approved by the corresponding competent authority can formal project approval be established.
The construction unit shall entrust the construction and design units that have obtained the approval for the issuance of a permit by the public security technology prevention and management department at or above the provincial level to carry out the design and implementation of the project construction.
The project shall be held under the common auspices of the competent authority and the construction unit to avoid any unfair competition.
In the bid invitation for engineering bidding, the construction unit shall compile the bidding documents according to the requirements of the design task and issue bid invitations or notices.
The construction unit should organize the bidding unit to survey the work site and answer the relevant questions in the bidding documents.
The bidder shall seal the bid submission.
The public should open bids, negotiate bids, review tenders, and determine the bid notification.
The successful bidder can accept the construction unit's entrustment based on the design task book Nanchang, according to the design and construction requirements, put forward the project proposal and project implementation plan, after the construction unit review and approval, the commission effective, you can sign the contract.
The content of the contract should include:
a. Project name and content b. Responsibilities and Obligations of Construction Units and Design and Construction Units c. Project progress requirements d. Engineering fees and payment methods e. Engineering acceptance method f. Personnel training and maintenance g. Risk and breach of contract responsibility h. Other related matters shall be accompanied by the winning bid documents and power of attorney, the design mission statement and other documents identified by both parties. The engineering design should undergo preliminary design and program verification.
The preliminary design should have the following content:
a. System Design and System Functions b. Equipment plane deployment map and protective range c. System bar diagram and main equipment supporting list d. Central control room layout and use operation f. The project cost estimate and the construction period project will be completed. The preliminary design student shall be sponsored by the construction unit to organize the project demonstration, the competent business department, the public security department in charge of Beijing time, and the design, construction and a certain number of technical experts.
Demonstration should review the various contents of the preliminary design and evaluate its technology, quality, cost, duration, service and expected results. For opinions that have objections, the design unit and the municipality directly under the authority of the construction agency must report the opinions before submitting for approval. After the approval of the construction unit and business executives, it can enter the formal design stage.
The formal design should include the technical design, construction drawing design, operation, maintenance instructions and project cost budget.
Design documents and fees, except where special design documents are required to be reviewed and approved by the competent public security department, shall be presided over by the construction unit, review the design documents and budget, and review the approval of the project into the implementation phase.
After the construction of the project, the goods should first be ordered according to the equipment and quantity pre-selected in the engineering design documents.
According to the pipeline laying plans and related construction specifications for pipeline laying facilities.
According to the technical requirements of the construction drawings, equipment and equipment installation.
According to the system functional requirements for system debugging.
After commissioning of the system and one month of operation, the construction unit shall record the trial operation. The trial operation report shall contain the following contents:
a. The system is operating normally b. Whether the system function meets the design requirements c. The number of false alarms and missed alarms and the analysis of their causes d. The number of failures, eliminating the time e. Whether the maintenance service meets the requirements of the contract and corresponding technical training for the relevant personnel.
The project is completed according to the contents of the contract. After the trial operation, it meets the design requirements. It is recognized by the construction unit and can be regarded as absenteeism. A few non-major projects are not completed according to the contract, and the construction unit negotiates with the design agency to resolve the remaining issues. There is a clear treatment method. After the trial operation and approval by the construction unit, it can also be completed, and the design and construction unit will write a completion report.
Acceptance of the project should be divided into two stages of preliminary inspection and acceptance.
The construction unit should first organize the preliminary inspection according to the requirements of the contract.
The preliminary inspection includes the acceptance of the technical system, the acceptance of equipment and equipment, and the acceptance of the installation of equipment and pipelines in order to verify the acceptance of the project data.
On the basis of the qualification of the preliminary inspection, an acceptance committee or group composed of the supervisor of the higher level business of the construction unit, the chief person in charge of the construction unit, and the technical expert shall carry out the acceptance of the project. Acceptance of small components technology acceptance group, construction acceptance group and data review group, respectively, according to the contract related to the payment and content of review and acceptance.
Finally, according to the results of the review, write the project acceptance conclusion.
1.4 Development Trends of Security Technology Systems In recent years, especially with the rapid development of modern science and technology, criminals have become more intelligent, complicated, and more covert. Therefore, prevention technology means both device and system There are rapid developments in function. The detector on the device has evolved from a primary product that is simpler and has a single function to a variety of technologically advanced high-tech products. The detector on the device is developed from a simple product with a simple function and a single function into a high-tech product with a variety of technical composites. Such as microwave - passive infrared composite detector, it will focus on the use of microwave and infrared detection technology in one. Within the control range, the alarm signal is output only when the detectors of both alarm technologies generate alarm signals. It not only can maintain the reliability of the microwave detector and has nothing to do with the heat source, but also has the characteristics that the passive infrared detector does not need the illumination and brightness requirements and can be ready for operation, which greatly reduces the false alarm rate of the detector. The false alarm rate of this composite alarm detector is a few percent of the false alarm rate of a single-technology microwave alarm. Another example is the use of sound and vibration technology of the composite double Jian glass alarm, the detector can only experience the vibration at the same time when the glass vibration and broken high-frequency sound, the alarm signal occurs, which greatly reduces the vibration due to windows The resulting false alarms increase the accuracy of the alarm. The rapid development of television monitoring systems has made the security technology more effective and intuitive. The research and development of the low-light and infrared cameras have been successful. It has enabled the security protection to achieve all-day and day-and-night work, and the miniaturization and intelligence of the cameras have made the detectors even more subtle. The long-term recording device can record for 24 hours, 48 ​​hours, and 72 hours. The emergence of multi-screen separators has greatly reduced the number of system equipment, making the system more reliable, and the scope of monitoring is also increasing. A large-scale enterprise and several sub-systems constitute a comprehensive security system. It not only invades anti-theft functions, but also has the functions of fire prevention, anti-riot and security inspection. When a detected point sends out an alarm signal, it can automatically alarm to the alarm center through the telephone line, and the alarm center can also automatically detect the nature, location and other of the alarm signal. The transmission of detection signals is also transmitted from conventional analogue wired transmission to digital wireless transmission, which greatly reduces the wiring work during construction and saves material and labor. The alarm controller uses a large-capacity CPU to enable signal and control to control the computer bus, which greatly reduces the workload of system installation and improves the reliability of the system. We will continue to adopt newer electronic technologies and computer technologies to further improve the stability and reliability of security equipment, and further improve the system's functions, so that people's safety and security technologies will contribute to combating crimes and protecting the interests of the people.
Based on the above explanations, whether the security precautions can be defined as follows: be prepared and protected in order to cope with the attack or avoid the victim, so that the object to be protected is in a safe state free from danger, infringement and accident. Obviously, security is the purpose, and prevention is the means. The purpose of achieving or achieving security through the means of prevention is the basic connotation of security.
There are two kinds of safety concepts in Chinese: safety, safety and security in English. The main explanations of the word “Safety†in the modern high-level English-Chinese dictionary published by Oxford University are: safety, peace, security, insurance (lock), insurance (box), etc.; and the main explanation of the word “Security†is: safe and non-hazardous. Do not worry, provide security, eliminate dangers or worries, collateral, collateral, security (police), security (forces), etc.
In fact, the security in Chinese is a generalized security. He includes two layers of meaning: one refers to the safety of natural or quasi-natural properties. It corresponds to Safety in English, and the other refers to social and humanistic security. There are obvious attributes of security, and it corresponds to Security. The destruction of the security of natural or quasi-natural properties is not mainly caused by the purposeful participation of people; social and cultural destruction is mainly caused by the purposeful participation of people. Therefore, in a broad sense, security should include the two meanings of safety and security, and we often say that security precautions mainly refer to security security in a narrow sense, and foreign countries often call it "security."
Loss Prevention and Crime Prevention – The essence of security prevention In the West, the term “security prevention†is used instead of loss prevention and crime prevention (Loss Prevention & Crime Prevention). Just as Chinese security and prevention are used together to form a new compound word, in the West, Loss Prevention and Crime Prevention are also used together. Loss prevention and crime prevention constitute two aspects of Safety/Security. In foreign countries, Loss Prevention usually refers to the focus of work in the social security industry, and Crime Prevention is the focus of police enforcement. The organic combination of these two can guarantee social stability and security. In this sense, loss prevention and crime prevention are the essence of safety precautions.
In summary, security protection is not only a public security business (police executive department), but also a social and social economic undertaking. Their development and progress depend not only on the development and progress of science and technology, but also providing and creating a good social environment for the progress and development of science and technology.
The concept of big public safety The so-called concept of big public security is the concept of comprehensive security. It is a comprehensive security service that provides security from time to time for security and public safety. The so-called social public security service security system is an integrated security system project (hardware, software) jointly implemented by the government, government organizations, and all walks of life (not by the Ministry of Public Security, and even not by a certain internal agency of the Ministry of Public Security). Management service system. The comprehensive safety required by the public includes not only the “security precautions†in the narrow sense of theft, looting, intrusion, and vandalism, but also fire safety, traffic safety, communication security, information security, human protection, and medical assistance. Gas leakage and many other things.
Second, the three basic precautionary measures for security: People's air defense, physical defense, and technical security are part of the social public safety. The security industry is a branch of the social public security industry. As far as prevention measures are concerned, security precautions include three categories: human protection, entity (material) prevention, and technology prevention. Among them, human protection and physical prevention are the old traditional methods of prevention. They are the basis of safety precautions. With the continuous advancement of science and technology, these traditional precautions are constantly integrated into the content of new technologies. The concept of technology prevention is a new concept of defense that arises in the course of modern science and technology (initially electronic warning technology) used in the field of security protection and gradually formed as an independent defense method. Due to the continuous development and popularization of modern science and technology, the concept of "technology prevention" is becoming more and more popular. It is increasingly recognized and accepted by the law enforcement agencies of the police and the general public, resulting in a new vocabulary that is frequently used and technology. The content of prevention is also constantly updated with the progress of science and technology. In the current era of rapid development of science and technology, it can be said that almost all high and new technologies will be transplanted to safety prevention work sooner or later. Therefore, the status and role of "technology prevention" in security technologies will become more and more important. It has brought about a new revolution in security.
The three basic elements of security are: detection, delay and response. Detection refers to the occurrence of awareness of occult and recessive risk events and alarms; Delay refers to the process of prolonging and delaying the occurrence of risk events; Response refers to the power taken by organizations to prevent the occurrence of risk events. The quick action. In the three basic methods of security prevention, to achieve the ultimate goal of prevention, all work must be carried out and measures must be taken in order to prevent and prevent risk events. Of course, the three types of preventive measures play different roles in the implementation of prevention.
The basic human defense method (human defense) is to use people's own sensors (eyes, ears, etc.) to detect and detect or hinder the safety goals and respond; use voice warnings, intimidation, obstacles, weapons, etc. to delay or To prevent the occurrence of danger, when it is lacking in its own strength, it is necessary to send out a signal for seeking assistance in order to expect further reactions to stop the occurrence of danger or to deal with the danger that has already occurred.
The main role of physical defense (physical defense) is to delay the occurrence of danger and provide sufficient time for "reaction". Modern physical defense is no longer a passive defense against simple material barriers. Instead, it uses more and more high-tech means. On the one hand, the possibility of physical barriers being destroyed is reduced, increasing the delay time; on the other hand, The physical barrier itself adds probing and reaction capabilities.
Technology prevention means can be said to be the extension and strengthening of the functions of human defense measures and physical defense measures. It is the supplement and strengthening of the human defense and physical prevention technologies. It must integrate human protection and physical prevention so that manpower prevention and physical defense constantly increase the high-tech content among the three basic elements of detection, delay, and response, and constantly improve detection capabilities, delay capabilities, and response capabilities, so that prevention measures can be truly implemented. Play a role to achieve the desired purpose.
The three basic elements of detection, delay and response are interrelated and indispensable. On the one hand, the detection should be accurate and the delay time should be appropriate, and the response should be rapid; on the other hand, the total response time should be less than (at most equal to) the total time of detection plus delay.
Third, security technology and security technology Security technology is used to prevent security technology, in foreign countries, security technology is generally divided into three categories: Physical Protection (Physical Protection), Electronic Protection Technology (Electronic Protection), biological Biometric Protection. The physical prevention technologies here mainly refer to physical prevention technologies, such as building and physical barriers, and various physical facilities, equipment, and products (such as doors, windows, cabinets, and locks) matched with them; electronic defense technologies mainly refer to security applications. Prevention of electronic, communications, computer and information processing and related technologies, such as: electronic alarm technology, video surveillance technology, access control technology, computer network technology, and its related software, system engineering. Biometrics prevention technology is a combination of forensic identification technology in forensic science and pattern recognition in safety precaution technology. He mainly refers to a special technology category that uses human biological characteristics to prevent security technology and is now widely used. There are fingerprint, palmprint, eye lines, voiceprint and other identification control technology.
Security technology prevention is based on security technology as a precursor, human protection as a basis, and technology prevention and physical prevention as a means of establishing a security protection service security system with the combination of detection, delay, and response. He is a public security and social public utility company that aims to prevent losses and prevent crimes. For the law enforcement departments of the police, security technology prevention is a public security business that uses security precautions to carry out security precautions; for the social and economic sectors, security technology prevention is to use security precautions to provide a safe service for the public. industry. Since it is an industry, there must be the research and development of products, and there must be systematic design and engineering construction, service, and management.
IV. Professional System of Security Protection Technology Security technology prevention, as a branch of social public safety science and technology, has its relatively independent technical content and professional system. According to the technical status quo and future development of China's security industry, we can classify the security technology according to the discipline, product attributes, and application areas as follows:
Intrusion detection and anti-theft alarm technology Video surveillance technology Entrance and exit target identification and control technology Alarm information transmission technology Mobile target anti-robbery, anti-theft alarm technology Community security and social assistance Emergency alarm technology Physical protection technology Explosion-proof security technology Security prevention Network and system integration Technology Security Engineering Design and Construction Technology Since the security technology is an emerging technology area that is currently evolving, the division of the aforementioned professions only has relative significance. In fact, each of the aforementioned professional technologies involves many different types of natural sciences and technologies, and they interpenetrate and infiltrate each other. The boundaries of the profession will become more and more inconspicuous, and the same technology will be used at the same time. There will be more and more professional situations.
1.1 Overview “Safeguards†is a technical term for the public security system. It refers to measures aimed at maintaining social and public security, such as preventing invasion, preventing theft, preventing vandalism, preventing fire, preventing riots, and inspecting safety. In order to achieve intrusion prevention, anti-theft, and vandalism, we have adopted equipments based on electronic technology, sensor technology, and computer technology as the basis for security and prevention technologies, and formed them into a system, resulting in the emergence of security technologies. It is gradually developing into a specialized public security technology discipline.
The equipment and equipment of the safety precaution technology and the system formed by it can quickly respond to intruders and detect and arrest criminals in time, which has a powerful deterrent effect on criminals. The security technology can detect the hidden dangers of accidents in a timely manner, prevent damage, reduce accidents and prevent fires, so it is an important prevention measure in public security work. Especially in today's highly developed modern technologies, crimes have become more intelligent and their means have become more subtle, and modern security technologies have become even more important.
Security protection technology involves all aspects of society. The important units and key sectors in society, such as party and government agencies, military installations, national power systems, radio and television, communication systems, national key cultural relics units, banks, warehouses, department stores, etc., are very important in the security and security of these units. Therefore, it is also the focus of safety and security technology work.
Party and government organs, which contain a large number of major decision-making documents and materials such as politics, economics, military affairs, culture, diplomacy, and science and technology, are absolutely confidential materials. They are related to the development of the national economy, and these secrets share the fate of the party and the country. It is closely related. Once stolen or stolen, it will cause heavy losses to the party and the country and interests, and even endanger national security.
Party and government organs are also the workplace of party and government leaders and others. Their security is directly related to the future of the party and the country. Therefore, the public security and security department regards ensuring the safety of party and state leaders as an important task. We use civil air defense and modern prevention techniques to ensure the safety of our lives. We are mainly doing a good job of preventing the perimeter of foreign defense lines, preventing and controlling civil air defenses at the entrances and exits, archives, database, and office systems to prevent intrusion, theft, and fire.
In military units, scientific research and production units for national defense, there are or are developing advanced weapons or strategic weapons, such as nuclear weapons, missiles, aircraft, and supporting electronic or mechanical products, and their research, production, and The outcome is directly related to the modernization of national defense and the safety of the country. It is a secret in itself. Once leaked, it will cause irreparable serious consequences. The perimeters, entrances and exits, production lines, warehouses and data archives of these units are the focus of safety precautions.
The state’s key construction projects, which have advanced technology, high mechanization, high degree of automation, and good economic returns, are an important part of the national economic development. Its development directly affects China’s fiscal revenue and meets the growing material life of the people. And the needs of cultural life play an important role. These key construction projects are large in scale, large in investment, and have a long construction date. Therefore, the entire process of construction is also the entire process of our security work. All raw materials, plans, materials, files, Key key equipment, funds, etc. are all the targets of our protection.
The important cultural relics and sites of the country have preserved my cultural and historical heritage for thousands of years. It reflects the true features of social systems, social production, and social life in all stages of our country’s historical development. It is the most important image of research history and research revolution. The physical object has permanent preservation value. Many artworks and handicrafts reflect the contributions of various historical world civilizations. The value of these cultural relics is difficult to measure with money and is often said to be priceless. With the continuous deepening of the market economy, the struggle for the theft and anti-theft of cultural relics has become increasingly fierce. We will resolutely implement the “Provisions on the Safeguarding of Museums†issued by the state, and the protection of the safety of cultural relics, anti-theft, and anti-destruction are among the focuses of our security work.
Banks, financial systems, and treasuries have always been important sites for criminals to choose to commit crimes. These units are the dialectic for the manufacture, distribution and storage of money and gold and silver. If they are stolen and destroyed, not only will the country suffer major economic losses, it will also affect the country’s construction and market stability. Saving houses, especially those located in remote places, are the main places for cash flow. Establishing a security system that combines television monitoring, alarm, and communication is an effective means of defense. Practice has shown that it has achieved significant preventive effects.
Large-scale shops and warehouses are the reserves of state materials. It is an important part of the national economy. The concentration of goods and the concentration of funds here is an important component of the state's fiscal revenue. Every day, tens of thousands of people flow. Criminals often use this as an important place for committing crimes. Therefore, security and fire prevention at these sites are the focus of security work.
The safety precautions in residential areas are related to the stability of society and are the focus of social security. They must not be taken lightly. The quality of public security directly affects the personal safety and property safety of each citizen, and directly affects the enthusiasm of each citizen in building socialism. Stability and solidarity are the indispensable basic conditions for building socialism with Chinese characteristics. Therefore, we must strengthen the functions of fire prevention and anti-theft, install flood prevention and flood prevention safety doors, and establish a community security system with a door and window switch alarm as the main component. Effective defense measures.
The use of security technology to conduct security precautions has a deterrent effect on criminals, making them afraid to commit crimes. Such as the district's security system, doors and windows of the switch alarm can detect criminals in time and place to commit the crime, so that they dare not easily hands-on. The television monitoring system for commodities and self-selected markets greatly reduced the theft of goods and self-selected markets in the north. The bank teller system and the monitoring system of the hall also made criminals intimidated, so it is quite effective in crime prevention.
Secondly, once intrusion, theft, and other criminal activities have occurred, the security system can promptly discover and promptly report to the police. The television monitoring system can automatically record the crime scene and the criminals' criminal process so as to solve the case in time and save a lot of manpower and material resources. The important units and key departments installed multi-functional and multi-level security monitoring systems, greatly reducing the number of patrolling officers, thereby increasing efficiency and reducing expenditures.
The installation of a fire prevention alarm system can be extinguished in a timely manner in the bud of a fire to avoid major fire accidents.
The joint design of the fire protection, anti-intrusion, anti-theft, vandal-proof, anti-riot and communications and other sub-systems to form a comprehensive, multi-functional security control system is the direction of the public exhibition of our security and prevention technical work.
1.2 Security Technology Content, equipment and systems According to the division of work of various departments in China, the intrusion burglar alarm, fire prevention, and riot prevention are collectively referred to as social public safety prevention technologies. Internationally, the International Electrotechnical Commission's IEC-TC79 Alarm Committee is an international professional standardization organization. The alarm system standardization technical committee has divided 12 working groups according to its task of establishing revised standards.
Among them: 79.1 is the general requirement of the alarm system 79.2 is the invasion and rush alarm system 79.3 is the fire alarm system 79.4 is the social alarm system 79.5 is the transmission alarm system 79.6 is the term 79.7 is the screen purpose alarm system 79.8 is the environmental alarm system 79.9 is the technical alarm System 79.10 is the transport warning system 79.11 is the product-to-air warning system 79.12 is the entrance control system. At the National Technical Prevention Conference in 1979, the contents of the anti-theft alarm technology and the work of public security agencies in this area were called technical prevention. In order to more accurately reflect the content and substance of the technical field, and the global and corresponding international standardization organizations to strengthen the technical residence communication and contact, but also with the "National Security and Alarm System Standardization Technical Committee established by the Ministry of Public Security in 1987 approved by the Ministry of Public Security. Consistent with the name, the technical field of intrusion burglar alarm, fire prevention, riot protection, and security inspection is called "security protection technology." The National Security and Alarm System Standardization Technical Committee established four specialized technical committees for standardization.
1. Anti-theft alarm equipment and system professional standardization sub-committee.
2. Fire alarm equipment and system professional standardization technical committee.
3. Anti-riot and safety inspection equipment and system professional standardization subcommittee.
4. Security Precaution Engineering System Specialization Technical Committee.
Afterwards, according to the actual situation in China and the needs of the society, a specialized sub-committee corresponding to IEC-TC79 will be gradually established to revise domestic standardization work in this field.
China's security technology has developed in the course of fighting against criminals. With the maturing and reliable electronic technology, security equipment and equipment have also been greatly developed. In the process of fighting against criminals, public security organs and security departments everywhere deeply feel that relying solely on "human defense" methods to protect the safety of society and people's property is not enough. We have begun to develop and produce a variety of security equipment. From door locks, security doors, safes to various high-tech production alarms, these devices have played an active role in security work. In December 1977, the National Public Security Working Conference proposed to strengthen the prevention of criminal cases, and to actively carry out crime prevention work, implement the four defenses of mass prevention, anti-theft, fire prevention, and prevention and control of disaster accidents, and strive to eliminate crimes in premeditated plans. Stage, reduce the number of cases and improve the detection rate. In 1979, the Ministry of Public Security's No. 77 document clarified that technical prevention work is an important means to fight criminal criminals and it is an important part of the entire crime prevention work, thus further establishing the unshakable position of preventive technologies in safety prevention. Since then, a large number of public security research institutes, colleges and universities, and large and small enterprises have developed and produced a number of security technology products and system-controlled equipment. Since the reform and opening up, the introduction of a large number of advanced and reliable security technologies and products abroad has further promoted the development of domestic security technologies and formed a new pattern of openness, invigoration and system support. Afterwards, in order to standardize the security technology market, the Ministry of Public Security began to take charge of the management of safety precautions, take charge of the quality inspection of security technology products, ensure the function and reliability of security products, and gradually implement the production of safety products and engineering construction design. Certification system to ensure the quality of security technology products and the level of system design and construction.
Security systems usually consist of detectors, signal transmission channels, and controllers.
Intrusion detectors are devices made up of electronic and mechanical components used to detect intruder movements or other movements. It usually consists of a sensor and a pre-signal processing circuit. According to different prevention sites, we use different signal sensors, such as air pressure, temperature, vibration, and amplitude sensors, to detect and forecast various dangerous conditions. For example, the infrared sensor in the infrared detector can detect the thermal change rate of the surface of the measured object, thereby judging the motion of the measured object and causing an alarm; the vibrating electromagnetic sensor can detect the vibration of the object and fix it on the ground or the safe , can detect the intruder walking or digging safe move. The pre-signal processing circuit places the electrical signal output by the sensor into an electrical signal that is transmitted in the channel after processing, and this signal is often referred to as a detection electrical signal.
There are many types of signal transmission channels, usually divided into cable channels and wireless channels. Wired channel constants use twisted pair, power line, telephone line, cable or optical cable to transmit detection electrical signals, while wireless channels modulate control electrical signals to specified radio frequency bands and use radio waves to transmit electrical signals.
The controller is usually composed of a signal processor and a thousand-earth alarm device. The detection electrical signal sent by the wired or wireless channel is processed in-depth by the signal processor to judge whether there is a “presence†or “nothing†danger signal. If there is a situation, the controller controls the warning device and emits an audible and visual alarm signal, causing the on duty The staff is alert to take corresponding measures; or directly to the public security department to issue an alarm signal.
A wide variety of detectors for various types of sensors used in security technologies have been applied to different locations and occasions and have achieved good results. There are many types of alarm equipment, and the classification of alarm equipment is helpful to grasp its working principle, structure and applicable occasions.
Alarm equipment is usually distinguished by its sensor type, working method, and alert range.
1, according to the type of sensor classification According to the type of sensor, that is, the physical industry detected by the sensor to distinguish, usually: switch alarm, vibration alarm, ultrasonic, infrasound alarm, infrared alarm, microwave, laser alarm, smoke Sense and temperature alarms, etc.
2. Classified according to work methods: According to the working methods, there are active and passive alarms.
Passive detection alarms do not need to send a signal to the detection site during operation, but they detect the energy existing in the detected object itself. A stable signal is usually output on the receiving sensor. When a condition occurs, the stable signal is destroyed and an alarm signal is processed.
While the active alarm device is working, the detector must send some form of energy to the detection site. A stable signal is formed on the sensor by reverse or direct radiation. When a dangerous situation occurs, the stable signal is destroyed and the signal is processed. Alarm.
3, according to the scope of alert classification According to the police range can be divided into point, line, surface and space detection alarm.
Point control alarm organ alarm is only a certain point, such as doors and windows, counters, safes, when this monitoring point appears dangerous, that is issued an alarm signal, usually by the micro switch or magnetic switch mode alarm control.
Line control alarm is a line alert, when there is a dangerous situation on this cordon, an alarm signal. Such as photoelectric alarm or laser alarm, a light or laser light is emitted by the light source or the laser, and is received by the receiver. When the light and laser are interrupted, the alarm device will send an alarm signal.
The alarm range of the surface control alarm is one surface. When the hazard appears on the guard surface, an alarm signal is issued. If the vibration alarm is installed on a wall, an alarm signal will be issued when any point on the wall is vibrated.
The scope of the space control alarm is a warning signal when an intrusion hazard occurs anywhere in a space. In the space that the microwave Doppler alarm is alerting, an intruder will generate an alarm signal from any entry point of the door, window, ceiling or floor.
Magnetic switches and micro switch alarms are often used as control alarms.
Active infrared and inductive alarms are often used as line control alarms.
Vibrating and inductive alarms are often used as surface control alarms.
Voice-activated and acoustic emission-type, ultrasonic, self-serving, video-moving, temperature-sensitive and smoke-sensitive alarms are commonly used as space-prevention control alarms.
There are also classified according to the use of alarm equipment, such as anti-theft alarm, fire alarm, anti-explosion alarm and so on.
Sometimes classified according to the detection of electrical signal transmission channels, sub-wired alarms and wireless alarms.
1.3 Safety precautions Technical engineering procedures Safety precautions are those for alarm, television monitoring, communication, entrance/exit control, explosion protection, and safety inspections that are used for the purpose of maintaining public safety and disaster prevention. The project shall be entrusted by the construction unit and shall be designed and constructed by the professional design and construction unit that has the design and construction qualification certificates approved and issued by the public security technology prevention and management department at or above the provincial or municipal level. The project establishment, design, tendering, commissioning, construction, and acceptance must be conducted in strict accordance with the procedures required by the competent public security department.
The safety precaution project divides the project scale according to the level of risk or project investment and is divided into three levels.
Level 1 project: First-level risk or project with an investment of over 1 million yuan.
Second-grade engineering: Secondary risks or projects with an investment of more than 300,000 yuan and less than 1 million yuan.
Third-class engineering: Three-level risk or projects with an investment of 300,000 yuan or less.
The construction unit must implement the feasibility study of the project before implementing the safety precautions. The research report can be prepared by the construction unit or the designing unit. It should be related to the relevant regulations of the government department, the risk level and protection level of the protected target, and the project The content and purpose requirements, construction period, and social benefits analysis of the project cost estimates are demonstrated. Only after the feasibility study report has been approved by the corresponding competent authority can formal project approval be established.
The construction unit shall entrust the construction and design units that have obtained the approval for the issuance of a permit by the public security technology prevention and management department at or above the provincial level to carry out the design and implementation of the project construction.
The project shall be held under the common auspices of the competent authority and the construction unit to avoid any unfair competition.
In the bid invitation for engineering bidding, the construction unit shall compile the bidding documents according to the requirements of the design task and issue bid invitations or notices.
The construction unit should organize the bidding unit to survey the work site and answer the relevant questions in the bidding documents.
The bidder shall seal the bid submission.
The public should open bids, negotiate bids, review tenders, and determine the bid notification.
The successful bidder can accept the construction unit's entrustment based on the design task book Nanchang, according to the design and construction requirements, put forward the project proposal and project implementation plan, after the construction unit review and approval, the commission effective, you can sign the contract.
The content of the contract should include:
a. Project name and content b. Responsibilities and Obligations of Construction Units and Design and Construction Units c. Project progress requirements d. Engineering fees and payment methods e. Engineering acceptance method f. Personnel training and maintenance g. Risk and breach of contract responsibility h. Other related matters shall be accompanied by the winning bid documents and power of attorney, the design mission statement and other documents identified by both parties. The engineering design should undergo preliminary design and program verification.
The preliminary design should have the following content:
a. System Design and System Functions b. Equipment plane deployment map and protective range c. System bar diagram and main equipment supporting list d. Central control room layout and use operation f. The project cost estimate and the construction period project will be completed. The preliminary design student shall be sponsored by the construction unit to organize the project demonstration, the competent business department, the public security department in charge of Beijing time, and the design, construction and a certain number of technical experts.
Demonstration should review the various contents of the preliminary design and evaluate its technology, quality, cost, duration, service and expected results. For opinions that have objections, the design unit and the municipality directly under the authority of the construction agency must report the opinions before submitting for approval. After the approval of the construction unit and business executives, it can enter the formal design stage.
The formal design should include the technical design, construction drawing design, operation, maintenance instructions and project cost budget.
Design documents and fees, except where special design documents are required to be reviewed and approved by the competent public security department, shall be presided over by the construction unit, review the design documents and budget, and review the approval of the project into the implementation phase.
After the construction of the project, the goods should first be ordered according to the equipment and quantity pre-selected in the engineering design documents.
According to the pipeline laying plans and related construction specifications for pipeline laying facilities.
According to the technical requirements of the construction drawings, equipment and equipment installation.
According to the system functional requirements for system debugging.
After commissioning of the system and one month of operation, the construction unit shall record the trial operation. The trial operation report shall contain the following contents:
a. The system is operating normally b. Whether the system function meets the design requirements c. The number of false alarms and missed alarms and the analysis of their causes d. The number of failures, eliminating the time e. Whether the maintenance service meets the requirements of the contract and corresponding technical training for the relevant personnel.
The project is completed according to the contents of the contract. After the trial operation, it meets the design requirements. It is recognized by the construction unit and can be regarded as absenteeism. A few non-major projects are not completed according to the contract, and the construction unit negotiates with the design agency to resolve the remaining issues. There is a clear treatment method. After the trial operation and approval by the construction unit, it can also be completed, and the design and construction unit will write a completion report.
Acceptance of the project should be divided into two stages of preliminary inspection and acceptance.
The construction unit should first organize the preliminary inspection according to the requirements of the contract.
The preliminary inspection includes the acceptance of the technical system, the acceptance of equipment and equipment, and the acceptance of the installation of equipment and pipelines in order to verify the acceptance of the project data.
On the basis of the qualification of the preliminary inspection, an acceptance committee or group composed of the supervisor of the higher level business of the construction unit, the chief person in charge of the construction unit, and the technical expert shall carry out the acceptance of the project. Acceptance of small components technology acceptance group, construction acceptance group and data review group, respectively, according to the contract related to the payment and content of review and acceptance.
Finally, according to the results of the review, write the project acceptance conclusion.
1.4 Development Trends of Security Technology Systems In recent years, especially with the rapid development of modern science and technology, criminals have become more intelligent, complicated, and more covert. Therefore, prevention technology means both device and system There are rapid developments in function. The detector on the device has evolved from a primary product that is simpler and has a single function to a variety of technologically advanced high-tech products. The detector on the device is developed from a simple product with a simple function and a single function into a high-tech product with a variety of technical composites. Such as microwave - passive infrared composite detector, it will focus on the use of microwave and infrared detection technology in one. Within the control range, the alarm signal is output only when the detectors of both alarm technologies generate alarm signals. It not only can maintain the reliability of the microwave detector and has nothing to do with the heat source, but also has the characteristics that the passive infrared detector does not need the illumination and brightness requirements and can be ready for operation, which greatly reduces the false alarm rate of the detector. The false alarm rate of this composite alarm detector is a few percent of the false alarm rate of a single-technology microwave alarm. Another example is the use of sound and vibration technology of the composite double Jian glass alarm, the detector can only experience the vibration at the same time when the glass vibration and broken high-frequency sound, the alarm signal occurs, which greatly reduces the vibration due to windows The resulting false alarms increase the accuracy of the alarm. The rapid development of television monitoring systems has made the security technology more effective and intuitive. The research and development of the low-light and infrared cameras have been successful. It has enabled the security protection to achieve all-day and day-and-night work, and the miniaturization and intelligence of the cameras have made the detectors even more subtle. The long-term recording device can record for 24 hours, 48 ​​hours, and 72 hours. The emergence of multi-screen separators has greatly reduced the number of system equipment, making the system more reliable, and the scope of monitoring is also increasing. A large-scale enterprise and several sub-systems constitute a comprehensive security system. It not only invades anti-theft functions, but also has the functions of fire prevention, anti-riot and security inspection. When a detected point sends out an alarm signal, it can automatically alarm to the alarm center through the telephone line, and the alarm center can also automatically detect the nature, location and other of the alarm signal. The transmission of detection signals is also transmitted from conventional analogue wired transmission to digital wireless transmission, which greatly reduces the wiring work during construction and saves material and labor. The alarm controller uses a large-capacity CPU to enable signal and control to control the computer bus, which greatly reduces the workload of system installation and improves the reliability of the system. We will continue to adopt newer electronic technologies and computer technologies to further improve the stability and reliability of security equipment, and further improve the system's functions, so that people's safety and security technologies will contribute to combating crimes and protecting the interests of the people.
One Color Led Panel Light,Hexagon Light Panels,Flat Panel Led Lights,Surface Panel Light
Jiangmen hengshenghui Lighting Co., Ltd , https://www.jmsunbright.com