Supplier eBooks

TE Connectivity - Building Intelligent Automation

Issue link: https://resources.mouser.com/i/1442385

Contents of this Issue

Navigation

Page 17 of 18

18 Detecting Violators Detection is the next key element in any security design solution. This concept is explained in signal detection theory (Figure 1), which identifies the idea that there is a stimulus or there isn't, and the system can correctly or incorrectly identify that fact. Opportunities for failure can be introduced from sensor and connection failure (resulting in a False Alarm), or a person (yeilding the Miss result). Response Hit Signal Noise State Of The World Miss False Alarm Correct Rejection Yes No Figure 1: There are two successful outcomes and two opportunities for failure. (Source: Abdelhamid, et al. 2004) The oldest detection was done with living, breathing things. Whether animal or human, they all suffer from a few common problems: They all need to sleep, eat, take breaks, have hearing limitations, and can simply become distracted. This is where technology has come in, offering solutions that are more reliable, more sensitive, and faster to detect and alert. Support sensors such as PIR/occupancy sensors, radar, and beam break all still serve valid, essential functions and are becoming smaller and smarter, thus increasing a building's overall intelligence. Furthermore, imagine if the security system were connected to other smart building components. What if the system could identify abnormal use, and thus detect potential threats, based on data incorporated into its machine learning algorithm from lighting and occupancy sensors? Due to recent advances in maching learning technology, this is now possible, and automated systems able to detect normal human activity patterns and adjust the system accordingly will become increasingly commonplace. A common scenario is integrating lighting, thermostat, and security systems. Smart lighting and thermostat systems learn human activity patterns and become smarter, keeping people comfortable and rooms lit when there is activity. Now let's say an irregular event occurs: The phone or power goes down, a vibration or glass-break sensor goes off, a motion or light sensor is tripped, or a door sensor is activated. In an integrated security design, one sensor can heighten the reaction of the others and communicate to a centralized controller, which can then provide more information to help assess threat credibility. But even technology-based detection solutions have downsides. In particular, they're not human and, as a result, can't always accurately determine acceptable and unacceptable access. Additionally, sensors can go bad, and wires can fail or corrode—all leading to false alarms. TE Connectivity addresses these concerns with their Power Triple Lock connector™ system. It comes in many varieties allowing it to withstand both high temperatures and strong vibration, and has auditory and mechanical feedback with a click sound confirming that its snag-less primary lock is secured. Connection mismatch is avoided by optional keyed connections that eliminate installer issues, and a triple lock insert can safeguard against powerful vibrations and accidental disconnects. Assessing The Detection Assessing detection is a critical factor, as this phase determines threat credibility. Until recent years, humans have been at the core of threat assessment, but it has evolved into the comprehensive network of sensors and output that we have today. However, sensor output in a security system produces a new challenge: The sheer amount of data produced that needs to be collected and analyzed, as well as potentially stored for further analysis and insights. Historically, data collected from these sensors was rarely kept for any analytics purpose, but today's "smart" or "intelligent" systems use this data to predict and assess threats. We want to detect unusual events, but doing so is often complicated by irrelevant data. With the help of Artificial Intelligence (AI), computers can recognize acceptable or normal use, thus only bringing credible threats to the human monitoring the system. Alerting After Detected Threat While alerting the end user to a verified, credible threat may seem straight-forward, this phase has its challenges as well. Returning to the scenario: The phone line or power goes down, a vibration or glass-break sensor goes off, a motion or light sensor in your learning thermostat is tripped, and finally a door sensor is activated. At what point did this experience not fit the ordinary course of events? At what point does the alarm alert the user or company? Based on user preference and premises needs, the system can alert them at a pre-determined point in the sequence. Responding To A Threat The final component of a security solution is responding to a confirmed threat. Goals here include preventing further loss, recovering goods, and identifying the perpetrator. Security systems initiate the communications— such as automatic calls to 911 and the end user—necessary to respond to confirmed threats, though the primary response comes from security personnel and/or police. Throughout the response step, sensor data is collected, summarized, and relayed to give responders as clear a picture as possible. This allows their responses to be as effective and safe as possible. Conclusion An effective security solution must address all five stages of threat mitigation. Failure to deter, detect, or accurately assess a threat could lead to delays in communicating with and alerting responders, thus increasing the likelyhood of significant asset loss. Unlike the systems of yesteryear, a modern system can be highly sophisticated, able to learn from its environ- ment and respond accordingly. But remember: When implementing a premises security solution, any system is only as good as its components. Fortunately, TE Connectivity offers numerous high quality, reliable security solutions such as occupancy, magnetic, and contact sensors; security cameras and connecting wires, Cloudsplitter, and Power Triple Lock. While there will always be a need for security systems, designers and manufac- turers alike are working to meet those needs with cutting edge technology. When every connection counts, designers can count on TE Connectivity.

Articles in this issue

Links on this page

view archives of Supplier eBooks - TE Connectivity - Building Intelligent Automation