Font Size: a A A

Research On Communication And Control Of Intrusion Detection System

Posted on:2019-10-16Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiuFull Text:PDF
GTID:2428330572452205Subject:Engineering
Abstract/Summary:PDF Full Text Request
The perimeter intrusion detection system based on leaky coaxial cables which occupies an increasingly important position in the modern security field has many advantages,such as low cost,good concealment,strong expandability,wide surveillance area,all-weather work and no blind spots.Many countries,including the United States and Israel,have early research on this new intrusion detection system.They have developed products with high positioning accuracy,good environmental adaptability,and rich functions.These products have been used on a large scale in the military and defense fields.Researchers in our country started late with this new intrusion detection system,and related products have low positioning accuracy or lack of positioning function,high false alarm rate and false negative rate,and low functionality.The new generation of perimeter intrusion detection systems based on leaky coaxial cables not only has great research significance,but also has high military and social values.This thesis is from the project "Key Technology of Perimeter Intrusion Detection System Based on Leaky Coaxial Cables".The purpose is to design and implement a set of communication interfaces and supporting host computer software for intrusion detection system.Combined with other parts of the system,a new generation of intrusion detection system with excellent performance,rich functions and industry standards is built.Firstly,the structure,working principle and characteristics of this new intrusion detection system are introduced,and the communication interface and corresponding communication interface chip suitable for the system are selected in this paper.Then a USB communication interface is constructed based on the FPGA platform,and it realizes the data receiving and sending and the analysis and generation of communication commands.Functional simulation of the communication interface module is made to ensure that it meets the design requirements.In addition,the corresponding upper computer application software is designed and constructed based on the LabVIEW platform and the VISA interface.After completing the device configuration,data receiving and sending,and resolution and generation of communication commands,the system implements monitoring and control of the system,a number of important functions have been implemented,such as system control,signal source parameter settings,positioning parameter settings,intrusion target information display,schematic drawing,error warning,and system debugging.Finally,the lower computer is connected with the upper computer,and Modelsim,Signaltap and LabVIEW are used to observe and debug the hardware and software modules to ensure that each module function meets the design requirements.
Keywords/Search Tags:Perimeter intrusion detection system, USB, FPGA, Upper computer
PDF Full Text Request
Related items