Proceedings of the 2015 International conference on Applied Science and Engineering Innovation

Research on the Recognition Method of Leaky Cable Intrusion Alarm Signal

Authors
Teng Lu, Lei Xu
Corresponding Author
Teng Lu
Available Online May 2015.
DOI
10.2991/asei-15.2015.20How to use a DOI?
Keywords
leaky cable, perimeter intrusion detection, feature extraction, similarity matching
Abstract

With the growing demand for security products, intrusion alarm system, based on leaky cables, is favored by majority of enterprises, with advantages of system stability, high concealment and installation location unlimited. Traditional intrusion detection method relies on signal amplitude threshold. However, this method is prone to produce false positives with complex environment interference and false negatives when the leaked electromagnetic field is weak. To solve this problem, this paper, by analyzing time and frequency domain features of the intrusion and interference signals, attempts to use a time-domain analysis method to recognize the intrusion signal. Then we research on how to establish the feature model of intrusion signal, and finally we propose an intrusion signal recognition algorithm based on similarity matching. Through identifying and verifying a large number of actual sample signals, results show that the similarity matching method can effectively reduce the false positives and false negatives, and improve the accuracy of alarm system.

Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2015 International conference on Applied Science and Engineering Innovation
Series
Advances in Engineering Research
Publication Date
May 2015
ISBN
10.2991/asei-15.2015.20
ISSN
2352-5401
DOI
10.2991/asei-15.2015.20How to use a DOI?
Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Teng Lu
AU  - Lei Xu
PY  - 2015/05
DA  - 2015/05
TI  - Research on the Recognition Method of Leaky Cable Intrusion Alarm Signal
BT  - Proceedings of the 2015 International conference on Applied Science and Engineering Innovation
PB  - Atlantis Press
SP  - 88
EP  - 92
SN  - 2352-5401
UR  - https://doi.org/10.2991/asei-15.2015.20
DO  - 10.2991/asei-15.2015.20
ID  - Lu2015/05
ER  -