1. Field of the Invention
The present invention relates to an intruder detection system that includes an intruder detection device and a pair of leaky transmission lines including a transmission-side leaky transmission line, which is connected to the intruder detection device and through which a leaky electric wave is output on the basis of an output from the intruder detection device, and a receiving-side leaky transmission line, which is connected to the intruder detection device and through which the leaky electric wave output from the transmission-side leaky transmission line is received, and that performs intrusion detection by causing the intruder detection device to detect the change of an electric wave received in the receiving-side leaky transmission line.
2. Description of the Related Art
In a known intruder detection system using a security camera, a plurality of security cameras are used to detect the location of an intruder (refer to JP-A-04-177923 (FIG. 1 and corresponding description)).
Since the known intruder detection system is configured as described above, a detection range and a detection time should be set in accordance with the location of a security camera, the location of an image, or switching of the security camera. Accordingly, it is difficult to precisely set the detection range and a setting method is complicated. In addition, a plurality of security cameras are required for detection over a long distance or detection in a wide range of detection region having a complicated structure or shape. For this reason, the known intruder detection system is not suitable as a large-scale intrusion detection system that detects an intruder in a place such as a factory, a transformer substation, or an airport.
In view of the above situation, an intruder detection system based on a principle different from that disclosed in JP-A-04-177923 is under development in order to make it easy to detect whether or not an intruder is present and detect the intrusion location even in a large-scale intrusion detection system that detects an intruder in a place such as a factory, a transformer substation, or an airport.
An intruder detection system under development that has promoted the invention is configured as shown in
Referring to
An output of the transmission circuit 3b is a signal obtained by modulating a spread code with a high-frequency carrier wave and is output to the leaky transmission line 2-1. A leaky electric wave (not shown) is output through the leaky transmission line 2-1, the leaky electric wave is received through the leaky transmission line 2-2, and the received signal is received in the receiving circuit 4. In the receiving circuit 4, a phase operation on the received signal is performed using a reference spread code related to an intrusion distance and the electric field intensity is output to the intrusion detection unit 5. In the intrusion detection unit 5, the intrusion detection corresponding to the intrusion distance is performed on the basis of variation of the electric field intensity.
Hereinafter, the leaky transmission line 2-1 through which a leaky electric wave is output is referred to as a ‘transmission-side leaky transmission line 2-1’, the leaky transmission line 2-2 through which a leaky electric wave is received is referred to as a ‘receiving-side leaky transmission line 2-2’, and the leaky transmission lines 2-1 and 2-2 that form a pair are referred to as a ‘leaky transmission line pair 2-12’.
In the intrusion detection system under development in which the leaky transmission line pair 2-12 is used, it is known that the location of an intruder or intruding body can be detected over a detection range up to 600 m per intruder detection device 1. That is, due to attenuation of an electromagnetic wave in the transmission-side leaky transmission line 2-1 and the receiving-side leaky transmission line 2-2, the maximum length of each of the transmission-side leaky transmission line 2-1 and the receiving-side leaky transmission line 2-2 that allows desired intrusion detection to be performed is 600 m. In other words, the maximum length of the leaky transmission line pair 2-12 that allows the desired intrusion detection to be performed is 600 m.
Since the intrusion detection system under development is configured as described above, it is easy to detect whether or not an intruder is present and detect the intrusion location even in a large-scale intrusion detection system that detects an intruder and the like in a place such as a factory, a transformer substation, or an airport, compared with the intruder detection system disclosed in JP-A-04-177923. However, there has been a problem that detection cannot be performed in a detection range exceeding 600 m.
The invention has been finalized in view of the above problems, and it is an object of the invention to provide an intruder detection system capable of extending a detection range more than 600 m and to extend an intrusion detection range.
According to an aspect of the invention, in an intruder detection system that includes the intruder detection device and the leaky transmission line pair including the transmission-side leaky transmission line, which is connected to the intruder detection device and through which a leaky electric wave is output on the basis of an output from the intruder detection device, and the receiving-side leaky transmission line, which is connected to the intruder detection device and through which the leaky electric wave output from the transmission-side leaky transmission line is received, and that performs intrusion detection by causing the intruder detection device to detect the variation of the leaky electric wave received through the receiving-side leaky transmission line, the plurality of leaky transmission line pairs, which are connected to the intruder detection device and through which the leaky electric wave is output and received, are provided to be spaced apart from each other, and accordingly, it is possible to extend an intrusion detection range.
The foregoing and other object, features, aspects, and advantages of the present invention will become apparent from the following detailed description of the present invention when taken in conjunction with the accompanying drawings.
Hereinafter, a first embodiment of the invention will be described with reference to
The intruder detection device 1 includes a transmission circuit 3, the receiving circuit 4, and an intrusion detection unit 5. For example, a leaky coaxial cable that is commercially available may be used as the transmission-side leaky transmission line 2-1 and the receiving-side leaky transmission line 2-2. The leaky points 21TH, 21TH, . . . , 21TH, 22TH, 22TH, . . . , 22TH of the transmission-side leaky transmission line 2-1 and the receiving-side leaky transmission line 2-2 are penetration slots provided so as to penetrate an outer cover of the commercially-available leaky coaxial cable at predetermined distances of several tens of centimeters.
Here, an example of concept of detection of the intrusion location will be described.
In the case when the commercially-available leaky coaxial cable is used as the transmission-side leaky transmission line 2-1 and the receiving-side leaky transmission line 2-2, the transmission-side leaky transmission line 2-1 and the receiving-side leaky transmission line 2-2 are provided so as to be spaced apart from each other by several meters, and for example, one transmission pulse is transmitted from the transmission circuit 3, as shown in
In the same manner, when one transmission pulse is transmitted from the transmission circuit 3, a leaky electric wave from a second hole of the transmission-side leaky transmission line 2-1 is received through a second hole of the receiving-side leaky transmission line 2-2 and arrives at the receiving circuit 4 as a received signal, but the arrival time of the leaky electric wave is delayed by ΔT2 from the start of transmission of the transmission signal.
In the same manner, the arrival time of a received signal received through a third hole is delayed by ΔT3 from the start of transmission of the transmission signal.
If the length of a signal transmission line is known, the arrival time ΔT1, ΔT2, ΔT3, . . . , that is, the arrival time ΔT can be easily acquired by calculation since it is already known that a propagation rate of a signal is 300000 Km/sec (in the case of the air).
Therefore, by storing data of the arrival time ΔT calculated beforehand when configuring the system, the receiving circuit 4 can distinguish which hole (penetration slot) a received signal has passed through by comparing the actually received signal with the stored data.
In addition, when an intruder enters a region where the leaky electric wave exists, for example, the shape of a leaky electric wave varies due to the intruder.
Accordingly, if the intrusion detection unit 5 detects that the signal received in the receiving circuit 4 has varied, it is possible to detect in which location of the transmission-side leaky transmission line 2-1 and the receiving-side leaky transmission line 2-2 an intruder has intruded and then to report a result of the detection.
Since a signal speed is very high and a detection operation speed of the receiving circuit is related to the signal speed, a unit pulse is not actually transmitted once every few seconds as the transmission signal. For example, as shown in
When the PN code is used in the intruder detection system shown in
The intruder detection system has the transmission-side leaky transmission line 2-1 and the receiving-side leaky transmission line 2-2, which is provided together with the transmission-side leaky transmission line 2-1 in order to receive a leaky electric wave from the transmission-side leaky transmission line 2-1, and determines that an intruder is present when an electric wave received in the receiving-side leaky transmission line 2-2 varies. A study performed by the inventors of the invention shows that each of the leaky transmission lines 2-1 and 2-2 is provided to have a length of about 600 m and it is possible to detect whether or not an intruder is present between the leaky transmission lines 2-1 and 2-2 and detect the intrusion location over a long distance of about 600 m.
If it is possible to detect whether or not an intruder is present and detect the intrusion location over a long distance of about 600 m, the intruder detection system may be applied to a factory, a transformer substation, an airport, a parking lot, and so on. However, in the case when the detection can be performed over a long distance of about 600 m, for example, a gate for the general public or a general road may exist in a detection region that is about 600 m long. In this case, it is necessary to design the intruder detection system such that a person passing through the gate for the general public or the general road is not regarded as an intruder by setting a non-detection region. For example, even if the leaky electric wave is disturbed due to a person passing through the gate for the general public or the general road, and accordingly, a received signal varies, it is necessary to perform processing for not regarding the person passing through the gate for the general public or the general road as an intruder.
Therefore, in the technique that is a basis of the first embodiment of the invention, as shown in
A specific example of the detection table 521 is shown in
In
When intrusion location detection information in the intrusion location detection unit 51 corresponds to a detection area of the detection table 521, a detection result is output from the detection result output unit 54. When the intrusion location detection information in the intrusion location detection unit 51 corresponds to a non-detection area of the detection table 521, the detection result is not output from the detection result output unit 54.
Next, referring to
If an intruder enters between the leaky transmission lines 2-1 and 2-2 shown in
As a result of the determination in step ST12 of
Then, a received signal (intrusion location detection information in the intrusion location detection unit) detected in step ST13-1 is compared with data of the detection table 521. In the case of intrusion detection within the intrusion detection area, it is conclusively determined that an intruder is present and the detection result output unit 54 outputs the intrusion location of the intruder (step ST14).
In addition, in the case that the PN code is used, the detection regions X1, X2, and X3 are associated with the reference spread code. For example, the detection range X1 is a range of a predetermined reference spread code PNx1 to a predetermined reference spread code PNxx.
A phase operation on the received electric wave is performed using a predetermined reference spread code and the electric field intensity corresponding to a predetermined reference spread code is calculated. When it is determined that the electric field intensity has significantly varied, it is considered as intrusion related to the predetermined reference spread code, that is, intrusion within the detection range X1.
In the technique that is a basis of the first embodiment of the invention, as described above, the intrusion detection can be easily and precisely performed only by comparison using the detection table 521. In addition, it is possible to set the detection range and the non-detection range and to change the set detection range and the set non-detection range. In addition, it is possible to perform the intrusion detection, for example, at every 2 m or 5 m distance, over a long distance. As a result, an applicable range of the intruder detection system remarkably extends.
Next, an example of the entire configuration of the intruder detection system in which a plurality of leaky transmission lines are connected to the intruder detection device will be described with reference to
The system configuration shown in
In the example shown in
The analog multiplexer for transmission 11-1 is a transmission output switching unit that receives an output of the timing generating circuit 12 and switches and supplies an output of the transmission circuit 3b to each of the plurality of groups of leaky transmission line pairs 2-12 in an alternative and sequential manner.
The analog multiplexer for reception 11-2 is a reception input switching unit that receives an output of the timing generating circuit 12 and switches and supplies a received signal of each of the plurality of groups of leaky transmission line pairs 2-12 to an input of the receiving circuit 4 in the alternative and sequential manner.
The timing generating circuit 12 is a switching operation control unit for the alternative of transmission or reception that controls a transmission and reception switching operation of each of the analog multiplexers 11-1 and 11-2 such that the analog multiplexers 11-1 and 11-2 perform switching operations in synchronization with each other in order for the transmission circuit 3b and the receiving circuit 4 to perform transmission and reception with respect to the same group of leaky transmission line pairs 2-12 and the plurality of groups of leaky transmission line pairs 2-12 are connected to the transmission circuit 3b and the receiving circuit 4 in the alternative and sequential manner.
Next, an example of an operation in the case of
In order to process a signal of each of the A-group leaky transmission line pair (2-12)A and the B-group leaky transmission line pair (2-12)B using the same spread code generator 3, the receiving circuit 4, and the intrusion detection unit 5, the signal of each of the leaky transmission line pairs (2-12)A and (2-12)B is alternately processed in a time division manner. An example of the processing timing is shown in a timing chart of
In
For example, the period T11 is a period for which the analog multiplexers 11-1 and 11-2 perform alternative and switching operations in order to activate intrusion detection using the A-group leaky transmission line pair (2-12)A. During the period T11, a transmission signal is transmitted from the spread code generator 3 to a transmission-side transmission line 2-1 of the A-group leaky transmission line pair (2-12)A and a received signal from a receiving-side transmission line 2-2 of the A-group leaky transmission line pair (2-12)A is transmitted to the receiving circuit 4. The period T12 is a period for which the signal received during the period T11 is processed in the intrusion detection unit 5.
Similarly, the period T21 is a period for which the analog multiplexers 11-1 and 11-2 perform alternative and switching operations in order to activate intrusion detection using the B-group leaky transmission line pair (2-12)B. During the period T21, a transmission signal is transmitted from the spread code generator 3 to a transmission-side transmission line 2-1 of the B-group leaky transmission line pair (2-12)B and a received signal from a receiving-side transmission line 2-2 of the B-group leaky transmission line pair (2-12)B is transmitted to the receiving circuit 4. The period T22 is a period for which the signal received during the period T21 is processed in the intrusion detection unit 5.
As for both the A-group leaky transmission line pair (2-12)A and the B-group leaky transmission line pair (2-12)B, the detection range thereof can be set to 600 m in the same manner as in
In other words, in the intruder detection system that includes: the intruder detection device 1; and the leaky transmission line pair 2-12 including the transmission-side leaky transmission line 2-1, which is connected to the intruder detection device 1 and through which a leaky electric wave is output on the basis of a carrier wave output from the intruder detection device 1, and the receiving-side leaky transmission line 2-2, which is connected to the intruder detection device 1 and through which the leaky electric wave output from the transmission-side leaky transmission line 2-1 is received, and that performs intrusion detection by causing the intruder detection device 1 to detect the variation of the leaky electric wave received through the receiving-side leaky transmission line 2-2, it is possible to further extend the detection range by providing the plurality of leaky transmission line pairs (2-12)A and (2-12)B, which are connected to the intruder detection device 1 and through which the leaky electric wave is output and received, so as to be spaced apart from each other and have a predetermined angle therebetween (180° in
In addition, in the case of alternately activating intrusion detection using the A-group leaky transmission line pair (2-12)A and intrusion detection using the B-group leaky transmission line pair (2-12)B as described above, interference at the time of transmission and reception between the A-group leaky transmission line pair (2-12)A and the B-group leaky transmission line pair (2-12)B may be prevented. However, strictly speaking, a signal is slightly delayed while the signal comes and goes through the transmission-side transmission line 2-1 and the receiving-side transmission line 2-2, and accordingly, it may not be necessarily said that there is no interference in the case when the periods T1 and T2 are very short. Moreover, the A-group leaky transmission line pair (2-12)A and the B-group leaky transmission line pair (2-12)B may operate at the same time. For this reason, the plurality of leaky transmission line pairs (2-12)A, (2-12)B, . . . are preferably provided to be spaced apart from each other by a distance that allows leaky electric waves not to interfere with each other from the viewpoint of preventing an error operation of intrusion detection.
Hereinafter, referring to
In the first embodiment, an example has been shown in which the intruder detection device 1 is disposed in the middle and the A-group and B-group leaky transmission line pairs each having a length of 600 m are provided in the opposite directions, such as north and south directions of the intruder detection device 1. However, the A-group and B-group leaky transmission line pairs may be provided parallel to each other according to the situation in a construction site.
In the case when construction regions of the A-group and B-group leaky transmission line pairs (2-12)A and (2-12)B each having a length of 600 m extend parallel to each other with a building interposed therebetween in a predetermined yard, for example, it is possible to apply
In other words, in the intruder detection system that includes: the intruder detection device 1; and the leaky transmission line pair 2-12 including the transmission-side leaky transmission line 2-1, which is connected to the intruder detection device 1 and through which a leaky electric wave is output on the basis of a carrier wave output from the intruder detection device 1, and the receiving-side leaky transmission line 2-2, which is connected to the intruder detection device 1 and through which the leaky electric wave output from the transmission-side leaky transmission line 2-1 is received, and that performs intrusion detection by causing the intruder detection device 1 to detect the variation of the leaky electric wave received through the receiving-side leaky transmission line 2-2, it is possible to further extend the detection range by providing the plurality of leaky transmission line pairs (2-12)A and (2-12)B, which are connected to the intruder detection device 1 and through which the leaky electric wave is output and received, so as to be spaced apart from each other and have a predetermined angle therebetween (0° in
Hereinafter, a third embodiment of the invention will be described with reference to
In
Further, in the present embodiment, a basic operation of an intruder detection system using the leaky transmission line pair 2-12 is the same as that in the first embodiment, and accordingly, a different point from the first embodiment will now be described.
Specifically, as shown in
Here, since an electric wave flowing through the transmission-side leaky transmission line 2-1 and the receiving-side leaky transmission line 2-2 is attenuated as the position is far from the intruder detection device 1 (that is, as the position is closer to a downstream side), it is not possible to set the detection range above a predetermined distance. However, using the configuration in which the amplifying devices 6-1 and 6-2 are connected to amplify an attenuated electric wave and the attenuated electric wave flows to the transmission-side leaky transmission line (2-1)a and the receiving-side leaky transmission line (2-2)a at the downstream side, it is possible to extend the detection distance in the direction in which the leaky transmission line pair 2-12 extends.
In order to cause an amplifier circuit 602 (refer to
The mount 601, the amplifier circuit 602, the amplifier-circuit-mounted board 603, the connection line 604, and the connection line 605 are all covered by a watertight hollow box 606 made of a conductive material, such as aluminum, such that leakage of an electromagnetic wave from the amplifier circuit 602, the connection line 604, and the connection line 605 is prevented due to the watertight hollow box 606.
Connections between the watertight hollow box 606 and the transmission-side leaky transmission lines 2-1 and (2-1)a formed of leaky coaxial cables are made by fastening a transmission-line-side conductive connector member 607 and a box-side conductive connector member 608 each other by screws 6071 and 6081 thereof such that the transmission-line-side conductive connector member 607 and the box-side conductive connector member 608 come in contact with each other by pressure.
The transmission-line-side connector member 607 is provided with a tapered connection pin (core of the leaky coaxial cable) 6072 and the box-side connector member 608 is provided with a tapered connection pin receiving hole 6082. By fastening the transmission-line-side connector member 607 and the box-side connector member 608 each other by the screws 6071 and 6081 thereof, the pressure contact using the connection pin 6072 and the connection pin receiving hole 6082 is more reliably realized.
The transmission-line-side connector member 607 is fixed to each of the leaky transmission line 2-1 and (2-1)a by attaching a connector fixing member 609 to each of the leaky transmission lines 2-1 and (2-1)a.
In addition, the box-side connector member 608 is fixed to the watertight hollow box 606 using a box-side connector mounting flange 610 attached to the watertight hollow box 606.
In this manner, both the leaky transmission lines 2-1 and (2-1)a formed of coaxial cables are connected to the watertight hollow box 606.
The connection pin receiving hole 6082 located at the side of the leaky transmission line 2-1 is connected to the connection line 604 and the connection pin receiving hole 6082 located at the side of the leaky transmission line (2-1)a is connected to the connection line 605. A signal of the leaky transmission line 2-1 arrives at the amplifier circuit 602 on the amplifier-circuit-mounted board 603 through the connection line 604 and is then amplified in the amplifier circuit 602. The signal amplified in the amplifier circuit 602 is transmitted from the connection pin receiving hole 6082 to the leaky transmission line (2-1)a through the connection line 605.
The transmission-line-side connector member 607 and the box-side connector member 608, which are located at the upstream leaky transmission line 2-1 side, and a structure of the periphery thereof are equal to the transmission-line-side connector member 607 and the box-side connector member 608, which are located at the downstream leaky transmission line (2-1)a side, and a structure of the periphery thereof.
The power for the amplifier-circuit-mounted board 603 is supplied from the battery 7 housed in a battery housing room 611 provided on a side surface of the watertight hollow box 606. The battery 7 is equivalent to a battery of the power supply device 7 shown in
Since the amplifying devices 6-1 and 6-2 may be provided at the outside and may be used for a long time, it is preferable to take measures to prevent the amplifying devices 6-1 and 6-2 from being submerged due to rainwater or the like even if the amplifying devices 6-1 and 6-2 are housed within the watertight hollow box 606. For this reason, the amplifier-circuit-mounted board 603 within the watertight hollow box 606 provided on the transmission line providing surface 2ES is placed on the amplifier-circuit-mounted board mount 601 so as to be positioned at the predetermined height h from the transmission line providing surface 2ES, such that it is prevented that the amplifier circuit 602 is submerged due to water flooding into the box. In addition, the predetermined height h may be set beforehand depending on the amount of rainwater gathered and the rain flow rate, which varies according to geographic features of a place where the amplifying devices 6-1 and 6-2 are placed, weather, a drain environment, and the like. Moreover, even in a region where there is a small amount of rain, it is preferable to set the predetermined height h in consideration of accumulation of dew condensation water generated due to a temperature difference.
Similarly, the box-side connector member 608 is also provided to be spaced apart from the transmission line providing surface 2ES. As a result, a lower surface of the transmission-line-side connector member 607 is positioned at a height H from the transmission line providing surface 2ES, and thus flooding of rainwater and the like through the screws 6071 and 6081, which serve to combine the transmission-line-side connector member-607 and the box-side connector member 608, is prevented.
In addition, even though the detailed structure of the amplifying device 6-2 of the receiving-side leaky transmission line 2-2 is not shown, the detailed structure of the amplifying device 6-2 of the receiving-side leaky transmission line 2-2 is the same as that of the amplifying device 6-1 of the transmission-side leaky transmission line 2-1.
Thus, in the third embodiment, it is possible to realize an environment-proof intruder detection system, which uses a leaky transmission line allowing the detection range to extend, using the configuration in which each of the amplifying devices 6-1 and 6-2 is connected in consideration of the installation environment.
Hereinafter, referring to
The fourth embodiment is realized by combination of the invention in the first embodiment (refer to
As described above, the configuration according to the fourth embodiment is obtained by combination of the configuration according to the first embodiment (refer to
Hereinafter, referring to
In the third embodiment described above, the intruder detection system in which the power supply device 7 using a battery is provided for the amplifying device 6-1 has been exemplified (refer to
In the fifth embodiment, as shown in
A power line 20 through which power from the DC power supply 81 is supplied to the amplifying devices 6-1 and 6-2 includes a ‘+’ power line 21 and a ‘−’ power line 22, and the ‘+’ power line 21 and the ‘−’ power line 22 are provided along a transmission line, such as the transmission-side transmission line 2-1 and the receiving-side transmission line 2-2. In the present embodiment, a case in which the ‘+’ power line 21 and the ‘−’ power line 22 are provided along the transmission-side transmission line 2-1 will be described.
In addition, a dry-cell battery, a solar battery, a DC power supply that supplies DC power obtained by AC/DC conversion, or the like may be used as the DC power supply 81.
Thus, according to the present embodiment, since power can be supplied to the amplifying device in a state in which the power supply device 8 is provided in the intruder detection device 1, concentration of facilities is realized. Accordingly, unlike the third embodiment described above, it is not necessary to take pains to go out to a place where the amplifying devices 6-1 and 6-2 are provided for the purpose of maintenance check of the power supply device 7 using a battery.
Hereinafter, referring to
In the fifth embodiment (refer to
In the present embodiment, a high-frequency resistor L, such as a coil, having high resistance with respect to a high frequency and low resistance with respect to a DC current is provided between a DC power supply 81 and a connection point 82 between the DC power supply 81 and the transmission-side transmission line 2-1 such that a high-frequency output signal of the transmission circuit 3b does not flow to the DC power supply 81 and provided between the DC power supply 81 and a connection point 83 between the DC power supply 81 and the receiving-side transmission line 2-2 such that a high-frequency received signal does not flow to the DC power supply 81. In addition, in the present embodiment, a DC resistor C, such as a capacitor, having low resistance with respect to a high frequency and high resistance with respect to a DC current is provided between the connection point 82 and the transmission circuit 3b and between the connection point 83 and the receiving circuit 4 such that an output of the DC power supply 81 is not supplied to the transmission circuit 3b and the receiving circuit 4.
According to the present embodiment, unlike the fifth embodiment (refer to
Hereinafter, a seventh embodiment of the invention will be described with reference to
The seventh embodiment may be applied to a case in which a detection area is far from the intruder detection device 1. That is, in the seventh embodiment, a transmission-side non-leaky transmission line 9-1 formed of, for example, a coaxial cable and a receiving-side non-leaky transmission line 9-2 formed of, for example, a coaxial cable are used in the configuration of the intruder detection system shown in FIG. 18 in order to extend a distance up to a detection area far from the intruder detection device 1, such that it becomes possible to provide the transmission-side leaky transmission line 2-1 and the receiving-side leaky transmission line 2-2 at the position far from the intruder detection device 1. Thus, according to the seventh embodiment, a detection range can be extended.
Specifically, in the present embodiment, the transmission-side non-leaky transmission line 9-1 that serves to transmit an output of the transmission circuit 3b to the transmission-side leaky transmission line 2-1 in a non-leaky manner is connected between the transmission circuit 3b of the intruder detection device 1 and the transmission-side leaky transmission line 2-1, and the receiving-side non-leaky transmission line 9-2 that serves to transmit a received signal, which is received by the receiving-side leaky transmission line 2-2, to the receiving circuit 4 in a non-leaky manner is connected between the receiving circuit 4 of the intruder detection device 1 and the receiving-side leaky transmission line 2-2.
Connection between the transmission-side non-leaky transmission line 9-1 and the transmission-side leaky transmission line 2-1 and connection between the receiving-side non-leaky transmission line 9-2 and the receiving-side leaky transmission line 2-2 are performed using a connector 13, respectively. The specific structure of the connector 13 is shown in
Referring to
The basic configuration of the connector 13 is the same as that of the transmission-line-side connector member 607 shown in
Connection between the leaky transmission line 2-1 (or 2-2) formed of a leaky coaxial cable and the transmission-side non-leaky transmission line 9-1 (or 9-2) formed of a non-leaky coaxial cable is made by fastening a transmission-line-side conductive and non-leaky connector member 131 and a transmission-line-side conductive and leaky connector member 132 each other by screws 1311 and 1321 thereof such that the leaky transmission line 2-1 (or 2-2) and the non-leaky transmission line 9-1 (or 9-2) come in contact with each other by pressure.
A tapered connection pin 200 is provided on a core (core of the leaky coaxial cable) of the leaky transmission line 2-1 (or 2-2) and a tapered connection pin receiving hole 900 is provided on the non-leaky transmission line 9-1 (or 9-2). By fastening the transmission-line-side non-leaky connector member 131 and the transmission-line-side leaky connector member 132 each other by the screws 1311 and 1321 thereof, the pressure contact using the connection pin 200 and the connection pin receiving hole 900 is more reliably realized.
The transmission-line-side non-leaky connector member 131 is fixed to the non-leaky transmission line 9-1 (or 9-2) by providing a connector fixing member 901 in the non-leaky transmission line 9-1 (or 9-2).
In addition, the transmission-line-side leaky connector member 132 is fixed to the leaky transmission line 2-1 (or 2-2) by providing a connector fixing member 201 in the leaky transmission line 2-1 (or 2-2).
In the same manner as in the third embodiment described above, in order to prevent submergence due to rainwater or the like, a reinforcing flange 133 is attached to the transmission-line-side leaky connector member 132 to secure a height H.
As described above, even though the basic operation in the present embodiment is the same as that described with reference to
Moreover, in the seventh embodiment described above, it is possible to obtain an intruder detection system, in which the leaky transmission lines 2-1 and 2-2 are used, capable of extending the detection range even if each of the non-leaky transmission lines 9-1 and 9-2 is connected.
Hereinafter, referring to
In the seventh embodiment, there has been described about the configuration in which the detection range is extended using the non-leaky transmission lines 9-1 and 9-2 formed of a coaxial cable. However, in the eighth embodiment, as shown in
Signals to be transmitted through the optical cables 10-1 and 10-2 should be digital signals. Accordingly, unlike the first to sixth embodiments described with reference to
An operation of the intruder detection device 1 is the same as those in the first to sixth embodiments described above. Here, the optical cables 10-1 and 10-2 have only a signal transmission function required to dispose the leaky transmission lines 2-1 and 2-2 at distant places but do not serve to transmit and receive an electric wave unlike the leaky transmission lines 2-1 and 2-2.
Each of the intruder detection device 1 and the repeater 14 includes a photoelectric converter 17 and an electro-optical converter 18 that are positioned at an end thereof connected to an optical cable. Furthermore, the repeater 14 includes a D/A converter 15, which converts a digital signal of the optical cable 10-1 into an analog signal to be transmitted to the transmission-side leaky transmission line 2-1, and an A/D converter 16, which converts a received analog signal of the receiving-side leaky transmission line 2-2 into a digital signal to be transmitted to the optical cable 10-2.
In addition, power of the repeater 14 is supplied from the DC power supply 81 through a power line 20.
In the present embodiment, it is possible to provide the leaky transmission lines 2-1 and 2-2 at the intrusion detection area far from the intruder detection device 1 by using a configuration in which an optical cable is connected. As a result, it is possible to acquire an intruder detection system capable of extending the detection range.
Moreover, in
Various modifications and alterations of this invention will be apparent to those skilled in the art without departing from the scope and spirit of this invention, and it should be understood that this is not limited to the illustrative embodiments set forth herein.
Number | Date | Country | Kind |
---|---|---|---|
2007-103067 | Apr 2007 | JP | national |