Main station|Member Center|Save the desktop|Mobile browsing
Ordinary Member

Nanjing Xintailin Electronic Technology Co., Ltd.

Electronic product R&D and sales

sell
  • There is no classification
contact
  • Contact:吴经理
  • Phone:025-85991600
search
 
link
  • There is no link yet
home > sell > Nanjing Xintailin leaking cable
Nanjing Xintailin leaking cable
products: Views:3Nanjing Xintailin leaking cable 
brand: 欣秦林
工作湿度: 0%~95%相对湿度,无凝露。
输出接口:: RS485接口。
防水级别:: IP66
price: 6800.00元/台
MOQ: 1 台
Total supply: 500 台
Delivery date: Shipped within 1 days from the date of payment by the buyer
Valid until: Long-term validity
Last updated: 2017-03-09 10:32
 
Details
The leakage cable alarm system is an outdoor perimeter intrusion alarm system. It is buried under the lawn cement floor or soil next to the perimeter wall or wrought iron fence. It is installed in a concealed manner and will not affect the beauty of the surrounding environment. Intruders can intruder without realizing it. The situation will be detected and an alarm signal will be sent out. The installation of leaky cables is not restricted by the terrain and can be laid according to the height of the terrain. Plants such as branches, flowers and grass, small animals such as birds and mice, and weather such as wind, rain and dense fog will not be affected.
The leaking cable perimeter anti-intrusion alarm system consists of the alarm center management software intelligent control keyboard alarm linkage module leaking cable host non-leaking cable leaking cable terminator and cable connector. When the leaky cable host is working, a radio frequency signal of a certain frequency is transmitted through a leaky cable, and the electromagnetic field is emitted outward at the groove of the outer conductor of the leaky cable. Another leaky cable laid in parallel receives the radio frequency signal, forming a direct transmission and reception of energy. Coupling, when an intruder enters the magnetic field detection area formed by two leaking cables, the magnetic field energy is disturbed, causing a change in the received signal. This changed signal is detected after amplification processing, and an alarm discrimination algorithm is used to determine whether to output an alarm. Signal.
Imitation Song_
After the leaking cable host alarms, it is transmitted to the alarm management host (universal intelligent control keyboard) or alarm management software (large general alarm management software) of the alarm center through the bus for viewing and processing. It can also be viewed and processed through The linkage module (universal linkage module) realizes alarm linkage with the video surveillance system. At the front end of the system, it can also be seamlessly connected to other perimeter alarm products such as infrared through-beam, microwave through-beam, etc.
Request for quotation
A total of0articles  Related Comments: