CN110956770A - Library network anti-theft system and use method thereof - Google Patents

Library network anti-theft system and use method thereof Download PDF

Info

Publication number
CN110956770A
CN110956770A CN201911424680.9A CN201911424680A CN110956770A CN 110956770 A CN110956770 A CN 110956770A CN 201911424680 A CN201911424680 A CN 201911424680A CN 110956770 A CN110956770 A CN 110956770A
Authority
CN
China
Prior art keywords
value
signal
storing
set range
book
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911424680.9A
Other languages
Chinese (zh)
Inventor
白文新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Kejing Intelligent Technology Co ltd
Original Assignee
Jiangsu Kejing Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Kejing Intelligent Technology Co ltd filed Critical Jiangsu Kejing Intelligent Technology Co ltd
Priority to CN201911424680.9A priority Critical patent/CN110956770A/en
Publication of CN110956770A publication Critical patent/CN110956770A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2465Aspects related to the EAS system, e.g. system components other than tags
    • G08B13/2468Antenna in system and the related signal processing
    • G08B13/2471Antenna signal processing by receiver or emitter

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Automation & Control Theory (AREA)
  • Computer Security & Cryptography (AREA)
  • Electromagnetism (AREA)
  • General Physics & Mathematics (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The invention relates to a library network anti-theft system and a using method thereof. The book signal is collected through the signal collection module, the book signal is compared and judged with the data stored in the data processing module, and the false alarm phenomenon is avoided through the feedback confirmation of the alarm unit and the background server, so that the problem of poor anti-theft effect of a library is effectively solved, and the safety performance is high.

Description

Library network anti-theft system and use method thereof
Technical Field
The invention relates to the technical field of library anti-theft, in particular to a library network anti-theft system and a using method thereof.
Background
The wireless intelligent alarm in the library anti-theft system can be provided with dozens of defense areas and dozens of alarms, is networked with the community, has high intelligent degree and is convenient for system management.
Although the intelligent degree of the products is high, the products have defects or even are insufficient in performance, the existing library anti-theft system is easily shielded and interfered by various factors, is not easily received by an alarm, cannot be accurately read, has obviously reduced detection and sensitivity, sometimes causes short-term failure, has a low automatic identification range, and easily causes poor library anti-theft effect.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the anti-theft device aims at solving the problem that the anti-theft effect of a library is poor.
In order to achieve the purpose, the invention provides the following technical scheme: the invention provides a library network anti-theft system and a using method thereof, wherein the system comprises a signal acquisition module, a signal transmission module, a data processing module, an alarm unit and a background server, wherein the signal acquisition module and the alarm unit are connected with the data processing module through the signal transmission module, and the data processing module is also connected with the background server; the signal acquisition module is used for acquiring book signals, and when the book signals meet the requirements, the book signals are stored in the data processing module; when the book signal does not meet the requirement, an early warning signal is sent to the data processing module, and the data processing module sends an operation instruction to the alarm unit according to the early warning signal; the alarm unit is used for judging whether the early warning signal is established or not, if not, the early warning is released, and if so, the alarm signal is sent out and is synchronized to the background server for confirmation through the data processing module; the background server is used for confirming the alarm or releasing the alarm.
Furthermore, the signal acquisition module comprises a transmitting coil for acquiring book signals, and the transmitting coil is connected with the signal transmission module. The transmitting coil transmits the book signal to the data processing module through the signal transmission module for processing and analysis.
Furthermore, the alarm unit comprises a detection door for alarming according to book signals, and the detection door is connected with the signal transmission module. When the detection door detects that the book signal does not meet the set requirement of the system, the detection door sends an alarm signal; otherwise, the detection door does not give an alarm, and the books can safely pass through the detection door.
Further, the book signals include metal interference signals, magnetic field interference signals, and transmitting coil signals. The metal interference signal means that metal objects are interfered beside the detection door, the magnetic field interference signal means that magnetic books or electromagnetic field interference exists around the detection door, and the transmitting coil signal means that the signal acquisition module is interfered or damaged.
Further, a use method of the library network anti-theft system comprises the following steps:
s1, connecting the signal acquisition module with the data processing module through the signal transmission module;
s2, the book signal is collected by the transmitting coil in the signal collecting module;
s3, when the transmitting coil is at 0 degree, defining receiving signals F3, F4, F5 and F6, assigning values to the receiving signals F3, F4, F5 and F6, and judging F3, F5 and F6 when the value of F4 reaches an alarm set value; when the value of F3 is within the set range, storing; otherwise, rejecting; when the value of F5 is within the set range, storing; otherwise, rejecting; when the value of F6 is within the set range, storing; otherwise, removing: using the stored values as a first set of decision conditions;
when the transmitting coil is at 90 degrees, defining receiving signals F3, F4, F5 and F6, assigning values to the receiving signals F3, F4, F5 and F6, and judging F3, F5 and F6 when the value of F4 reaches an alarm set value; when the value of F3 is within the set range, storing; otherwise, rejecting; when the value of F5 is within the set range, storing; otherwise, rejecting; when the value of F6 is within the set range, storing; otherwise, removing: using the stored values as a second set of decision conditions;
when the transmitting coil is 180 degrees, defining receiving signals F3, F4, F5 and F6, assigning values to the receiving signals F3, F4, F5 and F6, and judging F3, F5 and F6 when the numerical value of F4 reaches an alarm set value; when the value of F3 is within the set range, storing; otherwise, rejecting; when the value of F5 is within the set range, storing; otherwise, rejecting; when the value of F6 is within the set range, storing; otherwise, removing: using the stored values as a third set of decision conditions;
when the transmitting coil is 270 degrees, defining receiving signals F3, F4, F5 and F6, assigning values to the receiving signals F3, F4, F5 and F6, and judging F3, F5 and F6 when the value of F4 reaches an alarm set value; when the value of F3 is within the set range, storing; otherwise, rejecting; when the value of F5 is within the set range, storing; otherwise, rejecting; when the value of F6 is within the set range, storing; otherwise, removing: using the stored numerical value as a fourth group judgment condition;
and S4, synthesizing the first group judgment condition, the second group judgment condition, the third group judgment condition and the fourth group judgment condition, generating an alarm when the four groups of conditions are met, and otherwise, not alarming.
The invention has the beneficial effects that: the book signal is collected through the signal collection module, the book signal is compared and judged with the data stored in the data processing module, and the false alarm phenomenon is avoided through the feedback confirmation of the alarm unit and the background server, so that the problem of poor anti-theft effect of a library is effectively solved, and the safety performance is high.
Drawings
The invention is further illustrated with reference to the following figures and examples.
FIG. 1 is a block diagram of the present invention;
FIG. 2 is a flow chart of a method of use of the library network theft prevention system of the present invention.
Detailed Description
The present invention will now be described in further detail with reference to the accompanying drawings. These drawings are simplified schematic views illustrating only the basic structure of the present invention in a schematic manner, and thus show only the constitution related to the present invention.
As shown in fig. 1, the system for preventing theft of a library network and a method for using the same provided by the invention comprises a signal acquisition module, a signal transmission module, a data processing module, an alarm unit and a background server, wherein the signal acquisition module and the alarm unit are connected with the data processing module through the signal transmission module, and the data processing module is further connected with the background server; the signal acquisition module is used for acquiring book signals, and when the book signals meet the requirements, the book signals are stored in the data processing module; when the book signal does not meet the requirement, an early warning signal is sent to the data processing module, and the data processing module sends an operation instruction to the alarm unit according to the early warning signal; the alarm unit is used for judging whether the early warning signal is established or not, if not, the early warning is released, and if so, the alarm signal is sent out and is synchronized to the background server for confirmation through the data processing module; the background server is used for confirming the alarm or releasing the alarm.
As shown in fig. 1, the signal acquisition module includes a transmitting coil for acquiring book signals, and the transmitting coil is connected with the signal transmission module. The transmitting coil transmits the book signal to the data processing module through the signal transmission module for processing and analysis.
As shown in FIG. 1, the alarm unit comprises a detection gate for alarming according to book signals, and the detection gate is connected with a signal transmission module. When the detection door detects that the book signal does not meet the set requirement of the system, the detection door sends an alarm signal; otherwise, the detection door does not give an alarm, and the books can safely pass through the detection door.
The book signals include metal interference signals, magnetic field interference signals and transmitting coil signals. The metal interference signal means that metal objects are interfered beside the detection door, the magnetic field interference signal means that magnetic books or electromagnetic field interference exists around the detection door, and the transmitting coil signal means that the signal acquisition module is interfered or damaged.
As shown in fig. 2, a method for using the above-mentioned library network anti-theft system includes the following steps:
s1, connecting the signal acquisition module with the data processing module through the signal transmission module;
s2, the book signal is collected by the transmitting coil in the signal collecting module;
s3, when the transmitting coil is at 0 degree, defining receiving signals F3, F4, F5 and F6, assigning values to the receiving signals F3, F4, F5 and F6, and judging F3, F5 and F6 when the value of F4 reaches an alarm set value; when the value of F3 is within the set range, storing; otherwise, rejecting; when the value of F5 is within the set range, storing; otherwise, rejecting; when the value of F6 is within the set range, storing; otherwise, removing: using the stored values as a first set of decision conditions;
when the transmitting coil is at 90 degrees, defining receiving signals F3, F4, F5 and F6, assigning values to the receiving signals F3, F4, F5 and F6, and judging F3, F5 and F6 when the value of F4 reaches an alarm set value; when the value of F3 is within the set range, storing; otherwise, rejecting; when the value of F5 is within the set range, storing; otherwise, rejecting; when the value of F6 is within the set range, storing; otherwise, removing: using the stored values as a second set of decision conditions;
when the transmitting coil is 180 degrees, defining receiving signals F3, F4, F5 and F6, assigning values to the receiving signals F3, F4, F5 and F6, and judging F3, F5 and F6 when the numerical value of F4 reaches an alarm set value; when the value of F3 is within the set range, storing; otherwise, rejecting; when the value of F5 is within the set range, storing; otherwise, rejecting; when the value of F6 is within the set range, storing; otherwise, removing: using the stored values as a third set of decision conditions;
when the transmitting coil is 270 degrees, defining receiving signals F3, F4, F5 and F6, assigning values to the receiving signals F3, F4, F5 and F6, and judging F3, F5 and F6 when the value of F4 reaches an alarm set value; when the value of F3 is within the set range, storing; otherwise, rejecting; when the value of F5 is within the set range, storing; otherwise, rejecting; when the value of F6 is within the set range, storing; otherwise, removing: using the stored numerical value as a fourth group judgment condition;
and S4, synthesizing the first group judgment condition, the second group judgment condition, the third group judgment condition and the fourth group judgment condition, generating an alarm when the four groups of conditions are met, and otherwise, not alarming.
The book signal is collected through the signal collection module, the book signal is compared and judged with the data stored in the data processing module, and the false alarm phenomenon is avoided through the feedback confirmation of the alarm unit and the background server, so that the problem of poor anti-theft effect of a library is effectively solved, and the safety performance is high.
In light of the foregoing description of the preferred embodiment of the present invention, many modifications and variations will be apparent to those skilled in the art without departing from the spirit and scope of the invention. The technical scope of the present invention is not limited to the content of the specification, and must be determined according to the scope of the claims.

Claims (5)

1. The utility model provides a library network anti-theft system which characterized in that: comprises that
The signal acquisition module is used for acquiring book signals;
the signal transmission module is used for transmitting the collected book signals, and the input end of the signal transmission module is connected with the signal collection module;
the data processing module is used for processing and analyzing the book signals and is connected with one end of the output end of the signal transmission module;
the warning unit is used for judging whether the book signal can cause the generation of a warning signal or not, and is connected with the other end of the output end of the signal transmission module;
and the background server is used for confirming the alarm or relieving the alarm and is connected with the data processing module.
2. The network anti-theft system for the library of claim 1, wherein: the signal acquisition module comprises a transmitting coil for acquiring the book signal, and the transmitting coil is connected with the signal transmission module.
3. The network anti-theft system for the library of claim 1, wherein: the alarm unit comprises a detection door for alarming according to the book signal, and the detection door is connected with the signal transmission module.
4. A library network theft prevention system according to any of claims 1 to 3, characterized in that: the book signals comprise metal interference signals, magnetic field interference signals and transmitting coil signals.
5. A method of using the library network theft prevention system of any of claims 1-4, characterized by: the method comprises the following steps:
s1, connecting the signal acquisition module with the data processing module through the signal transmission module;
s2, the book signal is collected by the transmitting coil in the signal collecting module;
s3, when the transmitting coil is at 0 degree, defining receiving signals F3, F4, F5 and F6, assigning values to the receiving signals F3, F4, F5 and F6, and judging F3, F5 and F6 when the value of F4 reaches an alarm set value; when the value of F3 is within the set range, storing; otherwise, rejecting; when the value of F5 is within the set range, storing; otherwise, rejecting; when the value of F6 is within the set range, storing; otherwise, removing: using the stored values as a first set of decision conditions;
when the transmitting coil is at 90 degrees, defining receiving signals F3, F4, F5 and F6, assigning values to the receiving signals F3, F4, F5 and F6, and judging F3, F5 and F6 when the value of F4 reaches an alarm set value; when the value of F3 is within the set range, storing; otherwise, rejecting; when the value of F5 is within the set range, storing; otherwise, rejecting; when the value of F6 is within the set range, storing; otherwise, removing: using the stored values as a second set of decision conditions;
when the transmitting coil is 180 degrees, defining receiving signals F3, F4, F5 and F6, assigning values to the receiving signals F3, F4, F5 and F6, and judging F3, F5 and F6 when the numerical value of F4 reaches an alarm set value; when the value of F3 is within the set range, storing; otherwise, rejecting; when the value of F5 is within the set range, storing; otherwise, rejecting; when the value of F6 is within the set range, storing; otherwise, removing: using the stored values as a third set of decision conditions;
when the transmitting coil is 270 degrees, defining receiving signals F3, F4, F5 and F6, assigning values to the receiving signals F3, F4, F5 and F6, and judging F3, F5 and F6 when the value of F4 reaches an alarm set value; when the value of F3 is within the set range, storing; otherwise, rejecting; when the value of F5 is within the set range, storing; otherwise, rejecting; when the value of F6 is within the set range, storing; otherwise, removing: using the stored numerical value as a fourth group judgment condition;
and S4, synthesizing the first group judgment condition, the second group judgment condition, the third group judgment condition and the fourth group judgment condition, generating an alarm when the four groups of conditions are met, and otherwise, not alarming.
CN201911424680.9A 2019-12-31 2019-12-31 Library network anti-theft system and use method thereof Pending CN110956770A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911424680.9A CN110956770A (en) 2019-12-31 2019-12-31 Library network anti-theft system and use method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911424680.9A CN110956770A (en) 2019-12-31 2019-12-31 Library network anti-theft system and use method thereof

Publications (1)

Publication Number Publication Date
CN110956770A true CN110956770A (en) 2020-04-03

Family

ID=69985399

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911424680.9A Pending CN110956770A (en) 2019-12-31 2019-12-31 Library network anti-theft system and use method thereof

Country Status (1)

Country Link
CN (1) CN110956770A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116303898A (en) * 2023-03-07 2023-06-23 常州机电职业技术学院 Custom semantic rule-based book number comparison method and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116303898A (en) * 2023-03-07 2023-06-23 常州机电职业技术学院 Custom semantic rule-based book number comparison method and system

Similar Documents

Publication Publication Date Title
CN110070155B (en) Comprehensive behavior recognition method and system for prisoner based on wearable equipment
CN116980958B (en) Radio equipment electric fault monitoring method and system based on data identification
CN106597377A (en) Infrasonic wave in-pipe robot quick positioning system and infrasonic wave in-pipe robot quick positioning method
CN104219193A (en) Method and system for correlation analysis of security events
CN110956770A (en) Library network anti-theft system and use method thereof
CN211180987U (en) Library network anti-theft system
CN109019349A (en) fault detection method, detector, computer storage medium and crane
CN111143844B (en) Safety detection method and system for Internet of things equipment and related device
CN110083747B (en) Unmanned aerial vehicle identification method and unmanned aerial vehicle detection equipment
CN110763955A (en) Cable fault detection system and method based on high-voltage pulse signal injection
CN110176121A (en) A kind of method, transmitter, electronic equipment and the medium of fire water monitor fire extinguishing
CN203883934U (en) Intelligent self-help bank video monitoring system
CN104240432A (en) System and method for manganese-rich slag production safety monitoring on basis of information fusion
CN104374885A (en) Explosive gas dangerous sound resource function detection device
CN115167258A (en) Intelligent operation and maintenance management and control system and method for engine
CN104156844A (en) Multi-source data fusion processing system facing kitchen waste supervision, and construction method thereof
CN109803301B (en) Offline identification management system for wireless network
CN205028123U (en) Non -contact intrusion detection system of SCADA system
CN205301940U (en) Automatic checkout device is demolishd to equipment
CN207097145U (en) ATM in bank intelligent monitoring device
CN112800896A (en) Security emergency measure self-response method and system based on knowledge graph
CN212484432U (en) Enterprise potential safety hazard intelligent identification supervision system
CN104239341A (en) Test data processing system and method
CN110837763A (en) Intelligent monitoring recognition alarm system
CN213043469U (en) Transformer substation is with comprehensive intelligent security system of accurate study and judgment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination