CN104700544B - A kind of security protection Internet of Things invasion information collecting method and system - Google Patents

A kind of security protection Internet of Things invasion information collecting method and system Download PDF

Info

Publication number
CN104700544B
CN104700544B CN201510132206.4A CN201510132206A CN104700544B CN 104700544 B CN104700544 B CN 104700544B CN 201510132206 A CN201510132206 A CN 201510132206A CN 104700544 B CN104700544 B CN 104700544B
Authority
CN
China
Prior art keywords
signal
invasion
intrusion detection
detection signal
intensity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510132206.4A
Other languages
Chinese (zh)
Other versions
CN104700544A (en
Inventor
张中山
陈朝喜
耿伟彪
张思宇
王兴
张丹丹
徐旭
孙晓辉
庄辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Science and Technology Beijing USTB
Original Assignee
University of Science and Technology Beijing USTB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Science and Technology Beijing USTB filed Critical University of Science and Technology Beijing USTB
Priority to CN201510132206.4A priority Critical patent/CN104700544B/en
Publication of CN104700544A publication Critical patent/CN104700544A/en
Application granted granted Critical
Publication of CN104700544B publication Critical patent/CN104700544B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2491Intrusion detection systems, i.e. where the body of an intruder causes the interference with the electromagnetic field
    • G08B13/2497Intrusion detection systems, i.e. where the body of an intruder causes the interference with the electromagnetic field using transmission lines, e.g. cable

Landscapes

  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)

Abstract

The present invention, which provides a kind of security protection Internet of Things invasion information collecting method and system, methods described, to be included:Intrusion detection signal is generated, in intrusion detection signal described in security protection field emission;Receive and detect intrusion detection signal, when intrusion detection signal produces amplitude modulation(PAM), the first processing is carried out to the intrusion detection signal for producing amplitude modulation(PAM) and obtains invading signal;Invasion signal is demodulated, carrying out second processing to invasion signal obtains invading signal intensity;When invading signal intensity more than invasion signal strength threshold, generation invasion information.By in intrusion detection signal described in security protection field emission, when there is invader, intrusion detection signal produces amplitude modulation(PAM), so as to fast and accurately determine invader, by invasion signal intensity compared with invading signal strength threshold, when invading signal intensity more than invasion signal strength threshold, generation invasion information, so as to effectively avoid reporting by mistake, improves the accuracy of invasion information gathering.

Description

A kind of security protection Internet of Things invasion information collecting method and system
Technical field
The present invention relates to technical field of security and protection, particularly relates to a kind of security protection Internet of Things invasion information collecting method and system.
Background technology
Modern society, science and technology make rapid progress, the extensive use of computer technology and automatic technology, people for The degree of concern of safety-security area gradually is transferred to develop to Modern wireless communication technology from traditional technological means.And the peace of people Full prevention awareness is also increasingly turned to the mode that " people's air defense " and " technical precaution " are combined, the life wealth of such people by artificial safety precaution Production safety has more sound assurance." security protection " has gone through the development history of decades at home, and gradually moves towards one The field of specialty.Its development course can about be divided into following starting stage, developing stage, raising stage, and this stage is The rule of security and guard technology development and the stage in direction are explored, in the last few years, security protection industry has further development again.
Existing safety-protection system, camera generally is installed in security protection region, invasion information is gathered by camera, passed through Manually monitored, this safety-protection system often accurately can not comprehensively find invader when detecting and invading, can not be timely Report invasion information.
The content of the invention
, can the technical problem to be solved in the present invention is to provide a kind of security protection Internet of Things invasion information collecting method and system Improve the accuracy of invasion information gathering.
In order to solve the above technical problems, embodiments of the invention provide a kind of security protection Internet of Things invasion information collecting method, The security protection Internet of Things invasion information collecting method includes:
Intrusion detection signal is generated, in intrusion detection signal described in security protection field emission;
Receive and detect intrusion detection signal, when intrusion detection signal produces amplitude modulation(PAM), to producing amplitude modulation(PAM) Intrusion detection signal carries out the first processing and obtains invading signal;
Invasion signal is demodulated, carrying out second processing to invasion signal obtains invading signal intensity;
By invasion signal intensity compared with invading signal strength threshold, when invasion signal intensity is strong more than invasion signal When spending threshold value, generation invasion information.
Preferably, the generation intrusion detection signal, in intrusion detection signal described in security protection field emission, including:
Three road signals are generated, two-way in the signal of three road is sent to demodulator circuit;
Another way signal in the signal of three road is amplified and filtered, obtains intrusion detection signal;
In intrusion detection signal described in security protection field emission.
Preferably, the intrusion detection signal of described pair of generation amplitude modulation(PAM) carries out the first processing and obtains invasion signal, including:
The intrusion detection signal for producing amplitude modulation(PAM) is carried out signal coupling, frequency selection purposes, first amplification, linear transformation, Automatic gain, amplify again, obtain invading signal.
Preferably, it is described to be demodulated invasion signal, second processing is carried out to invasion signal and obtains invading signal intensity, Including:
Amplification, collection invasion signal intensity are filtered to invasion signal.
Preferably, it is described before intrusion detection signal described in security protection field emission, including:
Intrusion detection signal in part is carried out coupling detection and shows intrusion detection signal intensity;
Intrusion detection signal is adjusted according to the intrusion detection signal intensity of display.
The present invention also provides a kind of security protection Internet of Things invasion information acquisition system, and the security protection Internet of Things invades information gathering System includes:
Detectable signal transmitter module, for generating intrusion detection signal, in intrusion detection signal described in security protection field emission;
Signal receiving module, for receiving and detecting intrusion detection signal, when intrusion detection signal produces amplitude modulation(PAM), The first processing is carried out to the intrusion detection signal for producing amplitude modulation(PAM) to obtain invading signal;
Signal demodulation module, for invasion signal to be demodulated, second processing is carried out to invasion signal and obtains invasion letter Number intensity;
Information generating module is invaded, for compared with invading signal strength threshold, invasion signal intensity to be worked as into invasion When signal intensity is more than invasion signal strength threshold, generation invasion information.
Preferably, the detectable signal transmitter module includes:
Signal generation unit, for generating three road signals, two-way in the signal of three road is sent to demodulator circuit;
First signal processing unit, for another way signal in the signal of three road to be amplified and filter, entered Invade detectable signal;
Signal transmitter unit, in intrusion detection signal described in security protection field emission.
Preferably, the signal receiving module includes:
Secondary signal processing unit, for carrying out signal coupling to the intrusion detection signal for producing amplitude modulation(PAM), frequency is selected Take, amplification for the first time, linear transformation, automatic gain, amplify again, obtain invading signal.
Preferably, signal demodulation module includes:
Signal intensity collecting unit, for being filtered amplification, collection invasion signal intensity to invasion signal.
Preferably, the security protection Internet of Things invasion information acquisition system also includes:
Signal display module, for carrying out coupling detection to part intrusion detection signal and showing that intrusion detection signal is strong Degree;
Signal adjusting module, intrusion detection signal is adjusted for the intrusion detection signal intensity according to display.
The above-mentioned technical proposal of the present invention has the beneficial effect that:
In such scheme, by intrusion detection signal described in security protection field emission, the intrusion detection letter when there is invader Number amplitude modulation(PAM) is produced, so as to fast and accurately determining invader, invasion signal intensity is carried out with invasion signal strength threshold Compare, when invading signal intensity more than invasion signal strength threshold, generation invasion information, so as to effectively avoid reporting by mistake, Improve the accuracy of invasion information gathering.
Brief description of the drawings
The security protection Internet of Things that Fig. 1 is the present invention invades information collecting method flow chart;
The security protection Internet of Things that Fig. 2 is the present invention invades information collecting method signal transacting schematic diagram;
The security protection Internet of Things that Fig. 3 is the present invention invades information acquisition system structure chart.
Embodiment
To make the technical problem to be solved in the present invention, technical scheme and advantage clearer, below in conjunction with accompanying drawing and tool Body embodiment is described in detail.
As shown in figure 1, a kind of security protection Internet of Things invasion information collecting method of the embodiment of the present invention, the security protection Internet of Things Invasion information collecting method includes:
Step 101:Intrusion detection signal is generated, in intrusion detection signal described in security protection field emission.
Wherein, three road signals are generated, two-way in the signal of three road is sent to demodulator circuit;
Another way signal in the signal of three road is amplified and filtered, obtains intrusion detection signal;
In intrusion detection signal described in security protection field emission.
Specifically, crystal oscillator transmission signal, this signal is divided into three tunnels, and two-way is as intrinsic signals for demodulator circuit demodulation invasion Signal.CF signal is wherein used as all the way, by amplifying circuit, CF signal is amplified to enough power, it is then filtered Wave circuit is sent to firing cable.
Step 102:Receive and detect intrusion detection signal, when intrusion detection signal produces amplitude modulation(PAM), to producing width The intrusion detection signal of degree modulation carries out the first processing and obtains invading signal.
Wherein, signal coupling, frequency selection purposes are carried out to the intrusion detection signal for producing amplitude modulation(PAM), are amplified for the first time, linear Conversion, automatic gain, amplify again, obtain invading signal.
Specifically, the electric field energy of transmitting is received cable reception, can shadow when there is invader to pass through covering electromagnetic field components Sound receives cable and receives energy, so as to realize amplitude modulation(PAM).Realize that the modulated signal of amplitude modulation is sent to the receiving portion of sensing layer, First pass around a build-out resistor, the power reflection of anti-stop signal.It is then fed into and to a frequency-selective network, allows the letter of specific frequency Number it is transferred to next stage.Now, the signal after frequency-selecting, by linear transformation, is branched away two paths of signals, so by first amplification Afterwards by automatic gain control circuit, the part, which is realized, when prime signal is smaller is automatically increased reception signal, currently When level reception signal is bigger, the part realizes that reception signal is turned in negative-feedback down automatically.Then all the way by amplifying again It is sent to demodulator circuit, demodulation invasion signal.
Step 103:Invasion signal is demodulated, carrying out second processing to invasion signal obtains invading signal intensity.
Wherein, amplification, collection invasion signal intensity are filtered to invasion signal.
Specifically, in the demodulator circuit demodulation invasion signal of signal processing, invasion signal is passed through LPF electricity Road, amplifying circuit is then fed into, gathers invasion signal intensity for microprocessor afterwards.
Step 104:Will invasion signal intensity with invading signal strength threshold compared with, when invade signal intensity be more than into When invading signal strength threshold, generation invasion information.
Preferably, it is described before intrusion detection signal described in security protection field emission, including:
Intrusion detection signal in part is carried out coupling detection and shows intrusion detection signal intensity;
Intrusion detection signal is adjusted according to the intrusion detection signal intensity of display.
The security protection Internet of Things invasion information collecting method of the embodiment of the present invention, by invading spy described in security protection field emission Signal is surveyed, intrusion detection signal produces amplitude modulation(PAM) when there is invader, and so as to fast and accurately determine invader, invasion is believed Number intensity is compared with invading signal strength threshold, when invading signal intensity and being more than invasion signal strength threshold, generate into Information is invaded, so as to effectively avoid reporting by mistake, improves the accuracy of invasion information gathering.
As shown in Fig. 2 realizing the collection of invasion information in sensing layer, there is the letter of a crystal oscillator transmitting certain frequency before this Number, this signal is divided into three tunnels, and two-way is as intrinsic signals for demodulator circuit demodulation invasion signal.Wherein believe all the way as carrier frequency Number, by amplifying circuit, CF signal is amplified to enough power, then circuit is sent to firing cable after filtering.
Before signal is sent to firing cable, couples a part of power and be sent to detecting circuit, fed back to after detection Microprocessor shows the power for over the display, observing transmission signal by digital-to-analogue conversion, so that regulation transmission signal is so as to more That finishes changing adapts to different electromagnetic environments.
The electric field energy of transmitting is received cable reception, can influence to receive electricity when there is invader to pass through covering electromagnetic field components Cable receives energy, so as to realize amplitude modulation(PAM).
Realize that the modulated signal of amplitude modulation is sent to the receiving portion of sensing layer, first pass around a build-out resistor, prevent letter Number power reflection.It is then fed into a frequency-selective network, allows the signal of specific frequency to be transferred to next stage.Now, frequency-selecting Rear signal by linear transformation, branches away two paths of signals by first amplification, then by automatic gain control circuit, when The part, which is realized, when prime signal is smaller is automatically increased reception signal, should when prime reception signal is bigger Realize that reception signal is turned in negative-feedback down automatically in part.Then demodulator circuit, demodulation invasion letter are sent to by amplification again all the way Number.
Synchronous signal receiving portion feeds back to mainboard by microprocessor analog-to-digital conversion by detection all the way, shows over the display Show the intensity of reception signal.In the demodulator circuit demodulation invasion signal of signal processing, invasion signal is passed through LPF Circuit, amplifying circuit is then fed into, gathers invasion signal intensity, this intensity and sensing layer software design patterns for microprocessor afterwards Threshold value compare, when more than invasion threshold value when microprocessor invasion information is sent to Internet.
As shown in figure 3, the present invention also provides a kind of security protection Internet of Things invasion information acquisition system, the security protection Internet of Things enters Invading information acquisition system includes:
Detectable signal transmitter module 301, for generating intrusion detection signal, believe in intrusion detection described in security protection field emission Number.
Signal receiving module 302, for receiving and detecting intrusion detection signal, when intrusion detection signal produces amplitude modulation(PAM) When, the first processing is carried out to the intrusion detection signal for producing amplitude modulation(PAM) and obtains invading signal.
Signal demodulation module 303, for invasion signal to be demodulated, second processing is carried out to invasion signal and invaded Signal intensity.
Invade information generating module 304, for will invasion signal intensity compared with invading signal strength threshold, when entering When invading signal intensity more than invasion signal strength threshold, generation invasion information.
Preferably, the detectable signal transmitter module includes:
Signal generation unit, for generating three road signals, two-way in the signal of three road is sent to demodulator circuit;
First signal processing unit, for another way signal in the signal of three road to be amplified and filter, entered Invade detectable signal;
Signal transmitter unit, in intrusion detection signal described in security protection field emission.
Preferably, the signal receiving module includes:
Secondary signal processing unit, for carrying out signal coupling to the intrusion detection signal for producing amplitude modulation(PAM), frequency is selected Take, amplification for the first time, linear transformation, automatic gain, amplify again, obtain invading signal.
Preferably, signal demodulation module includes:
Signal intensity collecting unit, for being filtered amplification, collection invasion signal intensity to invasion signal.
Preferably, the security protection Internet of Things invasion information acquisition system also includes:
Signal display module, for carrying out coupling detection to part intrusion detection signal and showing that intrusion detection signal is strong Degree;
Signal adjusting module, intrusion detection signal is adjusted for the intrusion detection signal intensity according to display.
The security protection Internet of Things invasion information acquisition system of the embodiment of the present invention, the method used is invaded for security protection Internet of Things to be believed Acquisition method is ceased, therefore the feature of security protection Internet of Things invasion information acquisition system invades information collecting method phase with security protection Internet of Things Together, will not be repeated here.
Described above is the preferred embodiment of the present invention, it is noted that for those skilled in the art For, on the premise of principle of the present invention is not departed from, some improvements and modifications can also be made, these improvements and modifications It should be regarded as protection scope of the present invention.

Claims (2)

1. a kind of security protection Internet of Things invades information collecting method, it is characterised in that including:
Step 101:Intrusion detection signal is generated, in intrusion detection signal described in security protection field emission;
Wherein, the generation intrusion detection signal, includes in intrusion detection signal described in security protection field emission:
The signal that crystal oscillator is launched is divided into three tunnels;
Wherein two-way is transmitted to demodulator circuit as intrinsic signals, invasion signal is demodulated for demodulator circuit, wherein, the invasion Signal is realized in sensing layer and gathered;
Entered another way as CF signal, the CF signal after amplifying circuit amplification and filter circuit filtering Detectable signal is invaded, the obtained intrusion detection signal is sent into firing cable, believed in intrusion detection described in security protection field emission Number;
Described before intrusion detection signal described in security protection field emission, methods described also includes:
Intrusion detection signal in part is carried out coupling detection and shows intrusion detection signal intensity;
Intrusion detection signal is adjusted according to the intrusion detection signal intensity of display;
Step 102:Receive and detect intrusion detection signal, when intrusion detection signal produces amplitude modulation(PAM), adjusted to producing amplitude The intrusion detection signal of system carries out the first processing and obtains invading signal;
Wherein, it is described when intrusion detection signal produces amplitude modulation(PAM), the is carried out to the intrusion detection signal for producing amplitude modulation(PAM) One processing, which obtains invasion signal, to be included:
When intrusion detection signal produces amplitude modulation(PAM), signal coupling, frequency are carried out to the intrusion detection signal for producing amplitude modulation(PAM) Rate is chosen, first amplification, linear transformation, automatic gain, amplifies again, obtains invasion signal;
Specifically, it is described when intrusion detection signal produces amplitude modulation(PAM), the intrusion detection signal for producing amplitude modulation(PAM) is carried out Signal coupling, frequency selection purposes, first amplification, linear transformation, automatic gain, amplify again, obtaining invasion signal includes:
The electric field energy of transmitting is received cable reception, when there is invader by covering electromagnetic field components can influence to receive cable to connect By energy, so as to realize the amplitude modulation(PAM) of intrusion detection signal;
Realize that the modulated signal of amplitude modulation is sent to the receiving portion of sensing layer, first pass around a build-out resistor and carry out signal coupling Close, the power reflection of anti-stop signal;It is then fed into a frequency-selective network and carries out frequency selection purposes, allows the signal of specific frequency to transmit To next stage;
The signal after frequency-selecting by first amplification, by linear transformation, two paths of signals is branched away, then passes through automatic gain control Circuit processed, the part, which is realized, when prime signal is smaller is automatically increased reception signal, when prime reception signal is bigger When, the part realizes that reception signal is turned in negative-feedback down automatically;Then demodulator circuit is sent to by amplification again all the way, by Demodulator circuit demodulation invasion signal;Step 103:Invasion signal is demodulated, carrying out second processing to invasion signal is entered Invade signal intensity;
Wherein, described to be demodulated invasion signal, obtaining invasion signal intensity to invasion signal progress second processing includes:
Invasion signal is demodulated, amplification, collection invasion signal intensity are filtered to the invasion signal after demodulation;Specifically , it is described to be demodulated invasion signal, amplification, collection invasion signal intensity bag are filtered to the invasion signal after demodulation Include:
In the demodulator circuit demodulation invasion signal of signal processing, the invasion signal after demodulation is passed through low-pass filter circuit, Amplifying circuit is then fed into, gathers invasion signal intensity for microprocessor afterwards;
Step 104:By invasion signal intensity compared with invading signal strength threshold, believe when invasion signal intensity is more than invasion During number intensity threshold, generation invasion information;
Wherein, the signal intensity that will invade is compared with invading signal strength threshold, when invasion signal intensity is more than invasion During signal strength threshold, generation invasion information includes:
By invasion signal intensity compared with the invasion signal strength threshold of sensing layer software design patterns, invasion signal intensity is more than When invading signal strength threshold, invasion information is sent to Internet by microprocessor.
2. a kind of security protection Internet of Things invades information acquisition system, it is characterised in that the security protection Internet of Things invasion information gathering system System includes:
Detectable signal transmitter module, for generating intrusion detection signal, in intrusion detection signal described in security protection field emission;
Signal receiving module, for receiving and detecting intrusion detection signal, when intrusion detection signal produces amplitude modulation(PAM), to production The intrusion detection signal of raw amplitude modulation(PAM) carries out the first processing and obtains invading signal;
Signal demodulation module, for invasion signal to be demodulated, it is strong that invasion signal is obtained to invasion signal progress second processing Degree;
Information generating module is invaded, for signal intensity will to be invaded compared with invading signal strength threshold, when invasion signal When intensity is more than invasion signal strength threshold, generation invasion information;
Wherein, the detectable signal transmitter module includes:
Signal generation unit, for generating three road signals, two-way in the signal of three road is sent to demodulator circuit;
First signal processing unit, for another way signal in the signal of three road to be amplified and filter, obtain invasion and visit Survey signal;
Signal transmitter unit, in intrusion detection signal described in security protection field emission;
Wherein, the signal receiving module includes:
Secondary signal processing unit, for carrying out signal coupling, frequency selection purposes, just to the intrusion detection signal for producing amplitude modulation(PAM) Secondary amplification, linear transformation, automatic gain, amplify again, obtain invading signal;
Wherein, signal demodulation module includes:
Signal intensity collecting unit, for being filtered amplification, collection invasion signal intensity to invasion signal;
Wherein, the security protection Internet of Things invasion information acquisition system also includes:
Signal display module, for carrying out coupling detection to part intrusion detection signal and showing intrusion detection signal intensity;
Signal adjusting module, intrusion detection signal is adjusted for the intrusion detection signal intensity according to display.
CN201510132206.4A 2015-03-24 2015-03-24 A kind of security protection Internet of Things invasion information collecting method and system Expired - Fee Related CN104700544B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510132206.4A CN104700544B (en) 2015-03-24 2015-03-24 A kind of security protection Internet of Things invasion information collecting method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510132206.4A CN104700544B (en) 2015-03-24 2015-03-24 A kind of security protection Internet of Things invasion information collecting method and system

Publications (2)

Publication Number Publication Date
CN104700544A CN104700544A (en) 2015-06-10
CN104700544B true CN104700544B (en) 2017-12-08

Family

ID=53347623

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510132206.4A Expired - Fee Related CN104700544B (en) 2015-03-24 2015-03-24 A kind of security protection Internet of Things invasion information collecting method and system

Country Status (1)

Country Link
CN (1) CN104700544B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107437316B (en) * 2016-05-27 2022-11-08 成都华立安安防科技有限公司 Biological induction windowsill and using method thereof
CN109673084A (en) * 2018-12-29 2019-04-23 桂林凯歌信息科技有限公司 Dynamic and static human body sense light and its control method based on three-dimensional electric field
CN109661085A (en) * 2018-12-29 2019-04-19 桂林凯歌信息科技有限公司 Dynamic and static human body sense light and control method based on induction field

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2099789C1 (en) * 1996-07-30 1997-12-20 Кулагин Николай Павлович Method detecting intrusion of protected space and gear for its realization
CN2927514Y (en) * 2006-04-25 2007-07-25 武建钢 Transmitter and receiver for active infrared detector
CN101165738A (en) * 2006-10-19 2008-04-23 深圳市豪恩科技股份有限公司 Infrared detecting method and method for updating threshold value
CN201025553Y (en) * 2007-01-22 2008-02-20 上海申达自动防范系统工程有限公司 Motive leakage cable intrusion detector
CN103345808B (en) * 2013-06-26 2015-09-09 武汉理工光科股份有限公司 The intrusion model recognition methods of fiber grating circumference and system
CN204044957U (en) * 2014-09-15 2014-12-24 四川为民科技有限公司 A kind ofly can identify the leakage cable intrusion detector that electric pulse disturbs

Also Published As

Publication number Publication date
CN104700544A (en) 2015-06-10

Similar Documents

Publication Publication Date Title
CN104700544B (en) A kind of security protection Internet of Things invasion information collecting method and system
CN101561514B (en) System and method for detecting a buried conductor
CN103869306A (en) Metal and non-linear object composite detector
CN205049754U (en) Compound non -linear node detector of metal
WO2011047379A3 (en) Electromagnetic field detection systems and methods
CN104035079A (en) Novel zero intermediate frequency pulse compression radar system and signal performance compensation method thereof
CN104237954B (en) The foreign matter detecting method and device of radio energy transmission system
CN101877160B (en) Leakage cable intrusion detector system
CN106441504A (en) Linear frequency modulation continuous wave radar water level telemeasuring device and method
US8249516B2 (en) Apparatus for automatically separating and detecting noise radio waves
CN203825190U (en) Near-field electromagnetic ranging device
JP5328976B2 (en) Intruder identification device
CN105116455A (en) Detector for composite metals and non-linear nodes
KR20200045249A (en) Demodulation circuit and wireless power transmission device having the same
CN102508301B (en) Metal detector
CN204215053U (en) A kind of pre-embedded pipe detector
CN103701434B (en) A kind of frequency modulation device for LWD resistivity log and method
CN103696766B (en) The measurement apparatus of a kind of resistivity logging while drilling and measuring method thereof
CN207601330U (en) A kind of Portable pipeline survey meter
KR102193234B1 (en) Device for increasing the detection distance of ultrasonic sensors of vehicle and method thereof
CN106949958B (en) A kind of acoustic signals detection method based on Liu-cos chaos system
CN206056611U (en) Phase sensitive OTDR phase demodulating systems
CN102110339B (en) Microwave perturbation detector
CN104821070B (en) A kind of security protection monitoring and managing method and system based on multi-protocols heterogeneous network
CN203054240U (en) Detecting instrument for detecting and positioning of leaky cable

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20171208

Termination date: 20210324

CF01 Termination of patent right due to non-payment of annual fee