Utilization of programmable microcontrollers to assess the reliability of alarm systems

A microcontroller could be said to be a miniature computer whose components are integrated into a single case or package, they are often called single-chip microcomputers. These programmable microcontrollers are now part of almost all intelligent devices ranging from toys to medical devices to automotive control systems.Thanks to their simplicity and affordability, they have also found their place in the field of inventors, robot makers or early programmers. Thanks to their simplicity and possibilities they are also widely used among hobby enthusiasts using a raspberry or Arduino.In addition to the commercial and hobbies, programmable microcontrollers can also be used in scientific research. Thanks to their functionality, we have created several testing devices at the Faculty of Security Engineering, the University of Žilina, which can be used to assess the reliability of alarm systems or parts thereof. Among the most important are devices for testing alarm transmission systems, magnetic contacts, and passive infrared detectors. Thanks to these testing devices we have significantly automated the testing process, which is the basis for assessing the reliability of individual alarm systems. In the paper, we will point out the actual connection of testing devices based on programmable microcontrollers and testing possibilities to evaluate the reliability of alarm systems using experimental tests.

[1]  Matej Kucera,et al.  Measurement of Short-Circuit Effects on Transformer Winding with SFRA Method and Impact Test , 2016 .

[2]  Sung Wook Baik,et al.  Raspberry Pi assisted face recognition framework for enhanced law-enforcement services in smart cities , 2017, Future Gener. Comput. Syst..

[3]  Martin Hromada,et al.  Complex approach to assessing resilience of critical infrastructure elements , 2019, Int. J. Crit. Infrastructure Prot..

[4]  Ashok Kumar Das,et al.  Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment , 2020, Comput. Commun..

[5]  Katarina Holla,et al.  Risk Assessment Model Verification in Hazardous Industrial Processes , 2017 .

[6]  Milan Adamek,et al.  Brushless DC motor control on Arduino platform , 2018 .

[7]  Milan Kutaj,et al.  Influence of changing the parameters of the camera system on video-based motion detection , 2017, 2017 International Carnahan Conference on Security Technology (ICCST).

[8]  Jozef Ristvej,et al.  Results of survey among SEVESO establishments in the Slovak Republic , 2016 .

[9]  Lucia Figuli,et al.  Using of Intelligent Transport Systems to Elimination of the Negative Effect on the Transport Security , 2017 .

[12]  Miroslav Gutten,et al.  Analysis of power transformers reliability with regard to the influences of short-circuit currents effects and overcurrents , 2009 .

[13]  Jan Valouch Integration of Alarm Systems , 2012 .

[14]  Patrik Kamencay,et al.  3D image reconstruction from 2D CT slices , 2014, 2014 3DTV-Conference: The True Vision - Capture, Transmission and Display of 3D Video (3DTV-CON).

[15]  Milan Navratil,et al.  Classification of audio sources using neural network applicable in security or military industry , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.

[16]  Cheng Zhang,et al.  An efficient privacy‐enhanced attribute‐based access control mechanism , 2019, Concurr. Comput. Pract. Exp..

[17]  Ivana Klačková,et al.  Expert Technology for Risk Management in the Implementation of QRM in a High-Tech Industrial Enterprise , 2019 .