Abstract

This paper describes the development of a new generation of magnetic contact. The development of this new generation of the magnetic contact is a part of the research activity of the security engineering laboratory. The new generation of magnetic contact is based on the Hall-Effect Sensor and microcontroller unit. Older magnetic contacts use a simple reed relay with only two states – normally closed or normally opened. The combination of the Hall-Effect Sensor and microcontroller unit provides advanced possibilities such as a programmable level of magnetic field sensitivity, adding different communication modules, programmable inputs/outputs etc. The results of this paper explain proposal of the new generation of magnetic contact, which can be used not only as a part of intruder alarm systems but also as a part of smart homes and other autonomous systems. The content of the paper can be used for even deeper research and by security systems developers as well.

Highlights

  • Magnetic contacts are one of the basic components of electrical security and distress alarm systems

  • They are very simple detectors of perimeter protection consisting of 2 parts which use magnetic hysteresis which values differ from one manufacturer to another

  • Initial tests of magnetic contacts performed as part of the research and development activities show the actual need for testing magnetic contacts

Read more

Summary

Introduction

Magnetic contacts are one of the basic components of electrical security and distress alarm systems (they are mostly used in securing the object and are only used partially – in the alarm intruder system). They are very simple detectors of perimeter protection consisting of 2 parts (an encapsulated magnet and an encapsulated reed contact) which use magnetic hysteresis which values differ from one manufacturer to another. They are mostly used in securing windows and doors. Standby state is such when the magnetic field of the magnet does not act on the reed contact (figure 1) (Loveček et al, 2015)

Objectives
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.