Sistema de monitoreo y detección de intrusos al Centro Mesoamericano de Desarrollo Sostenible del Trópico Seco, Sede Regional Chorotega, Campo Universitario de Nicoya
Archivos
Fecha
2010-05
Autores
Reyes Araya, Edgar Alberto
Rodríguez Paniagua, Santiago
Título de la revista
ISSN de la revista
Título del volumen
Editor
Universidad Nacional (Costa Rica)
Resumen
El sistema consiste en un programa de software de vigilancia automatizada para la detección de intrusos que, por medio de tarjetas de interfaz, unidas por cables USB estándar, controlan una serie de sensores de movimiento.
Así mismo, el software le posibilita al usuario final, diseñar un mapa, plano o croquis de la habitación o habitaciones en donde se van a instalar el sistema y los sensores. Esto le permite al personal de seguridad observar, de manera gráfica en una consola, la actividad monitoreada por los sensores y el patrón de movimiento de un eventual intruso para su inmediata detección y su posterior captura.
Al detectarse actividad registrada por alguno de los sensores, se emite una alarma visual y sonora y, a su vez, se activa el módulo de grabación de video y la cámara más cercana a la alarma detectada.
El sistema cuenta con un módulo para consulta de historiales de actividad registrada por todos y cada uno de los sensores, de manera tabular. Además, podrán registrarse y revisarse los informes diarios creados por parte del personal de vigilancia, en respuesta a cada alarma activada.
Existe, también, un módulo de Auditoría y Reportes, que muestra informes estadísticos con la evidencia de las áreas que presentan una mayor ocurrencia de alarmas, lo que, a su vez, permitirá hacer un análisis de las medidas correctivas por tomar; todo esto a partir de las bitácoras existentes.
Como es común y con mucha más razón en un sistema de vigilancia, se cuenta con módulo estándar de usuarios y seguridad para otorgar derechos de acceso a todos los usuarios del sistema, en este caso específico, el personal de seguridad. Uno de los objetivos primordiales de este sistema es la disminución de costos de adquisición, implementación y mantenimiento, en comparación con las alternativas existentes en el mercado. Así mismo, la facilidad de uso y la flexibilidad que permite este sistema, lo convierten en una excelente opción para la vigilancia automatizada.
The system consists of an automated intruder detection surveillance software program that, via interface cards, linked by standard USB cables, controls a series of motion sensors. Likewise, the software enables the end user to design a map, plan or sketch of the room or rooms where the system and sensors are to be installed. This allows security personnel to observe, graphically on a console, the activity monitored by the sensors and the movement pattern of an eventual intruder for immediate detection and subsequent capture. When activity registered by any of the sensors is detected, a visual and audible alarm is emitted and, in turn, the video recording module and the camera closest to the detected alarm are activated. The system has a module for consulting activity histories recorded by each and every one of the sensors, in a tabular manner. In addition, the daily reports created by surveillance personnel, in response to each activated alarm, can be recorded and reviewed. There is also an Audit and Reports module, which shows statistical reports with evidence of the areas that present a higher occurrence of alarms, which, in turn, will allow an analysis of the corrective measures to be taken; all this from the existing logs. As is common and with much more reason in a surveillance system, there is a standard user and security module to grant access rights to all system users, in this specific case, security personnel. One of the main objectives of this system is the reduction of acquisition, implementation and maintenance costs, in comparison with the existing alternatives in the market. Likewise, the ease of use and flexibility that this system allows make it an excellent option for automated surveillance.
The system consists of an automated intruder detection surveillance software program that, via interface cards, linked by standard USB cables, controls a series of motion sensors. Likewise, the software enables the end user to design a map, plan or sketch of the room or rooms where the system and sensors are to be installed. This allows security personnel to observe, graphically on a console, the activity monitored by the sensors and the movement pattern of an eventual intruder for immediate detection and subsequent capture. When activity registered by any of the sensors is detected, a visual and audible alarm is emitted and, in turn, the video recording module and the camera closest to the detected alarm are activated. The system has a module for consulting activity histories recorded by each and every one of the sensors, in a tabular manner. In addition, the daily reports created by surveillance personnel, in response to each activated alarm, can be recorded and reviewed. There is also an Audit and Reports module, which shows statistical reports with evidence of the areas that present a higher occurrence of alarms, which, in turn, will allow an analysis of the corrective measures to be taken; all this from the existing logs. As is common and with much more reason in a surveillance system, there is a standard user and security module to grant access rights to all system users, in this specific case, security personnel. One of the main objectives of this system is the reduction of acquisition, implementation and maintenance costs, in comparison with the existing alternatives in the market. Likewise, the ease of use and flexibility that this system allows make it an excellent option for automated surveillance.
Descripción
Reyes Araya, A. & Rodríguez Paniagua, S. (2010). Sistema de monitoreo y detección de intrusos al Centro Mesoamericano de Desarrollo Sostenible del Trópico Seco, Sede Regional Chorotega, Campo Universitario de Nicoya. [Tesis de Licenciatura]. Universidad Nacional, Heredia, C.R.
Palabras clave
PROGRAMAS COMPUTACIONALES, COMPUTER PROGRAMS, SEGURIDAD (INFORMATICA), AUTOMATIZACION, AUTOMATION