-
摘要:
为了评估重点区域入侵安防系统设备可靠度,首先给出了重点区域安防系统可靠度的定义,以收集到的安防设备故障信息为基础,对这些数据进行指数分布检验与估计,得出安防设备的故障分布。然后对重点区域中各子区域以及安防系统中各类设备的具体功能进行分析,描述了区域及设备功能间的备份关系以及区域间、区域与设备间的可靠性关系,建立重点区域安防系统、子区域与设备的可靠性框图模型,运用混联可靠性框图计算方法得出重点区域安防系统可靠度。最后进行了实例验证,表明该模型可方便计算重点区域入侵安防系统的可靠度,验证了模型的有效性。
Abstract:In order to evaluate the reliability of a security system in the key area, security system reliability of a key area is defined in this paper firstly. Failure distributions of security devices are acquired after the test and estimation of security devices' failure information by exponential distribution. Besides, the functions of subareas and devices are analyzed, and backup relations and reliability relations among areas, subareas and devices are described. Then reliability block diagram model of security systems, subareas and devices is built and the reliability of security systems in key area is calculated by series-parallel reliability block diagram method. Finally, a practical example is presented to indicate the computational simplicity and verify the efficiency of the model to acquire security system reliability of a key area.
-
表 1 子区域设备汇总表
Table 1. Device summary sheet in a subarea
设备 X1 X2 X3 X4 X5 X6 D1 0 0 0 0 9 0 D2 19 5 8 6 20 47 D3 50 6 0 4 25 74 xi 69 11 8 10 54 121 ri 4 7 2 5 2 1 表 2 设备可靠度的计算结果
Table 2. Calculated results of reliability probability of devices
设备 λi/10-5 Ri(t0) X1 0.6617 0.9437 X2 7.2644 0.5292 X3 2.8538 0.7788 X4 5.7077 0.6065 X5 0.4227 0.9636 X6 0.0943 0.9918 表 3 安防系统中计算的可靠度
Table 3. Reliability of probability calculated in security & protection system
子区域 Ri(t0) R(t0) D1 0.716260698 0.917952193 D2 0.911672797 D3 0.779702799 表 4 调整设备前后可靠度对比
Table 4. Comparison of reliability before and after device adjustment
对比项 优化前 优化后 提升率/% R1(t0) 0.716260698 0.820632001 15 R2(t0) 0.911672797 0.967307231 6.1 R3(t0) 0.779702799 0.907896377 16 R(t0) 0.934434569 0.978155619 4.7 -
[1] 周跃峰, 郭杰荣.安防监控系统技术的发展综述[J].湖南文理学院学报(自然科学版), 2014, 26(2):81-85. http://www.cnki.com.cn/Article/CJFDTOTAL-CDSZ201402020.htmZHOU Y F, GUO J R.Summary of safety surveillance system[J]. Journal of Hunan University of Arts and Science(Natural Science Edition), 2014, 26(2):81-85(in Chinese). http://www.cnki.com.cn/Article/CJFDTOTAL-CDSZ201402020.htm [2] POLLET J, CUMMINS J.All hazards approach for assessing readiness of critical infrastructure[C]//IEEE Conference on Technologies for Homeland Security, 2009.HST'09.Piscataway, NJ:IEEE Press, 2009:366-372. [3] 丁小峰.博物馆安防系统基本组成、设计及应用[J].安防科技, 2009(2):15-18. http://www.cnki.com.cn/Article/CJFDTOTAL-AFKJ200902006.htmDING X F.Basic composition, design and application of museum security system[J]. Security Science & Technology, 2009(2):15-18(in Chinese). http://www.cnki.com.cn/Article/CJFDTOTAL-AFKJ200902006.htm [4] 邢更力, 宋京生.博物馆安防系统维保需求产生和现状研究[J].中国安防, 2011(4):91-94. http://www.cnki.com.cn/Article/CJFDTOTAL-ZGAF201104029.htmXING G L, SONG J S.A research on maintenance requirements and status quo of museum security system[J]. China Security & Protection, 2011(4):91-94(in Chinese). http://www.cnki.com.cn/Article/CJFDTOTAL-ZGAF201104029.htm [5] KOBZA J E, JACOBSON S H.Probability models for access security system architectures[J]. Journal of the Operational Research Society, 1997, 48(3):255-263. doi: 10.1057/palgrave.jors.2600331 [6] CHEN Y.Reliability analysis of a fire alarm system[J]. Procedia Engineering, 2011, 24:731-736. doi: 10.1016/j.proeng.2011.11.2727 [7] 刘燕平.安防系统的可靠性分析计算[J].中国安防, 2008(Z1):32-37. http://www.cnki.com.cn/Article/CJFDTOTAL-ZGAF2008Z1012.htmLIU Y P.Reliability analysis and calculation of security system[J]. China Security & Protection, 2008(Z1):32-37(in Chinese). http://www.cnki.com.cn/Article/CJFDTOTAL-ZGAF2008Z1012.htm [8] 芦杉, 朱彦伟.基于层次分析法的安防监控系统可靠性分析[J].智能建筑与城市信息, 2015(5):62-65. http://www.cnki.com.cn/Article/CJFDTOTAL-GCYZ201505023.htmLU B, ZHU Y W.Reliability analysis of secudty monitoring system based on analytic hierarchy process[J]. Intelligent Building & City Information, 2015(5):62-65(in Chinese). http://www.cnki.com.cn/Article/CJFDTOTAL-GCYZ201505023.htm [9] LV H, HU R.Risk assessment of security systems based on entropy theory and Neyman-Pearson criterion[J]. Reliability Engineering & System Safety, 2015, 142:68-77. [10] 彭喜东.浅谈安防系统的可靠性设计[J].中国安防, 2008(2):25-28. http://www.cnki.com.cn/Article/CJFDTOTAL-ZGAF2008Z1010.htmPENG X D.Introduction to the reliability design of the security system[J]. China Security & Protection, 2008(2):25-28(in Chinese). http://www.cnki.com.cn/Article/CJFDTOTAL-ZGAF2008Z1010.htm [11] SENDI A S, JABBARIFAR M, SHAJARI M, et al.FEMRA:Fuzzy expert model for risk assessment[C]//5th International Conference on Internet Monitoring and Protection.Piscataway, NJ:IEEE Press, 2010:48-53. [12] 郭熹. 基于风险熵模型的安防系统风险与效能评估技术研究[D]. 武汉: 武汉大学, 2011.GUO X.Research on risk and effectiveness evaluation technology on crime prevention system based on risk entropy model[D]. Wuhan:Wuhan University, 2011(in Chinese). [13] LEEMIS L M.Reliability:Probabilistic models and statistical methods[J]. Technometrics, 1995, 54(1):287-288. [14] 赵宇, 杨军, 马小兵.可靠性数据分析教程[M].北京:北京航空航天出版社, 2009:71-73, 131-134.ZHAO Y, YANG J, MA X B.Course of reliability data analysis[M]. Beijing:Beihang University Press, 2009:71-73, 131-134(in Chinese). [15] 陈志诚, 齐欢, 魏军, 等.基于可靠性框图的可靠性建模研究[J].工程设计学报, 2011, 18(6):407-411. http://www.cnki.com.cn/Article/CJFDTOTAL-GCSJ201106005.htmCHEN Z C, QI H, WEI J, et al.A research on reliability modeling based on reliability block diagram[J]. Chinese Journal of Engineering Design, 2011, 18(6):407-411(in Chinese). http://www.cnki.com.cn/Article/CJFDTOTAL-GCSJ201106005.htm