Guzairov M.B., Shangareev R.Z. Manual TSO - Fire and security alarm system - file n1.doc. Security and fire alarms: the concept and its tasks Security and fire alarm systems laboratory work

List of terms. 3

Introduction. 6

1. General provisions. 8

2. Description of the object. nine

3. Study of the subject area. ten

3.1 Features of the organization of the security of the office space. ten

3.2 Review and analysis of notification systems. eleven

3.3 Review and analysis of equipment used for the protection of premises. fifteen

4. Development of a security alarm system. 28

5. Economic part. 29

5.1 Calculation of the cost of equipment and construction and installation works performed during the design of the facility security system. 29

5.2 Calculation of the cost of commissioning works performed during the design of the facility security system. 32

5.3 Calculation of economic efficiency from the introduction of security alarms. 35

6. Labor protection. 38

6.1 Safety and industrial sanitation. 38

6.1.1 Radiation. 38

6.1.2 Electric current. 39

6.1.3 Static electricity. 40

6.1.4 Noise.. 41

6.1.5 Industrial lighting. 42

6.1.6 Meteorological conditions. 44

6.1.7 Organization and equipment of workplaces. 46

6.2 Fire safety. 48

Conclusion. fifty

List of used sources. 51

The objects and premises in which large material values ​​are located include: department stores, shopping centers and other objects of trade, bases, warehouses, industrial enterprises.

"Other" objects and premises include objects in which the following material assets are located: technological and household equipment, technical and design documentation, inventory, foodstuffs, semi-finished products, etc.

Office space refers to “other” facilities and premises.

Protection of an office space involves the protection of various types of documentation that may constitute a trade secret, protection of working equipment, application software installed on computers, protection of the company's material assets and personal belongings of the personnel working on it. The office space does not apply to residential, warehouse or industrial buildings, does not contain large valuables in the form of precious metals, antiquities, a large number funds, weapons, ammunition and drugs are not stored in the building.

The characteristic features of the office premises that affect the security structure are:

the same mode of operation of individual departments;

small protected area.

All of the above factors determine the specifics of protecting office space from intruders.

In addition to independent borders signaling rig pout traps internal doors of the object and places of possible passage and the appearance of pr with upniks.

About important premises equipped multifaceted security and alarm systems.

3.2 Overview and analysis of notification systems

AT modern systems control and management of means of security fire alarm is carried out with the help of advanced computer technologies using software and hardware of the central security post.

Manual notification systems

Designed for the implementation of centralized protection of telephonized objects using existing telephone lines as information channels (with switching them to the period of protection).

Subscriber telephone lines are used as information transmission channels in the "protected object - PBX" section, interstation dedicated two-wire lines are used in the "PBX-PCO" or "ATS1-ATSp" section.

The principle of operation of non-automated SPI is based on the control of the control current in the subscriber telephone line of the protected object, the necessary values ​​​​of which are set by selecting the resistance of the resistor of the terminal device (OU).

The OU is installed at a protected facility and is also designed to separate the paths of telephone communication and signaling (using a diode and an OU switch).

The repeater (R) is installed at the ATS cross-country and is designed to separate the telephone communication and signaling paths (directly to the ATS), receive signals from the OS of protected objects (by controlling the magnitude of the remote current) and broadcast to the centralized monitoring console (CMS) via a two-wire dedicated line. When the object is armed, the repeater changes the polarity in the ATL to the opposite.

The monitoring station is installed at the centralized security point (CSC) and is designed for remote control of repeater devices, switching telephone lines, monitoring the status of communication lines (R-monitoring station), receiving and converting incoming information from protected objects about the alarm status and displaying it on the scoreboard. The connection of the repeater with the control panel is carried out via a two-wire line, and the transmission of information from protected objects is carried out using a temporary method of signal separation.

Automated notification systems.

In automated STS, busy PBX lines are used as communication channels (sometimes with the additional use of a radio channel), and in separate transmission sections (PBX-PCO) - specially laid 2-wire leased lines. Systems of this type include "Vega", "Kometa", "Cyclone", which are currently physically and morally obsolete and are not produced by industry.

The most widely implemented on the territory of the Republic is the automated security alarm system (ASOS) "Alesya", designed to ensure the protection of objects of various forms of ownership, apartments of citizens, cars Vehicle, as well as to obtain information about the whereabouts of police cars for the purpose of their operational management. The process of taking (disarming) an object for protection, managing orders, monitoring the state of objects, monitoring the technical condition of signaling means is fully automated. All data is processed by the hardware and software complex "Alesya" in real time.

The main technical data of ASOS "Alesya":

1. The number of automated workstations of the operator on duty (AWS DO) - consoles installed in the ARC - up to 10.

2. The number of repeaters (PC, not lower than AT-286) on the PBX, connected to one remote control workstation DO - from 1 to 4.

3. The total number of repeaters served by one monitoring station is up to 15.

4. The number of independent guarded zones serviced by one AWP DO remote control is up to 1000.

5. The number of ATLs served by one repeater - from 200 to 2000.

6. The number of consoles AWS DO, serviced by one repeater - from 1 to 4.

7. The method of information exchange between the object and the repeater over busy ATL - amplitude modulation (AM) 18 kHz.

8. The method of information exchange between the repeater and the AWP remote control - modem V42 bis, V22.

9. Time of arming the object (with acknowledgment from AWS TO) - no more than 40 s.

10. The number of loops connected to the OS PPKOP-8 is up to 8.

11. The number of loops connected to the OS "Alarm-3" - up to 2.

12. The number of loops connected to the OS "Alarm-2 (2M)", the control unit "Alarm", the control panel "Alarm-4" - up to 4 loops.

ASOS "Alesya" allows you to create systems of various configurations - from the minimum, designed for 200 on-site devices, to the maximum, up to 10,000 on-site devices. The minimum economically justified option is 1000 objects.

The principle of operation of the system is as follows:

object devices accumulate information about the state of the signaling of protected objects and transmit it to the repeater installed on the automatic telephone exchange, according to the busy ATL;

the repeater processes the incoming information, controls the signaling state of objects and subscriber lines connected through the direction switches, and also generates messages for transmission to the AWP DO;

AWS DO (console) processes messages, classifying them by types ("Arm", "Disarm", "Protection", "Fault", "Accident", "Call", "Power", "Alarm");

ARM GZ processes messages about the penetration of an object received via a radio channel to a patrol car from the monitoring station, stores a file of objects with technical and graphic characteristics, and also constantly emits a radio signal with an individual code of the car embedded in the radio transmitter.

ASOS "Alesya" can be docked with the system of radio security of cars - the complex of operational search and detention "Korz", manufactured by the Brest Electromechanical Plant. This allows, at insignificant additional costs, to create a network of radio points around the city and solve the following tasks:

control and operational management of ATS units;

operational notification of the theft of vehicles, continuous monitoring of the electronic map of the city of the path of its movement and detention;

control of the route of vehicles of special services (cash collection, motorcades, ambulance, fire brigade, etc.).

3.3 Review and analysis of equipment used for the protection of premises

Reception and control devices (PKP) in security and fire alarm systems are an intermediate link between the facility's primary means of intrusion detection and notification transmission systems. In addition, the control panels can be used in stand-alone operation mode with the connection of sound and light annunciators at the protected facility.

The control panel performs the following main functions:

receiving and processing signals from detectors;

power supply of detectors (via AL or via a separate line);

AL state control;

transmission of signals to the monitoring station;

control of sound and light alarms;

ensuring procedures for taking under protection and removing the object from protection;

control of the arrival of the detention group, electrician of the OPS.

The main characteristics of the control panel are the information capacity and

informative. Control panels of small information capacity are intended, as a rule, to organize the protection of one room or a small object. PKP medium and large capacity can be used to combine the signaling of a large number of premises or security lines of one object (hubs), as well as consoles for autonomous systems for protecting objects.

According to the method of organizing communication with detectors, control panels are divided into wired and wireless (radio channel). According to the climatic version, control panels are produced for heated and unheated premises.

A generalized block diagram of the control panel with external circuits connected to it is shown in Figure 3.1

The basic element of any alarm system is the alarm loop (AL), which is an electrical circuit connecting the output circuits of the detectors, containing auxiliary (remote) elements (diodes, capacitors, resistors), connecting wires and intended for transmission to the control panel of signals about intrusion (fire), attempted intrusion.

Figure 1.4 - Generalized block diagram of the control panel with external circuits connected to it.

1 – alarm loop; 2 - remote element; 3 - detector; 4 - receiving and control device; 5 - switching unit; 6 - node for monitoring the status of signaling loops; 7 - memory node; 8 - signal processing unit; 9 - node of the signal (console) relay; 10 - device object system transmission of notices, or another control panel; 11 – sound annunciator control unit; 12 - sound annunciator; 13 – light annunciator control unit; 14 - light annunciator; 15 - display unit; 16 - remote display board; 17 - power supply; 18 – detector power supply unit; 19 - backup power source.

The arming of any loop is preceded by the preparation of the premises protected by it. It consists in closing all building structures, which must be closed, removal of all people from protected premises, etc. If the equipment is in good working order, all preparatory actions have been carried out completely and correctly by the control panel in the "arm it" state. The transition of the control panel to the standby mode ("normal" mode) is characterized by the activation of the corresponding alarm relay. The light alarm is on all the time, the sound alarm is off.

When any detector in the loop is triggered, the corresponding signal arrives at the zone control unit, which analyzes the duration of the received signal. After passing through the loop state control node, the signal enters the memory node (where it is stored) and the signal processing node. The latter puts the control panel into the "alarm" mode, when the alarm relay is switched on, the light signaling device switches to intermittent operation mode, and the sound signaling device switches on for a certain time.

In centralized protection systems, alarm relays are connected to the terminal devices of notification transmission systems, with the help of which information is transmitted to the ARC.

After the end of the guard time, the object is disarmed. In this case, the control panel is disabled from monitoring the state of the corresponding loop.

Arming and disarming is carried out either using the keypad or using access keys.

The control panel monitors the status of connected sensors (normal/alarm). If the system is armed and one of the connected sensors enters the "alarm" mode, the control panel will activate the connected alarm devices according to the specified algorithm.

Modern control panels allow connected sensors to be programmatically combined into zones. Below are the main types of protected areas:

Entrance exit zone. This zone includes security sensors located on the way of entering and exiting the premises. The control panel will activate alarm devices based on signals from sensors in this zone only after a time delay, which is necessary to arm or disarm the alarm system.

Passage zone. It also generates an alarm signal after a time delay. This zone includes sensors located along the way of movement of the owner of the protected premises to the control panel (keyboard). The alarm delay occurs only if the order of received signals from security sensors corresponds to the specified one. For example, the 1st signal is from the door sensor, the 2nd from the sensor in the hallway, the 3rd from the sensor in the corridor where the keyboard is installed. If the sensor in the corridor is triggered earlier than the door opening sensor, then the signaling devices are activated immediately.

Instant zone. When the control panel receives a signal from the sensors in this area, the signaling devices are triggered immediately.

24-hour round-the-clock zone. If the alarm control panel receives an alarm signal from a sensor in this zone, the alarm devices will be activated immediately, regardless of whether the alarm is armed or not. As a rule, this zone includes the so-called panic button used to call the response services.

Tamper zone. This zone does not include sensors, but their special contacts - tampers. An alarm signal is generated when an attempt is made to dismantle or open the sensor. Tamper contacts can also be connected from keypads, sirens and any other devices of the security alarm system.

Typically, security systems allow you to arm a room separately by zones, which can be very convenient.

The main technical characteristics of this equipment are given in Table 3.1

Table 3.1 – Key technical characteristics of the control panel

Point security detectors.

Point security detectors are designed to block vulnerable surfaces (doors, windows, hatches, etc.) for opening. Their main characteristic is the opening of the loop when the protected controlled surfaces are opened. In addition, the detectors can be used as sensors for blocking portable objects (museum exhibits and high personal computers, etc.), as well as alarms in case of a robbery (alarming buttons, pedals IO-102, etc.). According to the principle of operation, these detectors are divided into electrocontact and magnetic contact.

Electrocontact detector - security detector, signaling penetration (attempt of penetration) when the distance between its constructive electrical elements. Such detectors include limit switches of the VK, VPK, etc. types, which are used to block massive structures (garage and wagon type gates). The value of the voltage switched by their contacts reaches 380-500 V. There are pairs of both opening and closing contacts. These detectors are obsolete. The exceptions are panic buttons and electrocontact tamper switches ("tampers"), which block the housings of various technical means alarms to prevent their unauthorized opening, as well as removal from installation sites without the knowledge of the relevant authorities. As a rule, "tampers" are connected to separate round-the-clock alarm loops, which are constantly monitored by the control panel, regardless of its operating mode. "Tampers" are designed for voltage up to 30 V direct current.

Magnetic contact point detectors are more widely used. Magnetic contact detector - a security detector that signals when an attempt is made to penetrate with a normalized change in the magnetic field created by its element. It consists of two main nodes

sensor - a sealed contact in a glass container, from which air is pumped out, in a plastic or aluminum case (reed switch) a permanent magnet with or without a case.

The main technical characteristics of this equipment are given in Table 3.2

Table 3.2 - Main technical characteristics of point security detectors

Parameter SMK-1 SMK-2.3 MPS 10 MPS 20 MPS 45 MPS 50 VPK 4000
Max. U on RK, V 60 60 30 30 30 30 500
Max. I through ZK, A 0,1 0,1 0,3 0,3 0,3 0,3 15
Gap on the deputy., mm 8 6 18 25 18 50 3-5

Dimensional gap,

30 25 31 43 31 81 25
Wear resistance of contacts, cycle 105 2*106 5*106 3*107 3*106 3*106 3*106
6. Working t. °C -40 +50 -40 +50 -40 +60 -40 +60 -40. +60 -40 +60 -40 +50
7. Housing Plast. Plast. Plast. Plast. Plast. Alumin. Metal.

Acoustic glass break detectors.

Designed for non-contact control of the integrity of the glass sheet and determination of its destruction based on the analysis of acoustic pas in the sound range. These detectors are only security and are designed for continuous, round-the-clock operation in enclosed spaces. Glass breakage can be detected using various physical methods. As is known, when glass breaks, vibrations of different frequencies occur. At the first moment, the glass is deformed upon impact, this deformation (bending) of the glass causes the appearance of acoustic vibrations of low frequencies (LF). When the amount of deformation reaches a certain size, mechanical destruction of the glass occurs, causing the appearance of acoustic vibrations of high frequencies (HF). Moreover, to detect the fact of glass breaking, one must also take into account the fact that these sound vibrations follow in a certain time interval.

An analysis of the sound spectra of acoustic signals that occur when breaking glass, hitting wood, and metal shows that the highest signal level when breaking glass occurs at a frequency of about 5 kHz, while the peak of all other signals falls at frequencies much lower than this.

Based on this pattern, the simplest acoustic glass break detectors have been developed using analog processing of acoustic signals.

The principle of operation of these detectors is based on the fact that the acoustic signals that occur in the protected area are converted by the detector microphone into electrical signals and fed to the signal processing circuit, the band-pass filter of which passes only signals in the frequency range close to 5 kHz. After the filter, the signal passes through a number of circuit converters and enters the threshold element of the signal analyzer, where it is compared with a fixed threshold level, which is set when setting up the detector. Thus, in case of violation of signals with a frequency of about 5 kHz and with an amplitude (intensity) exceeding the set threshold, the detector issues an "Alarm" signal by switching the contacts of the output relay with the corresponding light indication.

The disadvantage of this processing principle sound signals is low selectivity. The noise immunity and sensitivity of these detectors are inversely dependent quantities. They are inferior in terms of noise immunity to detectors with digital signal processing. At the same time, these detectors also have certain advantages: for them there is no concept of a "minimum size" of blockable glass.

The main technical characteristics of this equipment are given in Table 3.3


Table 3.3 - Main technical characteristics of acoustic glass break detectors

parameter Harp FG730 FG930 GLASS TREK GLASS TECH GBD-2 DG-50
Supply voltage, V 9,5-16 10-14 10-14 9-16 9-16 9-16 9-16
Consumed current, mA 20 25 30 17 20 24 15

Max. current through

closed

relay contacts, mA

500 500 500 100 100 100 100

Max. voltage on

open relay contacts, V

72 30 30 28 24 24 24
Working t,°C +10 +40 0+49 0+49 -2 +50 -10+50 -10 +60 -10 +50
Range, m 6 9 9 9(4,5) 10(7) 10 10(3,6)

Diagram

direction, °

120 360 360 360 170 360 70
Mindistance to blocked glass, m - - - 1 1,2 - 1,5

controlled

glass, mm

2,5-8 2,4-6,4 2,4-6,4 2,4-6,4 3,2-6,4 2and> 2.4-6,4

Min. the size

controlled

glass, cm

S=0.2mm2 40(one side) 28x28 28x28 41x61 30x30 Not Not
Possibility of control of the glasses covered with a film + + + - + - -
Number of analyzed parameters 3 3 3 5 16 4 2
Number of microphones 1 1 2 1 1 1 1
Microphone overload protection + - + - - - -
Signal processing method Digital analog analog

Volume detectors.

The main characteristic of volumetric detectors is the reproduction of an alarm signal when an intruder moves in the detection zone. They are used to protect the internal volumes of protected objects (premises), as well as the ways of approaching a concentrated place for storing valuables. This group includes ultrasonic (US), radio wave, passive optical-electronic (infrared) (PIK), combined (combined) (IR + RV, IR + US) detectors.

Ultrasonic and radio wave detectors are active, that is, they themselves generate signals of a certain frequency radiated into the protected area.

Passive optical-electronic detectors control thermal (infrared) radiation emanating from the surfaces of objects located in the detection zone.

Ultrasonic detectors.

Ultrasonic detectors are designed to protect the volumes of enclosed spaces and generate an intrusion notification when the field of elastic waves of the ultrasonic range is disturbed, caused by the movement) of the intruder in the detection zone. The detection zone of the detector has the shape of an ellipsoid of rotation or drop-shaped.

The principle of their operation of such detectors is based on the Doppler effect, which consists in the fact that the frequency of the signal reflected from a moving object will differ from the frequency of the signal reflected from an object that is stationary relative to the detector by a Doppler shift value (from 0 to 200 Hz), which depends on the radial velocity object (intruder) in relation to the radiation source (detector).

The transformation of electrical oscillations into traveling wave oscillations radiated into the protected space is carried out using piezoceramic transducers - emitters. The reverse transformation of the traveling wave oscillations into an electrical signal is carried out using piezoramic transducers - receivers, completely identical in design to the emitters.

Passive optical-electronic detectors.

Passive optoelectronic detectors, also known as passive infrared (PIR) detectors, are the most popular class of motion detection devices in a controlled area. This is due, on the one hand, to the rather high efficiency of motion detection, and on the other hand, to the low cost of these devices. The effectiveness of intrusion detection in a protected area is determined primarily by the fact that passive optical-electronic detectors allow you to control the entire volume of the room. Thus, the problem of intrusion registration is solved in almost any way of penetration: through a window, doors, by breaking the floor, ceiling, wall. Obviously, this is much more effective than blocking only the perimeter of the room (windows, doors, and similar structural elements of the object), although, of course, it does not exclude such blocking as the first line of protection, which in some cases allows you to receive an alarm signal, and therefore respond , before. Controlling the volume of the entire room is not the only task solved by PIR detectors. Using interchangeable optical systems, it is possible to effectively control a narrow strip (eg a corridor) or create a horizontal curtain (eg to control rooms where dogs are).

When choosing one or another detector for installation at the facility, it is necessary to take into account possible interference in the protected room, its size and configuration, and the degree of importance.

Radiation lighting fixtures, vehicles, sunlight can also cause false alarms of detectors, because the signals caused by this radiation are commensurate with the thermal radiation of a person. In order to exclude the effect of thermal interference, it is only possible to recommend isolating the detection zone of the detector from the effects of vehicle lighting devices and direct sunlight.

The real signal differs from the ideal one due to the distortions introduced by the signal processing path and the superimposition of chaotic noise created by background temperature changes.

The signal amplitude is determined by the temperature contrast of the human body surface and the background and can range from fractions of a degree to tens of degrees. At a background temperature close to human temperature, the signal at the output of the pyroelectric element will be minimal.

The background component of the signal is a superposition of interference from a number of sources:

interference from exposure to solar radiation, which leads to a local increase in the temperature of individual sections of the wall or floor of the room. In this case, the gradual change does not pass through the filtering circuits of the detector, however, relatively sharp fluctuations, due, for example, to the shading of the sun by passing clouds, fluctuating tree crowns, passing vehicles, etc., cause interference similar to a human signal.

The main technical characteristics of this equipment are given in Table 3.4

Table 3.4 - Main technical characteristics of passive optoelectronic detectors

detector

Detection zone U pet., V Reg. feelings. Reg. range

Anti-sabotage output

Working t,°C
Corridor Curtain wide angle
1 4 5 6 7 8 10 11 12 13
WPC

Ceiling mounted, 360 viewing angle, radius

action 5m at installation height

8,2 - 16

Depends on

height(n)

110V 500mA 110V 500mA -20. +60
MH-CRT - 12 * 1.2m - 8,2-16 Pot. - 24V 500mA - 20 +60
MN-10 ASM 30*3m 15*2m 15*18m 8,2-16 Potent., Jumper from h installation 110V 500mA 110V 500mA -20 +60
MH-20N 30*3m 15*2m 17*18m 8,2-16 Potent., Jumper Otp installation floor pl. 28V 100mA -20 +60
SRP-360

Ceiling, viewing angle 360. radius

action 4.8m at installation height

7,8-16 - From h set. 28V 100mA 28V 100mA -20 +60
XJ-413T - - 13 x 13m 10-14 jumper From h set. 0 +49
INS 106 - 12*1.2m - 8-14 V Jumper From h set. 24V 100mA 24V 100mA -10 +40
INS 103 - - 18*18 8-14 V Jumper From h set. 24V 100mA 24V 100mA -10 +50
BRAVO2 22*2m 13*1m 13 x 13m 9,5-14,5 Jumper From h set. 24V 100mA -10 +50
CLIP CLIP-4 3.6*1m 10-16 Switch 3 position From h set. 24V 100mA 24V 100mA -10. . +50
DISC

Ceiling, viewing angle 180.

range 5.4 m at height

installation 3.6 m.

9-16 2 position From h set. 24V 500mA -10. +49

4. Development of a security alarm system

Based on the data given in Table 3.1, as well as taking into account the characteristics and area of ​​the object, it is most advantageous to build the system being developed on the basis of the Alarm 5 control panel. The number of alarm loops used provides the reserve required by SNB 2.02.05-04.

The device is designed to monitor the state of security detectors and, in case of their operation, generates an alarm signal. The control panel has outputs for connecting light and sound annunciators. In addition, the control panel provides automatic switching to backup power(batteries) in case of loss of the main power supply (220V) and indication of malfunctions, if any (low voltage on the batteries, breakage of the alarm device, etc.).

Based on the data given in tables 3.2-3.4, and also taking into account the characteristics of the protected premises, it is most advantageous to build the developed system using the following as security detectors:

For blocking front door and the rear door must be used for opening - magnetic contact detector MPS-20 and curtain IR detector INS 106.

The volume of office space, utility room, hall is controlled by INS 103 IR detectors.

Window blocking - for breaking is carried out by an acoustic detector FG-730, for opening - by a magnetic contact detector MPS-20.

To signal unauthorized entry, an external light and sound signaling device SOA-4p is used.

Include tamper contacts (tampers) of IR detectors and light and sound devices into the tamper circuit of the control panel.

5. Economic part

5.1 Calculation of the cost of equipment and construction and installation works performed during the design of the facility security system

Based on the project of the security alarm system, an estimate is drawn up. The estimate is a calculation of the costs of installation and commissioning of the designed system, i.e. its cost. Labor costs are taken into account in pricing using a number of norms and standards used in the development of estimates. These include estimated consumption rates for materials, structures, parts and equipment, labor costs, market prices for materials, overhead rates, planned savings, etc. Accounting and reporting are carried out on the basis of the estimated cost.

In this section, the calculation of installation and commissioning of the security alarm system at the object "office premises" is carried out.

Calculation of the cost of installation and adjustment works in construction is carried out according to resource estimates, section 8 “Electrical installations”, section 10 “Communication equipment”.

The collection contains norms and prices for electrical work in the construction of new, expansion, reconstruction and technical re-equipment of existing enterprises, buildings and structures.

The rates and prices take into account the costs of performing a full range of electrical work, determined in accordance with the requirements of the "Electrical Installation Rules" (PUE), SNiP 3.05.06-85, relevant technical conditions and instructions, including the costs of:

a) movement of electrical equipment and material resources from the on-site warehouse to the place of work:

horizontal - at a distance of up to 1000 m;

vertical - to the distance indicated in the introductory instructions to the sections of the Collection;

b) connection of cores of cables, wires, tires and grounding conductors;

c) painting of tires (except for heavy ones), open bus ducts, trolleys, pipelines and structures;

d) determining the possibility of switching on electrical equipment without revision and drying;

e) work with harmful working conditions (gas welding and electric welding; fastening of structures and parts using a mounting gun; painting work using asphalt, Kuzbass and oven varnishes in enclosed spaces using nitro-paints and varnishes containing benzene, toluene, complex alcohols and others harmful chemical substances, as well as the preparation of compositions from these paints; lead-to-lead soldering; soldering of lead-coated cables and pouring cable sleeves with lead);

f) duty during individual testing of electrical equipment.

g) punching holes with a diameter of less than 30 mm that cannot be taken into account when developing drawings and which cannot be provided for in building structures according to the conditions of their manufacturing technology (holes in walls, partitions and ceilings only for installing dowels, studs and pins of various supporting structures ).

Rates and rates do not include:

a) the costs given in the introductory instructions to the sections of the Compendium;

b) the cost of the material resources given in the introductory instructions to the sections;

The calculation of installation work is carried out in accordance with the collections of resource estimates approved by order of the Ministry of Construction and Architecture of November 12, 2007 No. 364 (RSN 8.03.402-2007, RSN 8.03.210-2007, RSN 8.03. 208. -2007, RSN 8.03.146-2007 , RSN 8.03.211-2007), instructions for determining the estimated cost of construction and drawing up cost estimates approved by the Decree of the Ministry of Construction and Architecture 03.12. 2007 No. 25.

In accordance with these documents, we calculate construction and installation works using the following changes:

1. Overhead costs are determined in the amount of 55 percent of - the sum of the estimated values ​​of the main wages workers and wages of machinists as part of the cost of operating machines and mechanisms.

When determining the estimated cost for the installation and adjustment of security equipment and systems, exclude the calculation of the amount of excess income over expenses.

2. The costs associated with deductions for social insurance are determined in the amount of 35% of the sum of the estimated values ​​of the basic wages of workers and the wages of machinists as part of the costs of operating machines and mechanisms.

3. The cost of bonuses for production results are determined in the amount of 30% of the sum of the estimated values ​​of the basic wages of workers and the wages of machinists as part of the costs of operating machines and mechanisms and 4.9% of the estimated overhead costs using a coefficient of 1.35, taking into account deductions for social insurance.

4. The costs associated with an increase in the tariff rate when transferring to a contractual form of employment are determined in the amount of 15% of the estimated basic wages of workers and the wages of machinists as part of the costs of operating machines and mechanisms using a coefficient of 1.35, taking into account social insurance contributions.

5. The costs associated with length of service and additional holidays for continuous work experience is determined in the amount of 14% of the sum of the estimated values ​​of the basic wages of workers and the wages of machinists as part of the costs of operating machines and mechanisms using a coefficient of 1.35, taking into account social insurance contributions .

6. The costs associated with a small amount of work performed are determined from the sum of the estimated values ​​of the basic wages of workers and the wages of machinists as part of the costs of operating machines and mechanisms using a coefficient of 1.35, taking into account social insurance contributions in the amount of:

29.3% with an estimated cost of the object up to 5 million rubles;

11.72% - with an estimated cost of the object from 5 to 10 million rubles;

7. The wage fund is determined by: (3 / PL main + 3 / PL machinists + HP x 0.4868 + (BONUS for production results + LENGTH OF SERVICE AND ADDITIONAL VACATION + CONTRACT SURPRISE + ADDITIONAL COSTS FOR SMALL VOLUME) / 1, 35) * INDEX change. cost.

8. Deductions for compulsory insurance against accidents at work, occupational diseases are carried out in the amount established by the Belarusian Republican Unitary Insurance Enterprise "Belgosstrakh".

When determining the cost of transport costs in current prices, it is necessary to apply the cost change indices for freight transportation by car republican message.

The cost of construction and installation works of the security alarm system, taking into account taxes and deductions, is 4395233 rubles (Four million three hundred ninety-five thousand two hundred thirty-three rubles).

Estimated calculation of the cost of construction and installation works is given in Appendix D to the graduation project.

5.2 Calculation of the cost of commissioning works performed during the design of the facility security system

When drawing up documentation for commissioning, it is necessary to be guided by Collection 2 "Automated Control Systems" (RSN 8.03.402-2007) of resource estimates for commissioning and instructions for determining cost estimates for the cost of commissioning and compiling cost estimates approved by the Decree of the Ministry of Construction and Architecture dated 03.10. 2007 No. 26

When determining the cost of commissioning in current prices, the cost change index for commissioning is applied.

The prices of this Collection are developed for systems, depending on the category of their technical complexity, characterized by structure and composition, taking into account the complexity factor.

In case if, a complex system contains in its composition systems (subsystems), according to the structure and composition of their components, related to different categories of technical complexity, the complexity coefficient of such a system is calculated according to the following method:

1. The total number of information and control channels, analog and discrete (Ko6sch) in this system is determined

Ktotal = K1 total + K2 total + K3 total

where: K1 general, K2 general, K3 general - the total number of analog and discrete channels of information and control, related to subsystems, respectively, I, II, III category of technical complexity.

The channel for generating input and output signals should be understood as a set of technical means and communication lines that provide the transformation, processing and transmission of information for use in the system:

control channel of the 2nd category of complexity - a receiving and control device, including a keyboard (access device), a radio channel system receiver for manual alarms, a radio channel system receiver for wireless detectors, an "Alarm-GSM" interface module;

information channel of the 1st category. complexity - a connection block with a connecting line;

analog information channel of the 1st category of complexity - an alarm loop, including detectors, connecting devices, splitter boxes, terminal devices;

analogue control channel of the 1st category of complexity - a set of technical means between the control panel and the light and sound annunciator (LSS);

information discrete channel of the 1st category of complexity - wireless detectors and transmitters of the radio channel manual alarm system.

2. The coefficient of complexity (C) is calculated for a system that includes subsystems with different categories of technical complexity according to the formula:

C = (1 + 0.353 * K2 total / K total) * (1 + 0.731 * K3 total / K total)

In this graduation project, the Alarm-5 control panel is considered with the number of loops involved - 6. The total number of channels is 9 (K total), of which:

information channel of the 1st category of complexity - 1 (connection unit with a connecting line);

analog control channel of the 1st category of complexity - 1 (SZU);

analog information channel of the 1st category of complexity - 6 (alarm loops with detectors).

C \u003d (1 + 0.353 * K2 total / K total) \u003d 1.05

The resulting coefficient is used in the calculation of commissioning.

The cost of commissioning of the security alarm system, including taxes and deductions, is 686,786 rubles (Six hundred and eighty-six thousand seven hundred and eighty-six rubles).

Estimated calculation of the cost of commissioning is given in Appendix D to the graduation project.

Table 5.1 shows the costs associated with the purchase of equipment and materials, installation and commissioning. Estimated calculation of the cost of these costs is given in the appendices.

Table 5.1 - Costs for designing, purchasing equipment and materials, and performing work on a fire alarm system.

The cost of the security alarm system, including taxes and deductions, is 5,082,019 rubles.

5.3 Calculation of economic efficiency from the introduction of intruder alarms

Conducting a feasibility study requires the selection and calculation of the resulting economic indicators, allowing to give comprehensive assessment new technology. Consideration of these indicators should be preceded by the formulation of the basic concepts of the theory of economic efficiency. Such fundamental concepts are the concepts of effect and efficiency.

In a broad sense, the effect is the result, the consequence of any specific actions, causes, forces. In relation to the economic justification, the effect should be understood as the cumulative results obtained from the implementation of certain scientific, technical or organizational and economic solutions.

The following types of effect are distinguished: scientific (cognitive), technical, organizational, defense, environmental, economic, social and political.

The types of the resulting effect depend on the goals and nature of the created object. Each type of effect has its own characteristics and requires its own methods of quantitative assessment. In practice, one type of effect acts as the main one, the rest - as additional ones.

The economic effect is characterized by cost savings of living and materialized labor in social production, expressed in terms of value, which is a consequence of scientific, technical and organizational solutions.

The second most important element is economic efficiency, which is understood as the result of a quantitative comparison of the economic effect E with the costs necessary to achieve this effect, i.e.

E = E/K (5.1)

Economic efficiency reflects the ratio of final economic results (economic effect) and costs (capital investments) that caused this effect, i.e. shows the value of the economic effect per 1 rub. costs.

In the case of the development and implementation of means and systems of protection, economic efficiency will be taken as a ratio possible losses in the event of theft of various types of documentation that may constitute a trade secret, working equipment, application software installed on computers, material assets of the office space and personal belongings of the personnel working on it, to the costs of designing and implementing security alarms.

In our case, the office will have valuables worth approximately 15 million rubles.

E \u003d E / K \u003d 15,000,000 / 5,082,019 \u003d 2.9

A certain economic efficiency obtained due to the prevention of damage from the introduction of a security alarm, equal to 2.9, shows that 1 rub. spent on the installation of a security alarm saves 2.9 rubles, which indicates the feasibility of introducing a security alarm.

6. Labor protection

6.1 Safety and industrial sanitation

This section deals with issues of labor protection at the workplace of the designer. The work is done using a monitor and other special equipment. This kind of use of technology raises the problem of improving and optimizing working conditions due to the formation of a number of unfavorable factors: high labor intensity, monotony, specific conditions for visual work, limitation of motor activity, the presence of electromagnetic radiation, electrostatic fields, the possibility of damage electric shock.

6.1.1 Radiation

Operating monitors are a source of electromagnetic, X-ray and ultraviolet radiation.

The impact of electromagnetic fields on a person depends on the intensity of electric and magnetic fields, energy flow, frequency of electromagnetic oscillations, the size of the irradiated body surface and individual characteristics of the organism.

The most effective and commonly used method of protecting monitors from electromagnetic radiation is to install screens. In this case, the radiation source is shielded with an absorbing screen.

To ensure the safety of work with sources electromagnetic waves systematic monitoring of the actual values ​​of normalized parameters at the workplace is carried out.

When the video display terminal is operating, the levels of intensity, magnetic flux density of the electromagnetic field, electrostatic field strength should not exceed the allowable values ​​given in Table 6.1 at a distance of 50 cm from the screen, right, left and back surfaces of the video when adult users work with it.

Table 6.1 - Permissible values ​​of the parameters of non-ionizing electromagnetic radiation

Permissible levels of intensity (power flux density) of electromagnetic fields emitted by the keyboard, system unit, mouse, wireless systems for transmitting information at a distance, depending on the main operating frequency of the product, should not exceed the values ​​given in table 6.2.

Table 6.2 - Permissible levels of electromagnetic fields

Frequency range 0.3-300 kHz 0.3-3.0 MHz 3.0-30.0 MHz 30.0-300MHz 0.3-300 GHz
Permissible levels 25.0 W/m 15.0 W/m 10.0 W/m 3.0 W/m 10 µW/cm2

Permissible levels of electric field strength of industrial frequency current 50 Hz, created by the monitor, system unit, keyboard, product as a whole should not exceed 0.5 kV/m.

6.1.2 Electrical current

Electrical installations pose a great potential danger to humans. A person begins to feel the effects of alternating current 0.5-1.5 mA with a frequency of 50 Hz and 5-7 mA DC. When exposed to such a current, heating of the area in contact with the current-carrying part is felt. An increase in the passing current causes muscle cramps and painful sensations in a person, which increase with increasing current and spread to larger and larger areas of the body. So, at currents of 10-15 mA, the pain becomes very strong, and the convulsions are significant. With an increase in current to 30 mA, the muscles may lose their ability to contract, and with a current of 50-60 mA, paralysis of the respiratory organs occurs, and then the work of the heart is disrupted. A current of 100 mA or more is considered fatal.

The protected premises refers to premises without an increased risk of electric shock.

The electrical safety of workers is ensured by the design of electrical installations; technical abilities and means of protection, organizational means of protection. The following technical methods and means of protection against electric shock are provided (according to the PUE):

ensuring the inaccessibility of live parts under voltage for accidental contact;

electrical separation of the network;

elimination of the danger of damage when voltage appears on cases, casings and other parts of electrical equipment, which is achieved by the use of low voltages, the use of double insulation, means and safety devices, potential equalization, protective earth etc.

6.1.3 Static electricity

Discharge currents of static electricity can be generated by touching any of the equipment. Such discharges do not pose a danger to humans, but apart from discomfort they can cause damage or malfunction of the equipment. To eliminate static electricity charges, it is achieved by grounding electrically conductive parts of the equipment. To ground non-metallic objects, they are pre-applied with an electrically conductive coating (conductive enamel). This kind of grounding is combined with the protective grounding of electrical equipment.

6.1.4 Noise

The main sources of noise in rooms equipped with computers, printers, and in the computers themselves are cooling system fans and transformers. For this type of work activity for a typical workplace, the noise standard belongs to the 1st category. The noise level in such rooms sometimes reaches 80 dBA.

Noise classification, characteristics and acceptable levels noise at workplaces is established by SN9-86 RB 98 "Noise at workplaces. Maximum permissible levels", table 6.3.

Table 6.3 - Maximum permissible sound pressure levels, sound levels and equivalent sound levels.

To reduce noise, the printers are installed on special shock-absorbing pads. Additional sound absorption are: the use of doors with upholstery made of noise-absorbing material, the use of double-glazed windows in order to reduce noise from the street

6.1.5 Industrial lighting

An important place in the complex of measures for labor protection and improvement of the working conditions of the designer is the creation of an optimal light environment, i.e. rational organization of natural and artificial lighting of premises and workplaces. In the daytime, natural one-sided lighting is used in the room, in the evening and at night or in case of insufficient illumination standards, artificial general uniform lighting is used.

Luminaires are cleaned as they become dirty, but at least once a month.

According to SNB 2.04.05-98, premises for working with displays and video terminals can be classified as B-1 visual work (high accuracy). The normalized level of illumination for working with displays is 300 lx (see table 6.4)

Table 6.4 - Parameters of natural and artificial lighting of rooms for working with displays

For artificial lighting of the room, fluorescent lamps of white (LB) and dark white (LTB) with a power of 80 W are used.

Calculation of artificial lighting.

The calculation is made by using the luminous flux utilization factor. This method is most applicable for calculating the overall uniform illumination of a room. The calculation takes into account

direct light from the lamp, and reflected from the walls and ceiling.

The luminous flux from one lamp is determined by the formula:

F=ESKz/ηn (6.1)

where E - illumination, lx

S - area of ​​the illuminated room, m2

K - coefficient of uneven illumination

z - coefficient of illumination unevenness

n is the required number of lamps.

Geometrical parameters of the calculated room:

width - a = 5 m

length - b = 10 m

height - H = 3.5 m

The area of ​​the illuminated room S = ab = 5-10 = 50 m2

Selected rectangular way placement of lamps. We determine the ratio of the distance between the lamps L to the height of their suspension Hc. Depending on the type of luminaire, this L/Hc ratio can be taken as 1.4-2.0. L/Hc = 1.4 is accepted. The height of the luminaire above the illuminated surface:

Hc = H-hc-hp(6.2)

Where H is the total height of the room, m

hc - height from the ceiling to the bottom of the luminaire, m

hc - height from the floor to the illuminated surface, m

H = 3.5 m, hc = 0.2 m, hp = 0.75 m.

Hc \u003d 3.5-0.2-0.75 \u003d 2.55 m.

L \u003d 1.4 Ns \u003d 1.4-2.55 \u003d 3.47 m

Required number of fixtures

We accept n = 6

The room indicator is determined by the formula

I \u003d a * b / Hc (a + b) \u003d 1.31

Based on the found indicator of the room, we determine the coefficient of use of the luminous flux lighting installation:

at i = 1.31, η = 0.42

The coefficient of uneven illumination z is the ratio of the average illumination Eav to the minimum Emin. Its value depends on the ratio L/Hc, location and type of luminaire, z = 1.2

Safety factor K, taking into account the decrease in illumination during the operation of the lighting installation K = 1.5.

Illumination E is determined depending on the type of lamp and type of lighting, as well as on the category of visual work E = 150 lux.

Based on the obtained initial data, the luminous flux from each lamp is determined according to (4.1):

According to the found value of the luminous flux, the power of the lamps is determined. When working with shiny surfaces in general lighting installations, fluorescent fluorescent lamps should be used, so the LD85 lamp is selected. Its parameters are given in Table 6.5.

Parameters of LD85 daylight fluorescent lamp

Power, W 85
Mains voltage, V 220
Luminous flux, Lm 4700
Luminous efficiency, Lm/W 60

6.1.6 Meteorological conditions

In order to ensure comfortable conditions for maintenance personnel and the reliability of the technological process, according to SanPin 9-80RB 98, the following requirements for microclimatic conditions are established (see Table 6.6). The same table shows the optimal and actual values.

Table 6.6.

Microclimatic conditions

The room provides for regulation of the supply of coolant to comply with the regulatory parameters of the microclimate. Registers made of pipes were installed as heating devices in rooms with computers and storage media.

To ensure the established microclimatic standards.

parameters and air purity, ventilation is used, i.e. removal of polluted or air and supply of fresh air into the room:

with a cubic capacity of the premises up to 20 m3 per employee - at least 30 m3 / h per person;

Air exchange at natural ventilation It occurs due to the difference in temperature between the indoor and outdoor air, as well as as a result of the action of the wind. The air entering the room through supply ventilation, cleaned of dust and microorganisms. During operation of the exhaust system fresh air enters the room through leaks in the building envelope. The dust content of the air does not exceed 0.75 mg/m3 with a dust particle size of 3 microns.

Air conditioning provides automatic maintenance of microclimate parameters within the required limits during all seasons of the year, air purification from dust and harmful substances, creation of a slight overpressure in clean rooms to exclude uncleaned air. The temperature of the air supplied to the room with a computer is not lower than 19 °C.

6.1.7 Organization and equipment of workplaces

As a desktop for office employees, tables were selected that meet the following requirements)