Security System Design and Implementation at Nuclear Power Plants

With the rapid development of science and technology, people's concept of life and work environment has been from the simple requirements of the initial to focus on human needs, such as safe, comfortable and convenient smart communities, where safety is the primary goal.

Given the special nature of nuclear power plants, the safety of nuclear power plants is particularly important. In addition to man-made security precautions, the implementation of intelligent community security requires a complete set of security systems. The security system is a technical prevention system established for the purpose of ensuring security, and is a technically and comprehensively integrated system. Designed to many aspects. Security system is an organic combination of physical prevention, technical prevention and personnel management. It is a systematic project.

The security system integration platform can be simply understood as the centralized control and management of various subsystems on the same platform. The integration is based on the information changes generated by the various subsystems, so that each subsystem can make corresponding coordination actions to achieve the exchange of information. , sharing and processing.

Nowadays, people are no longer satisfied with the establishment of an independent video surveillance system. Instead, they need to integrate the three systems of the video surveillance system, access control system, and alarm system to make full use of 1+1+1>3 to truly realize the security of the security system. ,Integrated. Therefore, building an open security system integration platform has become a trend.

Application status of security systems in nuclear power plants The application of security systems in nuclear power plants is not truly centralized and intelligent.

The following functions can be achieved:

● Through wireless transmission to the monitoring center, the operator can operate the keyboard and mouse, and can achieve up and down, left and right of the PTZ, distance of the lens, automatic long and short focal lengths, aperture size operation, and comprehensive monitoring of the site and personnel. .

● The monitoring center can implement arbitrary switching, timing switching, sequence switching and control of front-end equipment.

● The monitoring center is equipped with a digital hard disk recorder to realize the need for long-term video surveillance images.

● In the multi-point monitoring, wireless digital microwaves can be used in the following illustration.

However, no matter how perfect this system is, it is only an independent network monitoring and security system, and it does not achieve integration and diversification on the security system.

Then build a security integration platform is the future development trend.

Characteristics of nuclear power plant security systems Nuclear power plants generally occupy a large area and have a large number of staff, and there are many areas where key defenses and key precautions are needed between departments. Many people need to standardize production and strictly implement work processes. And the power system equipment is expensive. Once it is damaged or lost, it will cause immeasurable losses to the company. To prevent staff from doing business according to the process and reduce the occurrence of dangerous accidents and theft, a complete security platform is indispensable.

At present, the application of security systems in nuclear power plants mostly follows the following design principles and components.

Nuclear Power Plant Security System Setup Principles ● Establish different protection levels according to the objects to be protected.

● The system is advanced, reliable, applicable, and cost-effective ● The system is open and compatible, and the system is upgraded and transformed quickly and easily. ● The combination of comprehensive protection and local in-depth protection. ● Follows the relevant national security regulations and technical standards of the intelligent community. ● People-oriented, Make the object to be protected in the invisible prevention network, reflecting safety and comfort.

Nuclear power plant security system components The current nuclear power plant security system must have the following major parts: integrated platform, video surveillance system, perimeter guard system, entrance and exit control system, traffic control system, and electronic patrol system. The system design should be based on scale, The level of prevention, construction investment, etc. determine the architecture and configuration of each system.

Video Surveillance System The nuclear power plant's video surveillance system uses the latest third-generation technology: network video surveillance system.

The network video surveillance system consists of a front-end subsystem, a transmission subsystem, a management control subsystem, a display subsystem, and a storage subsystem. The network video surveillance system utilizes the advantages of IP digital monitoring system for easy transmission, control and storage. It is based on the network and uses digital video compression, transmission, storage and playback as the core to realize the entire process from image acquisition, transmission, video recording and final output. Automation.

The network video surveillance system is divided into a monitoring access layer and a bearer switching layer according to the control management.

Monitoring access layer: The front-end monitoring media terminal is responsible for converting and encoding the analog images transmitted from the front-end matrix into IP data streams and transmitting them to the management center through the network.

Bearer switching layer: The IP bearer network adopts the open TCP/IP protocol and uses the multicast/unicast protocol to transmit different data streams to actual destination addresses. At the same time, through the video/control gateway, the control signals and code streams of the original monitoring systems (including matrix, optical transceivers, DVRs, and network monitoring systems) are converted into standard IP signals and processed by the control management layer.

Control management layer: The network video surveillance system uses a signaling control and code stream exchange separation system, and the control management team is mainly responsible for the signaling control of the entire system. The control management layer is the core component of the network intelligent control system. All the devices in the system are controlled and managed to achieve mutual communication and management. The main control management device is a video management server and a data management server.

Video application layer: The video application layer is mainly responsible for viewing the surveillance image in real time by the video client and playing back the historical data. At the same time, the network video surveillance system can provide corresponding API interfaces and provide third parties to do deep-level application development.

Perimeter protection system detects external intrusions with the vibration cable detection method at the perimeter of the nuclear power plant, and combines the sound and light alarm with the camera system of the lighting system. The perimeter guards against intrusion detectors. The site is deployed on the basis of the survey site environment. The perimeter is fully protected. There is no blind area and dead zone. The division of defense zone is suitable for accurate positioning during the alarm. The alarm center can control the recovery of the status of the front-end equipment. The alarm center records the alarm status and alarm time.

The perimeter protection system consists of front-end equipment, transmission equipment and central equipment. The front-end equipment includes alarm detectors, alarm processors, etc.; transmission equipment includes alarm buses, optical transceivers, etc.; central equipment includes alarm host, management terminal, and control keyboard.

Enclosure Alarm System The alarm detector is mounted on a wire fence or fence to detect intruders climbing, cutting, or otherwise infesting the fence. The alarm processing unit is connected to the alarm detector and analyzes and processes the sensor signal from the alarm detector and transmits the alarm signal, the fault signal and the tamper signal to the central control room. When the cable is impacted or moved mechanically by the outside, the electric load generated in the cable is converted into an alarm signal, and the intrusion behavior of cutting, climbing and lifting the fence is discriminated in real time.

The digital signal processor in the alarm processing unit constantly checks all sensor signals according to specific evaluation criteria to eliminate false alarms and suppress wind effects. Use multiple filters to work together to filter out environmental events such as road, rail traffic, rain, snow, hail, lightning, and earthquakes.

Entrance and exit control system entrance and exit control system is mainly composed of reading part, transmission part, management/control part and execution part and corresponding system software. The equipment mainly includes management terminal, network transceiver, card reader, channel access controller, electromagnetic switch. , door locks (gates), exit switches, management software and other components.

Reading part of the reading part can acquire the operation and key information and identify the target by reading the field device. It should be able to pass the information to the management and control that can accept the instructions of the management and control part.

The indicators such as "false positive rate" and "reading response time" met the management requirements. The reading device has corresponding sound or light prompts for various operations of the reading device and instructions received by the management/control portion. The reading device should be easy to operate and reliable in reading information.

The management/control part of the system has an authorization function for the key, so that different levels of the target have different access permissions for each entrance.

It can manage the authorization, login, and exchange of system operation (management) personnel, and set operation authority, so that different levels of operation (management) personnel have different operating capabilities for the system.

The system can store the records of access events, operation events, and alarm events in the relevant carriers of the system and can form reports for review.

Event records include time, goal, location, and behavior.

The event management carrier of the central management host shall be capable of storing at least 180 days of event records, and the stored records shall maintain the latest recorded values.

Authorized operations (management) can retrieve, display, and/or print event records that are within the scope of authorization and stored in system-related carrier information, and can generate reports.

The entrance and exit control system linked with the network video monitoring system can play back the video image associated with the entrance and exit while inquiring the event.

When the closing part or the blocking part of the execution part is closed at the entrance and exit and refuses to release, the performance indicators such as the locking force and the blocking range meet the use and management requirements.

Access permission devices use sound, light, text, graphics, object displacement and other instructions. It permits and rejects the two states to be easily distinguishable.

When the entrance and exit are opened, the time limit for the entry and exit of the target shall meet the requirements for use and management.

The traffic control system consists of a front-end intersection control section, a network transmission section, and a central management section. The front-end intersection control part includes the network camera, the signal lamp detection host, the ground sense coil, the industrial control machine, etc.; The network transmission part includes the network camera, the optical end machine and so on; The center management part includes the management terminal, the network exchange, the management software and so on.

The intersection control section of the front end mainly completes tasks such as traffic light detection, illegal red light detection, picture capture, and flash control. According to actual requirements, one set is installed in each direction where the intersection needs to be detected. Devices in each direction are independent of each other. IPCs are connected via network switches.

When the IPC receives a snapshot signal from the detection master, the IPC immediately sends an instruction to notify the data code camera to take a picture and store the captured JPEG image in the hard disk of the IPC. The picture can be clearly identified. Time, number plate number, vehicle type, red signal, and the situation where the vehicle crossed the parking line.

The speed measurement function is to embed two coils in front and behind each lane. The speed of the vehicle passing through the coil can be calculated according to the time when the vehicle is measured. The speed value is measured by the master controller and sent to the industrial computer. The traffic volume data can be obtained by counting the number of vehicles passing through a certain direction of each lane (coil) within a certain period of time.

The electronic patrol system consists of an IC card, a card reader, a management terminal, and patrol management software.

A patrol card reader is installed on a pre-designed patrol route. The patrol duty officer holds the patrol IC card. When the card reaches the designated location, the card reader at that point swipes the card. Then the patrol system automatically records the IC card. The information, the date of arrival, and the time of arrival can also record patrol status. Subsequently, as long as the patrol data is transmitted to the patrol management terminal, the patrol personnel can be accurately informed of the detailed information of each location.

Implementation functions A dedicated numbering and naming patrol station is set up at each important position in the nuclear power plant area. Multiple patrol routes are set according to the system capacity, and the automatic guidance function can display the next stop. The patrol route is a patrol station that is arranged in order, correctly records expected and actual patrol data, and outputs the report.

Realizing the real-time monitoring of the situation of each person can be divided into periods, sub-levels, and sub-area management, with time-out, illegal intrusion alarm function, with setting functions for monitoring time and alarm time. Stores, outputs, and prints information such as system parameters, employee profiles, and patrol point data. Allows the user to set the time limit between patrol stations and records and displays the early checks that occurred. If the patrol personnel do not sign up at the time, the central computer will remind the duty officer to understand the situation.

The security integration platform still has difficulties in the application of nuclear power plants. At present, there are still some immature factors in the construction of the security integration platform. The inconsistency of standards is the greatest confusion, including the lack of an agreed standard for the development of equipment interfaces and security integration platforms. This restricts the development of the security integration platform to some extent.

The technical foundation for building a security integration platform is digitalization, networking, and standardization. The digital security integration platform should include the following elements:

● Guarantees the independence of each application subsystem's work ● It has hardware and software interfaces for connecting various devices ● It can quickly realize personalized linkage programming as required ● It can collect security information and organize the formation of reasonable plans ● Easily realize the linkage between various subsystem devices The practical significance of the open security integration platform is a platform. The security technology components it carries can be a variety of security applications. System developers can more focus on meeting customer needs, and put these common underlying technologies from the system integration platform. To realize, the system integration platform itself follows the principle of openness and can be continuously improved and developed.

In addition, the security system subsystem network video surveillance system relies on the network and is restricted by the network bandwidth. External network users cannot access the best video stream of the front-end equipment. In China, the bandwidth of the front-end equipment has to be affected. The rate is so low that the remote viewing of video streams cannot be optimal. If, to ensure adequate network bandwidth, network cost costs must be considered.

Security System Application Trends at Nuclear Power Stations With the development of computer technology, network technology, and information technology, security systems will develop in the direction of digitization, integration, and localization. System equipment will develop in the direction of intelligence, digitization, modularization and networking. At the same time, with the development of wireless technology, precise positioning technology, digital data services, electronic data exchange, identification technology, etc., it will be widely used in security systems, such as vibration cable detection technology applied to the perimeter protection system, can be accurate Located within 1M, its self-learning function will not cause false alarms due to noise, wind, snow, rain, and small animals. The integrated security system will provide safer and more humanized equipment for nuclear power plants, bringing greater convenience to daily life and management.

PVC Welded Wire Mesh

Pvc Welded Wire Mesh,Hot-Dipped Galvanized Welded Wire,Pvc Coated Wire Mesh,Pvc Coated Welded Wire Mesh

Shenzhou City Hongda Hardware Products Co.,Ltd , https://www.hdpvcwire.com