Lecturer(s)
|
-
Adámek Milan, prof. Mgr. Ph.D.
-
Drga Rudolf, Ing. Ph.D.
-
Valouch Jan, Ing. Ph.D.
|
Course content
|
1. Public order, protection of persons and property, protection of soft targets. The position of the army and citizens in the defense of the state. 2. Physical principles of detectors; active and passive detectors, directional and spatial detectors, destructive and non-destructive; antimasking. Electromechanical detectors; electromagnetic induction, piezoelectric effect, electric strain gauge properties; magnetic contacts, piezoelectric and strain gauge detectors 3. Electromagnetic detectors I .; electromagnetic spectrum and characteristics of individual parts of the spectrum, spatial propagation of electromagnetic waves; passive infrared detector and infrared barriers; Electromagnetic detectors II .; Doppler principle, microwave detectors, radio barriers and detectors, capacitive detectors and laser radars 4. Electroacoustic detectors; mechanical vibration, acoustic band division, microphone design, passive and active acoustic detectors, contactless glass break detectors, microphone cables 5. Fire detectors; classification of substances according to flammability, fire classes, automatic and push-button fire detectors, warning systems, notification 6. Detectors of chemical composition of substances; physical and chemical principles of analyzers, properties and construction of detectors; chemfety and pelistors 7. Gas leak detectors, explosives and drug detectors 8. Emergency detectors; principle of emergency detectors, public and special emergency detectors, their use in security technologies, providing emergency information 9. Image recording and processing; principle of analog and digital recording 10. Thermal imaging and night vision, binoculars for day and night vision 11. Cameras, photo traps. Camera design and camera systems. Image processing and recording in connection with protection personal data 12. Safety X-rays; physical nature of X-rays, characteristic and braking radiation, safety constructions X-rays, used X-rays in security technologies 13. Navigation systems - the principle of determining the position, the use of GPS in security technologies 14. Information systems for support of KR, flood protection
|
Learning activities and teaching methods
|
Lecturing
- Preparation for course credit
- 40 hours per semester
- Preparation for examination
- 60 hours per semester
|
prerequisite |
---|
Knowledge |
---|
Electricity and magnetism, electrical circuits |
Electricity and magnetism, electrical circuits |
learning outcomes |
---|
The student will gain a basic overview of the means that are used in security technologies. Orients in the basic physical principles of security detectors. |
The student will gain a basic overview of the means that are used in security technologies. Orients in the basic physical principles of security detectors. |
Students will learn to use electronic security technology to protect of property. Student will be able to link individual elements and systems into a coherent and functional system. Student can explain how the elements and systems work. Student will be able to configure and set the operating mode of each electronic security device. |
Students will learn to use electronic security technology to protect of property. Student will be able to link individual elements and systems into a coherent and functional system. Student can explain how the elements and systems work. Student will be able to configure and set the operating mode of each electronic security device. |
Skills |
---|
1. The student can connect detectors to the control panel. |
1. The student can connect detectors to the control panel. |
2. The student can design the connection of IHAS peripherals. |
2. The student can design the connection of IHAS peripherals. |
3. The student is able to calculate losses per line. |
3. The student is able to calculate losses per line. |
4. The student can set up IHAS communication. |
4. The student can set up IHAS communication. |
5. The student can calculate the detection characteristics of detectors. |
5. The student can calculate the detection characteristics of detectors. |
teaching methods |
---|
Knowledge |
---|
Lecturing |
Lecturing |
assessment methods |
---|
Composite examination (Written part + oral part) |
Composite examination (Written part + oral part) |
Recommended literature
|
-
Lukáš. Bezpečnostní technologie, systémy a management I ? V. Zlín. Zlín, 2015. ISBN 978-80-87500-57-6.
-
Uhlář. Technická ochrana objektů. Praha, 2018. ISBN 8072511726.
|