Assignment 2
Assignment 2
Assignment 2
The system includes a chilled water pump which circulates the chilled water
through the chillers evaporator section and through the cooling coils of the
AHUs.
Condenser Water System
refrigeration system must also reject the heat that it removes.
2) water cooled
Parts:
a) Condenser
b) Compressor
c) Propellor fans &
d) Controls
These are the most common system used in residential and light commercial
applications. Water cooled units absorb the heat from the indoor space and
rejects that heat to water which in turn may either reject heat via fluid coolers
or cooling towers, or dry air coolers with adiabatic kits.
o most common
The system works well and maintains comfortable conditions in spaces with
uniform heating and cooling requirements.
The primary benefit of VAV over constant volume systems (CV) is its ability
to simultaneously provide the required level of cooling to any number of
zones within a building.
Chiller/pumps sequencing.
Facility manager for Chillers to view the data remotely and in graphical
format
chilled water is often used to cool a building's air and equipment, especially
in situations where many individual rooms must be controlled separately,
such as a hotel.
There are 3 primary pumps, two working & one stand by on a common pipe
line, Any pump should be workable with any chiller,
There are motorized isolating valves which should be activated across the
working chiller.
primary should should be started & then command should be given to the
motorized isolating valve to open.
After open position of the valve is identified, then the command to start
the chiller will be issued,
chiller must have a water flow switch which will finally determine to allow
the chiller to run or not.
plant manager is planned for the chillers & will be integrated with BMS to
monitor the chiller parameters.
the above data log will be used for BTU meter to be installed in return
water header after the de-coupler line from the chiller.
controls temperature,
controls humidity,
b) Co2 sensors,
b) Co2 sensors
A carbon dioxide sensor or CO2 sensor is an instrument for the
measurement of carbon dioxide gas. The most common principles for CO2
sensors are infrared gas sensors (NDIR) and chemical gas sensors.
Measuring carbon dioxide is important in monitoring indoor air quality and
many industrial processes.
Applications
Excellent performance CO2 Sensor, for use in a wide range of applications,
including air quality monitoring, smoke alarms, mine and tunnel warning
systems, greenhouses, etc.
The sensor is easy to use and can be easily incorporated in a small portable
unit.
Features
High Sensitivity
Detection Range: 0 - 10,000 ppm CO2
Response Time: <60s
Heater Voltage: 6.0V
Dimensions: 16mm Diameter, 15mm High excluding pins, Pins - 6mm High
APPLICATIONS
Monitoring air filters and ventilators
overpressure, relative
Kind of pressure
CE0085AR0013 according EC
Gas Appliance Directive
Certificates
EU/2009/142/EG and DIN EN
1854
BTU Metering
Air conditioner capacity is measured by "BTU". BTU stands for British Thermal
Units.
Consists of
Heat Integrators
M BUS O/P
A F P
Access control Fence Physical
B Future Fibre security
Boundaries of Technologies R
Security G Restricted-
Report Glass break access barrier
C detector system
Chicane H Rope line
Crowd control Home safety S
barrier I Safety barrier
E Iron railing T
Electric fence M Temporary
Electric gates Mantrap fencing
(access W
control) Wattle
(construction)
The relay in panel which is usually in normal open ( NO) becomes normally
closed (NC) & thus boom barrier opens & allows the vehicle.
Main Benefits :
Single-user, un-manned automatic access control,
gates , barriers & traffic lights can also be linked to integrated security
systems & remote CCTV systems.
How it works
1,Circuit complete
Pulsed voltage comes out from the energizer,to the fence wire,then goes through
the human body,to the ground,at last goes back to the energizer.
2,Factors affect the shock:Time of shock,Voltage,Current
Specification
Differential voltage output technology: every wire has
voltage, and differential voltage between the two adjacent
wires.
LCD or LED indicate the working state and the voltage on
every wire.
High/low voltage switch manually, long-distance auto switch
on/off.
Short circuit, break and tamper alarm, Self-inspection
System for equipment fault.
Waterproof casing and downward appearance design.
RS 485 bus control, keypad, computer, network and multiple
long distance management solution.
DC12V, NC/NO dry contact alarm output, can work with
other modern security products.
Solution
1,Cost effective
2,Easy to install and maintain
3,Deter burglar and intrusion
4,Integrate with other security product
4) Advantages of IBMS
IBMS allows data transmition that enables remote control & management
for data services.
IBMS also allows functional & safe environment & to save energy for users
& owners.
IBMS allows secure , solid data transmition & business transactions over
internet & e technologies.
IBMS sensors & actuators allows sensing, steering of HVAC device & local
user interfaces.
For highrise buildings Safety management in IBMS functions to monitored
and controlled by a computerized system where:
access card are required for entry into the building during or after office
hours.
All of these sensors and actuators are connected to field processors and
building management control.
Alarm management.
Building tenant/occupants
Good control of internal comfort conditions,
Building owner
Higher rental value
Maintenance Companies
Ease of information availability problem diagnostics.
Computerized maintenance scheduling
The access control system is connected to (BOS) Building Operating system for
full control and reporting, and integrated into the central user interface.
The electronic access control system grants access based on the credential
presented. When access is granted, the door is unlocked for a predetermined
time and the transaction is recorded. When access is refused, the door remains
locked and the attempted access is recorded.
The system will also monitor the door and alarm if the door is forced open or held
open too long after being unlocked
BIOMETRICS
Biometrics is the identification or verification of human identity through the
measurement of repeatable physiological and behavioral characteristics.
CATEGORIES OF BIOMETRICS:
Biometrics can be sorted into two classes: Physiological & behavioral.
Fingerprint Verification
Finger print biometrics are the most widely adopted biometric technologies in the
industry.This is because the stability and uniqueness of the fingerprint are well
established, Fingerprint patterns: arch, loop, and whorl. Fingerprint landmarks
are also shown: core and delta.positions of scars and creases can also be used,
but are usually not used because they can be temporary or artificially introduced.
Such devices are useful for controlling access to a building with a limited
number of occupants,
They have also proven popular among time and attendance recording
applications
IRIS verification
Biometric technologies that analyze the eyes can be separated into two
categories: iris scanning and retinal scanning. The iris has a fine texture thatlike
fingerprintsis determined randomly during embryonic gestation Like the
fingerprint, it is very hard (if not impossible) to prove that the iris is unique.
However, there are so many factors that go into the formation of these textures
(the iris and fingerprint) that the chance of false matches for either is extremely
low.
Facial Recognition
Facial verification involves recognizing people by there:
Facial features.
Face geometry
Principle:
Analysis of unique shape, pattern and positioning of facial features.
DNA recognition
DNA has not been considered as a form of Biometric until recently. It dictates how
we look and develop; it serves as a full set of building blocks / 'blueprints' for each
person and is as unique as a fingerprint. DNA is short for Deoxyribonucleic Acid .
The use of DNA in biometric applications focuses on the nitrogenous bases which
are referred to as 'bases' for short. There are four distinct bases:
Adenine (A)
Cytosine (C)
Guanine (G)
Thymine (T)
Signature Verification
Biometric technologies that measure signature dynamics are often referred to as
dynamic signature verification (DSV) and they look at the way we sign our
names,.
DSV focuses on the method of signing rather than the finished signature and is
not based on a static image.
DSV can extract and measure a number of characteristics, such as the velocity
and acceleration of the signature, the pressure exerted when holding the pen, as
well as the number of times the pen is lifted from the paper,
The movement of the pen during the signing process rather than the static image
of the signature.
Many aspects of the signature in motion can be studied, such as pen pressure, the
sound the pen makes.
Voice Recognition
Voice recognition software that can recognize words and type a letter,
The sound of a human voice is based on the length of the vocal tract, as well as
the shape of the mouth and nasal cavities, Thus, these characteristics can
affect every sound made by a human.
A biometric further enhances this control, ensuring that only the rightful
When used in combination with biometrics, a smart card ID becomes even more
personal and private. A biometric provides a strong and unique binding between
the cardholder and the personal database on the card, identifying the cardholder
as the rightful owner of this card.The biometric cannot be borrowed, lost, or
stolen like a PIN or a password, and so strengthens the authentication of an
individuals identity.
CCTV utilizes video cameras(produce the video), cable (transmit the video),
and monitors(see the video).
CCTV system is applied mainly for the security and surveillance purpose
1. Camera Package
* Camera body
* Lens
* Mounting Bracket
* Power source
* cable
The focal length of a camera lens is displayed on the barrel of the lens.
The focal length of a lens establishes the field of view of the camera. The
shorter the focal length is, the larger the field of view.
Lens mount
C-Mount Lens
CS-Mount Lens
The distance between the rear flange of the lens to image sensor
is
Cables
Coaxial Cable is used to transmit video signals from camera to monitor.
Fiber-Optic Cable
RCA Cable
C and CS mount
AC and DC camera
The pixels are arranged on a precise grid, with vertical and horizontal transfer
registers carrying the signals to the camera's video processing circuitry.
The 1/3" CCD chip is the most widely used sensor format these days; its size
is 5.5mm (diagonal), 4.4mm (horizontal) and 3.3mm (vertical).
REMOTE VIEWING through LAN
Using Tracerlite Enterprise S/W we can view the Cameras connected to Tracerlite
CCTV systems is the ability to take high resolution images of the camera
scene, e.g. on a time lapse or motion-detection basis.
IP CAMERAS
IP cameras use the Internet Protocol (IP) used by most Local Area Networks
(LANs) to transmit video across data networks in digital form.
INTEGRATED SYSTEMS
Integrated systems allow users to connect remotely from the internet and
view what their cameras are viewing remotely, similar to that of IP
cameras.