| In recent years,the perimeter intrusion system has become a hot research direction in various countries and been attached great importance in the field of security,because of its characteristics of strong concealment,all-weather work,high difficulty bypass the monitoring area and convenient installation.The research on perimeter intrusion system in China started late,and there is still a certain gap with the international leading level in research depth and technical accumulation.The false alarm rate and missing alarm rate of domestic perimeter security products are high,and the positioning accuracy is not very well.Research on perimeter intrusion system with independent intellectual property rights is of great application value to the protection of important institutions,the vigilance of military border and the maintenance of social security.The topic of this dissertation is derived from the basic application research project "Research on Key Technologies of Perimeter Intrusion Detection System Based on Leaky Coaxial Cable".The research goal is to realize the system positioning method and control display function.The main research work and innovative results are as follows: 1.This dissertation introduces the basic physical structure and performance index of leaky coaxial cables,the characteristics and processing methods of LFM pulse sigal and barker code modulation pulse signal are studied and discussed,these two kinds of signals are analyzed and simulated by pulse compression.2.The system experiment scheme and digital signal processing process are designed,the collected data are processed by Matlab pulse compression,calculate the location of the invasion target,the results show that the proposed scheme is suitable for perimeter intrusion sensing system.3.In the process of system integration,the FPGA control CH375 chip is used to complete the design of the system control interface,the function of lower computer receiving and sending is realized,and to carry out functional simulation,timing simulation and joint debugging by connecting the upper computer to ensure that the lower computer meets the design requirements.4.The upper PC interface is built with Labview software to realize the real-time display of intrusion information in the interface schematic diagram,and the function verification of alarm display module is carried out on the experimental site. |