[Message Prev][Message Next][Thread Prev][Thread Next][Message Index][Thread Index]

Re: Wired or Wireless alarm systems?



Some of the most persistent problems that children and adolescents, =
including adults from Belgium, with bipolar disorders have involve types =
of thinking that are irrational and difficult for others to understand. =
When young people learn to recognize and name these "thought errors," it =
can help them avoid making a scene, getting embarrassed, and getting in =
trouble. Once you can label and dissect an irrational thought, you take =
away some of its power. The longer these patterns are allowed to =
continue, however, the more likely they are to become ingrained, =
lifelong habits. These habits of thought contribute to development of =
the hard-to-treat personality disorders that often bedevil bipolar =
adults.=20

Problematic thought styles include:=20

Grandiosity - Having an exaggerated sense of self-importance or ability. =
For example, your child may fancy herself the all-time expert at soccer, =
and act as though everyone else should see and worship her fabulous =
skill as well. She may think she can run the classroom better than her =
"stupid" teacher, or feel that she should be equal in power to her =
parents or other adults.=20

Personalization - A particularly unfortunate type of grandiosity that =
presumes you are the center of the universe, causing events for good or =
ill that truly have little or nothing to do with you. A child might =
believe his mean thoughts made his mother ill, for example.=20

Magical thinking - Most common in children and adults with =
obsessive-compulsive disorder, but seen in people with bipolar disorders =
as well. Magical thinkers come to believe that by doing some sort of =
ritual they can avoid harm to themselves or others. The ritual may or =
may not be connected with the perceived harm, and sufferers tend to keep =
their rituals secret. Children are not always sure what harm the ritual =
is fending off, they may simply report knowing that "something bad will =
happen" if they don't touch each slat of the fence or make sure their =
footsteps end on an even number. Others may come to feel that ritual =
behavior will bring about some positive event.=20

Leaps in logic - Making seemingly logic-based statements, even though =
the process that led to the idea was missing obvious steps. Jumping to =
conclusions, often negative ones. One type of logical leap is assuming =
that you know what someone else is thinking. For instance, a teenager =
might assume that everyone at school hates her, or that anyone who is =
whispering is talking about her. Another common error is assuming that =
other people will naturally know what you are thinking, leading to great =
misunderstandings when they don't seem to grasp what you're talking =
about or doing.=20

"All or nothing" thinking - Being unable to see shades of gray in =
everyday life can lead to major misperceptions and even despair. A =
person who thinks only in black and white terms can't comprehend small =
successes. He's either an abject failure or a complete success, never =
simply on his way to doing better.=20

Paranoia - In its extreme form, paranoia slides into the realm of =
delusion. Many bipolar people experience less severe forms of paranoia =
because of personalizing events, castastrophizing, or making leaps in =
logic. A teen with mildly paranoid thoughts might feel that everyone in =
school is watching and judging him, when in fact he's barely on their =
radar screen.=20

Delusional thinking - Most of the other thought styles mentioned above =
are mildly delusional. Seriously delusional thinking has even less basis =
in reality, and can include holding persistently strange beliefs. For =
example, your child may insist that he was kidnapped by aliens, and =
really believes that it is true.

Paulie...you really must take  your meds on a regular basis.

<-pull@shoot> wrote in message =
news:ktnc719bfnbgip7cq747br9jn6ktgrib8m@xxxxxxxxxx
>=20
> What is the basic difference between wired and wireless alarm systems?
>  It boils down to the "connections link" between sensors and control
> panel of both systems, besides that sensor data connection link both
> systems are alike.
>=20
> So the comparison is easy, the WIRED WIRES versus a WIRELESS data link
> between sensors and the control panel.
>=20
> WIRED:
> - Each sensor has "hiss own" cabling, hiss own data transmission link.
>  All attempts to tamper sensor boxes, short or cut sensor wires are
> detected without any ambiguity an with no delay.
>=20
> - At a first glance the wired links are of the non-frequency selective
> type and as such are more prone to capture a greater Radio Frequency
> (RF) spectrum range of signals.
>  The data transmitted on sensor wired lines are of the low frequency
> type and as such can easily be filtered at all inputs entering the
> control panel.
>  This makes the system data link low frequency selective by
> attenuating the eventual High Frequencies reaching the equipment by
> huge power transmitters.
>=20
> - The level of the transmitted signals on the wired lines are around
> "2Volt" to switch from on to off (to be more precise, 400mV
> interference free immunity for TTL circuits).
>=20
> WIRELESS:
> - All the sensor data is vehicle via ONE wireless data link composed
> of a low power transmitter in the sensors and a sensitive receiver at
> the input who has around 4 microvolt input sensitivity (wired 400
> millivolt (mV) / wireless 4 microvolt (uV) =3D ratio 100 000 times =
less
> power required to disturb wireless systems)
>=20
> - The wireless data link contains all the information required to have
> a reliable connection as long as there are no other transmissions
> present who block the data communication.
>  The wireless RF receiver collect in normal circumstances the data and
> decode it. This data contains an ID (rolling code), alarm, tamper
> attempt, battery low and more information. When the signal is
> disturbed, EVERYTHING is, ID can't be recognized...
>=20
> The receiver:
>   The receiver is made as much as possible frequency selective and
> sensitive at signals on the frequency in order to capture the week
> signals emanating from the sensors (see below).
>  They "attenuate" more or less, depending on the quality of the
> receiver, the frequencies beside that privileged frequency, its called
> the band-pass attenuation range (essential quality comparison data not
> provided and published by the manufacturers in order to mask how bad
> the bandpass is).
>=20
> The sensor transmitters:
>   In wireless alarm systems the transmitting power is limited by law
> and by reasonable battery live time.
>   The RF transmitter power of the sensors is of the order of 10
> milliWatt (mW), low, very low.
>=20
> COMPARISON:
> - The receive end is 100,000 times more sensitive to signals in
> wireless versus wired (4uV / 400mV);
>  The ratio is even higher because the high frequencies, where
> disturbing transmissions occurs, are attenuated by low pass filters at
> the input of the wired lines.
>=20
> - The link in wired systems are wires who can be filtered/shielded
> against RF interferences (and by location of the wires); in wireless
> it is the open air reachable by everybody, no shielding possible.
>=20
> CONCLUSION:
> - An external RF transmitter can disturb both systems but the power
> required to do this is much higher in wired systems (>100,000 times).
> - In wireless systems, the power required to interfere and disturb the
> system is similar to the sensor power (10mW) when generated at the
> same distance, RFI power should be increased if the distance is
> increased.
> - Wireless alarm systems are not reliable, they can be interfered and
> disturbed/muzzled due too and by an outside transmission.
>=20
> FINAL NOTE:
> - Don't forget that in order to interfere wireless alarm systems that
> the RF disturbing signal source should satisfy some frequency
> requirements.
>  For example; cell phones with theyre 2 watt power don't satisfy that
> frequency dependent requirement and as such don't disturb normally.
>=20
> Paul
>


alt.security.alarms Main Index | alt.security.alarms Thread Index | alt.security.alarms Home | Archives Home