Current location - Training Enrollment Network - Books and materials - Code requirements for museum design
Code requirements for museum design
A more detailed description of the museum can be found in the architectural design data set 4.

People's Republic of China (PRC) national standard GB/T16571-1996.

Code for design of safety protection engineering of cultural relics system museum

The State Bureau of Technical Supervision approved the implementation of1996-10-23+0997-05-01.

1 range

This standard specifies the design requirements of the system security engineering of cultural relics museum, and is the technical basis for designing the system security engineering of cultural relics museum.

This standard is applicable to museums, key cultural relics protection units, cultural relics shops, archaeological research institutes and other places where cultural relics are collected. Arts and crafts, archives. And so on can be used for reference.

2 reference standard

The clauses contained in the following standards constitute the clauses of this standard by reference in this standard. At the time of publication of this standard, all versions shown are valid. All standards will be revised, and all parties using this standard should explore the possibility of using the latest version of the following standards.

Gb10408438+0-1989 general specification for intrusion detectors.

General specification for burglar alarm controller.

GA25- 1992 anti-theft safety door

GA27- 1992 "Regulations on Risk Level and Safety Protection Level of Museums of Cultural Relics System"

3 definition

This standard adopts the following definitions

3. 1 first-class protection object, first-class protection target

Cultural relics and parts identified as Grade I risks are Grade I protection targets, which are expressed by F 1.

3.2 secondary protection object secondary protection object

Cultural relics and parts identified as secondary risks are secondary protection targets, which are denoted by F2.

3.3 The third-level protection target c 1 is the third-level protection object.

Cultural relics and parts identified as Grade III risk are Grade III protection targets, which are denoted by F3.

3.4 Monitoring area

The area covered between the warning line composed of outdoor perimeter alarm or perimeter fence and the boundary of the protected area.

3.5 detection area

Allow the public to enter and leave the area where the target is protected.

3.6 Restricted area

Storehouses, safes, repair rooms and other areas where the public is not allowed to enter or leave.

3.7 Depth protection system

Protection system with monitoring area, protected area and restricted area.

4 field investigation

4. 1 investigation content

On-site investigation is the basis of engineering technical design, and the investigation contents and requirements are as follows:

A) According to the relevant provisions in Chapter III of GA27, and according to the user's arrangement for the use and collection of the house, determine the specific areas and locations of the first-level, second-level and third-level protection targets;

B) In the protected area, the separation of buildings is generally taken as the boundary of sub-protected areas. When there are several different levels of protection targets in the sub-protection zone, the risk level and protection level should be determined according to the relevant provisions in Chapter III of GA27, and different levels of protection zones can also be set for different levels of protection targets in the sub-protection zone;

C) Investigate and determine the boundary of the restricted area, and investigate the installation position of the physical protective barrier in the warehouse according to the protection requirements;

D) Reconnaissance and determine the boundary of the monitoring area of the cultural relics protection unit, measure the perimeter length, determine the position and number of perimeter gates, record the surrounding traffic and housing conditions, and put forward the basic protection form of perimeter warning line according to the actual terrain and characteristics, which will be one of the bases for setting and designing perimeter alarm.

E) Investigate and determine the boundary of the protected area. The boundary of the protected area should keep a certain distance from the outdoor warning perimeter, and all sub-protected areas should be included in the boundary of the protected area. When it is necessary to set up perimeter alarm or perimeter physical barrier to protect the boundary, it is necessary to conduct on-the-spot investigation on the setting as the design basis of perimeter alarm or perimeter barrier;

F) Investigate and determine the location, size, use, quantity and importance of all entrances and exits in the monitoring area, protected area and restricted area, and record them as the basic basis for selecting the control mode of entrances and exits;

G) Investigate all windows in the protected area, including skylights, and mark their overall dimensions as the design basis of security window grille;

H) Investigate and determine the installation position of the camera, and conduct on-site simulation test; The change of illuminance in one day and the illuminance that may be provided at night shall be recorded, and the monitoring range and image quality shall meet the requirements of Article 9.3.6 before it can be used as the scheduled installation site;

2) For the protected target, the regular electromagnetic radiation intensity generated near it should be measured, and the area with high radio interference intensity should be recorded as a reference for the anti-interference design of the system;

J) Investigate the changes and duration of outdoor maximum temperature, humidity, wind, rain, fog, lightning and minimum temperature in one year (based on local meteorological data), which will be one of the bases for the design of outdoor intrusion detection and monitoring system.

K) The installation positions of various detection devices shall be determined after field investigation and field simulation test, and meet the requirements of detection range. The installation height and the basic location of the exit should be marked on the plan.

I) Investigate and determine the distribution of ventilation pipes, heating devices and other heat sources.

4.2 Investigation records

4.2. 1 After investigation, the following engineering drawings shall be drawn in proportion (the relevant dimensions shall be indicated on the drawings):

A) division scheme of perimeter monitoring area, protected area and restricted area

B) Locations of entrances and exits, windows and the direction map of underground passage.

C) Plan of suggested installation positions of cameras, detectors, warning lights and other equipment.

D) Pipeline route and exit plan.

E) Layout plan of central control room and location map of pipelines entering and leaving the control room.

F) Layout plan of showcase position or display position in the protected area.

G) Data table of illuminance change and electromagnetic wave radiation intensity.

H) master plan.

4.2.2 Form 1 should be filled in after investigation.

4.2.3 Measurement records shall be filed as formal technical documents and signed by the technical leaders of both parties. ..

5 engineering design principles

5. 1 protection system

The deep protection system should be given priority in the cultural relics safety protection project. F 1 should be a local depth protection system when depth protection measures cannot be adopted due to external environmental conditions and financial constraints.

5.2 Preventive function

The project of cultural relics safety prevention system should have the functions of preventing invasion, theft and robbery, and its prevention ability should be consistent with the agreement in the design task book.

5.3 transmission

Generally, the transmission system should be equipped with its own dedicated line for transmitting alarm information and necessary wired and wireless switching equipment to form an alarm transmission system with wired transmission as the main part and wireless transmission as the auxiliary part.

5.4 Redundancy

The system design should have redundancy recognized by users to meet the functional and capacity requirements of system expansion, and there should be no less than 2~3 area detection technologies.

5.5 requirements for blind areas

In the protected area, the distance between the edge of the blind area of the intrusion detector and the protected target shall not be less than 5m.

5.6 lighting

Peripheral equipment should be installed in the monitoring area. When the warning line needs illumination, the minimum illumination between two lamps at the height of 1m should be in the range of 20 ~ 401x.

5.7 Restricted area

Restricted area-generally there is no access control device, and the central control room is generally located in the restricted area.

5.8 Lightning resistance

Outdoor detection and transmission system should consider the lightning protection and interference measures adapted to local specific conditions and the ability to work normally under natural environment conditions.

5.9 wiring

5.9. 1 system wiring should generally be protected by metal pipes, hard plastic pipes or plastic trunking.

5.9.2 After laying wires, the direction of wires shall be certified and marked, and the insulation resistance of each loop wire to ground shall be not less than 20MΩ.

5.9.3 Plastic conduits and cables shall be flame retardant.

5. 10 grounding

The system should be well grounded, and the central control room should be equipped with a dedicated grounding trunk line, and the distance from the lightning protection grounding line should be not less than 5m. The dedicated grounding trunk line shall adopt copper core wire or electrical insulation, and the grounding resistance shall be less than or equal to 4Ω.

5. 1 1 security

The equipment selected for this project shall meet the requirements of 5.8 in GBl0408. 1 and 6.8 in GBl2663.

5. 12 protective measures

The various ways listed below can be regarded as a security precaution and a line of defense.

Perimeter alarm fence;

A window alarm system consisting of a glass breakage alarm device;

Install infrasound or ultrasonic detection system in the closed room;

Pressure detection system installed on the pipeline;

Television monitoring system for monitoring targets;

Video alarm system;

Intrusion detection system in a certain area of control space;

Underground earth sound detection system;

Buried leakage cable detection system;

Indoor alarm camera linkage system;

Fixed or mobile emergency alarm system;

Automatic dial-up telephone transmission alarm system;

Bullet-proof and theft-proof glass showcase;

Combined cultural relics safe, anti-theft safe;

Anti-theft safety door, grille window;

Isolation of cement brick wall;

Movable entity protection barrier;

Strong lighting system;

Warning instrument;

Sentinels and guards;

Other measures.

6 Code for Design of Level 1 Risk Safety Prevention Engineering

6. 1 large-scale project with first-class risk

The design specifications for prevention and control projects with a risk level of Grade I and an investment scale exceeding 1 10,000 yuan are as follows:

A) alarm system and TV monitoring system with microcomputer as the core are composed, and the control room is located in the restricted area;

B) Establish an alarm information transmission system mainly based on wired transmission and supplemented by wireless transmission, and establish a wired intercom system among the control center, all exits and exhibition halls;

C) A cross-intrusion detection system consisting of more than three different detection technologies;

D) Alarm information recheck system, which is mainly based on TV image recheck and supplemented by live sound recheck;

E) provide access control system;

F) with perimeter alarm system;

G) setting physical barrier protection device;

H) The user terminal can realize two-way communication with the alarm center at the next higher level, and there is an on-site alarm command system;

I) the first-class cultural relics showcase should be in a 24-hour fortification state;

J) The warehouse is equipped with assembled cultural relics vault or anti-theft safe;

K) Set up uninterruptible power supply.

6.2 Level 1 Risk Medium-sized Project

The design specifications for safety measures with a risk level of Grade I and a project investment scale of more than 300,000 yuan are as follows:

A) Set an alarm control system with microcomputer as the core in the central control room or protected area;

B) Establish a wired transmission system consisting of a dedicated transmission line or a public telephone network, and establish a wired intercom system between the control center and the entrances and exits of each channel;

C) Cross-intrusion detection system composed of more than three different detection technologies.

D) Information checking system with voice as the main part and television as the auxiliary part;

E) Set access control devices and monitoring cameras at key positions;

F) Set indoor perimeter alarm;

G) The first-class cultural relics should have physical protection devices, and the first-class cultural relics display cabinets should have alarm devices;

H) Two-way communication with superior alarm command center, equipped with wireless communication base station and communication keeper;

1) The warehouse is equipped with an assembled cultural relic vault or anti-theft safe;

J) Set up uninterruptible power supply.

6.3-level risk small-scale projects

The safety protection design specifications with the risk level of Grade I and the project investment scale less than 300,000 yuan are as follows:

A) The alarm duty room is equipped with a multi-channel alarm controller with a microprocessor as the core, and the alarm duty room is located in the protected area;

B) Establish an intrusion detection system, and check with sound detectors, with at least three detection technologies;

C) Set up physical protection devices, and the first-class cultural relics showcase should have alarm devices;

D) TV monitoring of key targets;

E) realize two-way communication with the alarm center at the next higher level;

F) standby power supply with automatic switching;

G) The cultural relics restoration room and warehouse shall be equipped with access control devices.

7 Code for Design of Secondary Risk Safety Prevention Engineering

7. 1 large-scale project with secondary risk

The design specifications for safety prevention projects with risk level II and investment scale exceeding 1 10,000 yuan are as follows:

A) alarm system and TV monitoring system with microcomputer as the core are composed, and the central control room is located in the restricted area or protected area;

B) Establish an alarm information transmission system mainly based on wired transmission and supplemented by wireless transmission;

C) Implement TV monitoring on important channels, and implement sound censorship in key prevention areas;

D) Set outdoor or indoor perimeter alarm system;

E) grouping intrusion detection systems with three different detection technologies;

F) The first-class cultural relics should have special physical protection devices, and the first-class cultural relics display cabinets should have alarm devices;

G) realize two-way communication with the alarm center at the next higher level, configure wireless communication base stations and handheld communicators, and establish wired intercom systems between the control center and various channels and entrances;

H) The warehouse is equipped with an assembled cultural relic vault or anti-theft safe;

I) Set up uninterruptible power supply.

7.2 Secondary Risk Medium-sized Project

The design specifications for safety prevention projects with risk level II and investment scale of more than 300,000 yuan are as follows:

A) Set up an alarm control center with microcomputer as the core, and the central control room is located in the protected area;

B) Three different detection technology groups of intrusion detection system;

C) Establish an alarm information review system in important passages and key prevention areas, with sound review as the main part and TV image review as the supplement;

D) The first-class cultural relics shall be equipped with special physical protection devices, and the first-class cultural relics display cabinets shall be equipped with alarm devices;

E) Two-way communication with the alarm center at the next higher level, equipped with wireless base stations and handheld communicators, and the control center establishes wired intercom systems with each channel, entrance and exit, and exhibition hall;

F) The warehouse is equipped with an anti-theft safe.

G) set up uninterrupted power supply.

7.3 Secondary risk small projects

The design specifications for the secondary risk safety prevention project with investment scale less than 300,000 yuan are as follows:

A) An alarm controller with microprocessor as the core is configured, and the duty room is located in the protected area;

B) The area where the first-class cultural relics are stored in the cultural relics protection unit shall be treated according to the design code for first-class dangerous small-scale projects;

C) Take the access road as the key area for intrusion detection and monitoring;

D) Have telephone communication contact equipment with the alarm center at the next higher level;

E) Establish an intrusion detection system with sound detection function, with at least three detection technologies;

F) Equipped with standby power supply that can be automatically switched;

G) Set up on-site alarm signal alarm device and alarm light alarm device.

Code for design of three-level risk safety prevention engineering

8. 1 Level III Risk Large-scale Project

The design specification for safety prevention engineering with engineering investment scale greater than 1 10,000 yuan is:

A) establish an alarm control center with microcomputer as the core, and the central control room is located in the restricted area or protected area;

B) Establish an alarm transmission system with wired transmission as the main part and wireless transmission as the auxiliary part. The control center shall establish wired intercom system with all passages, entrances and exits and exhibition halls;

C) TV monitoring of key targets and important channels;

D) setting perimeter alarm indoors;

E) Establish an intrusion detection system with sound detection, using at least two detection technologies:

F) All the third-class cultural relics have general physical protection devices, the first-class cultural relics have special physical protection devices, and the first-class cultural relics showcase is equipped with alarm devices;

G) implement two-way communication with the superior alarm center, and have police command measures;

H) The warehouse shall be equipped with anti-theft safes;

Configure uninterruptible power supply.

8.2 Level III Risk Medium-sized Project

The design specifications for safety prevention projects with risk level III and investment scale of over 300,000 yuan are as follows:

A) establish an alarm control center with microcomputer as the core, and the central control room is located in the protected area;

B) Establish a transmission system based on wired transmission, and establish a wired intercom system between the control center and the main passages, crowds and exhibition halls;

C) TV monitoring of important channels;

D) Establish an intrusion detection system with sound detection function, and adopt at least two detection technologies;

E) The first-class cultural relics are equipped with special physical protection devices, and their display cabinets are equipped with alarm devices;

F) realize two-way communication with the superior alarm center;

G) configure uninterruptible power supply.

8.3 Three-level risk small-scale projects

The design specifications for safety prevention projects with risk level III and investment scale less than 300,000 yuan are as follows:

A) It has an alarm controller with microprocessor as the core, and the alarm duty room is located in the non-business office. In the non-visiting area;

B) establishing an alarm transmission network based on a dedicated line;

C) Set local acousto-optic alarm signal and alarm optical alarm system;

D) High-security security doors and security window must be installed;

E) First-class cultural relics in cultural relics shops and repair rooms should be stored in safes;

F) An intrusion detection system with at least two detection technologies;

8) Telephone communication with the superior alarm center.

9 engineering design technology

9. 1 Alarm Control Center

9. 1. 1 The central control room of large-scale projects with Grade I and II risks should be a special room with two security doors, and the passage distance between the two doors should not be less than 3m. The main residents in the central control room should be equipped with bulletproof material security doors, and the security doors should be equipped with access control identification devices and cameras. The central control room is equipped with toilets and special air conditioning equipment.

9. 1.2 The central control room of medium-sized projects with Grade I and II risks and large-scale projects with Grade III risks should be a special room, equipped with security doors, security window and anti-theft locks, and equipped with alarm devices and automatic lighting devices at entrances and exits.

9. 1.3 The central control room of small-scale projects with Grade I and II risks and small-scale projects with Grade III risks can be located in the duty room, with security doors, security doors and anti-theft locks, and an alarm device at the exit.

9.2 Functions of Central Receiving Equipment

9.2. 1 Microcomputer control system function;

A) The central receiver should be able to automatically receive all information sent by the user terminal equipment and transmit it to the charity management computer in real time;

D) User alarm information can be displayed on the central receiver and computer screen in real time, and an audible and visual alarm can be given;

C) The alarm management computer shall have sufficient capacity and relevant databases to store all user data and alarm processing plans required for the normal operation of the system;

D) The ruthless management computer can patrol and regularly detect the user status through the central receiver, and can monitor and program the user terminal equipment;

E) The central receiver shall have multiple data input and output interfaces;

F) The central receiving equipment has the functions of on-site voice check and alarm communication, and has the functions of wired and wireless communication transmission;

G) The central equipment connecting people's telephone lines shall meet the requirements of the Ministry of Posts and Telecommunications for network access;

H) User alarm information includes: user code, address, name, telephone number, company name, date and time, and alarm category;

5) The system software should be processed in Chinese, with strong fault tolerance and online help function.

Alarm controller

A) It shall meet the relevant performance requirements in Chapter 5.2 of GBl2663;

B) The alarm controller has programmable function;

C) Provide a programmable user password;

D) The telephone alarm shall meet the technical requirements of the Ministry of Posts and Telecommunications.

9.3 TV monitoring

9.3. 1 The TV monitoring system set in the outdoor perimeter warning line should realize the monitoring without blind areas along the warning line with a 5m wide warning range. General cameras are fixed focus orientation, automatic aperture lens and outdoor protective cover. For a large-scale monitoring area, a camera with a rotating pan/tilt and a zoom lens should be selected.

9.3.2 The TV image display system in the outdoor perimeter alarm area should be able to display all the scene situations with 5m wide alarm range at the same time, or set TV monitoring means for the intrusion detector to start the camera, with the functions of real-time transmission of multi-channel alarm image signals and switching display.

9.3.3 The image signal transmitted by the monitoring camera to the central control room shall be continuously recorded 24 hours a day or the on-site alarm image monitoring signal shall be recorded in real time.

9.3.4 The video alarm system shall have the functions of freezing the picture and setting the video alarm area and impression at will.

9.3.5 At night, the average illumination of the protected object should be within the range of10-401x, and the camera sensitivity should be able to adapt to the change of illumination of the protected object.

Subjective evaluation of image quality damage at image level

5 I don't know

4 perceptible but not annoying

It is annoying to have obvious consciousness.

More seriously, it's quite annoying.

1 It's too serious to watch.

9.5.2 When an intrusion alarm occurs in the outdoor perimeter alarm system, the signal display shall meet one of the following requirements:

A) All simulated topographic maps of the perimeter are displayed on the computer screen, and the specific geographical location of the alarm is displayed with sound and light, and the specific location can be partially enlarged until the user's requirements are met;

B) The specific position of the perimeter alarm is displayed on the analog map board with acousto-optic signals through the control device;

C) Display the direction and position of perimeter alarm with sound and light on the control equipment.

9.5.3 Specific indicators of outdoor perimeter alarm devices and systems to adapt to outdoor working environment (including adaptability to wind, rain, snow, fog, temperature and humidity) shall be given, and specific measures and installation methods to resist lightning interference shall be explained.

9.6 Access control

9.6. 1 The locations that need to be protected and controlled include: a) the perimeter fence and the population of the fence; B) Entrance and exit of exhibition hall and warehouse. C) Underground passages and skylights entering the protected target area; D) entering the protected area and restricted area.

9.6.2 The entrances and exits dedicated to internal personnel shall be equipped with magnetic cards or other access control devices that can automatically identify their identities.

9.6.3 The number of valid access cards for automatic identification of access control equipment shall meet the requirements of users. Different entrances must hold different identification passwords to ensure the effective entry of different levels of cards. Every effective entry should automatically store the relevant information and entry time of the person, and make effective statistics, records and archiving every day.

9.6.4 The automatic door controlled by the identification device shall be able to effectively prevent one card from entering or one card from exiting. The identification device shall ensure the effectiveness of operation, and give an alarm signal if it fails to enter effectively. Effective operation should ensure the effective action of automatic doors. An effective operation of the automatic door can only produce one effective action.

9..6.5 A valid card should have a password system to prevent illegal copying of similar equipment, and the password system should be modifiable.

9.7 Intrusion Detection Device

9.7. 1 The intrusion detection device shall be in the system prevention area, and shall not miss or leave any intrusion.

9.7.2 Compound intrusion detector can only be regarded as a principle detection device.

9.7.3 After the intrusion detector equipment forms a system, the radiation sensitivity and power supply transient sensitivity of the system shall meet the requirements of 4.6. 1 in GBL 0408.438+0.

9.7.4 When the inspector starts the camera or the warning area of the camera, a lighting system synchronized with the detection shall be set.

9.8 Wireless transmission device

9.8. 1 security system engineering, wireless transmission should be adopted in areas and parts that are not suitable for wired transmission. When the detector enters the alarm state, the transmitter should immediately transmit the alarm signal, and the transmitter should have the function of repeatedly transmitting the alarm signal after a set period of time. When the detector enters the alert state, the transmitter should stop transmitting alarm signals and stop transmitting.

9.8.2 The fixedly installed wireless alarm device shall have the indication of power under-voltage, which can be divided into the following two ways:

A) When the transmitter power supply is under-voltage, it shall send a fault signal to the receiver in the central control room, and the receiver shall have a special under-voltage alarm display signal or light display to distinguish the alarm signal. After receiving the undervoltage indication, the receiver can send a control signal to the transmitter to stop sending the undervoltage alarm signal, and the transmitter power supply should be replaced immediately;

B) When the transmitter power supply is under-voltage, it will send out a local acousto-optic alarm signal with a sound level of not less than 85dB(A).

9.8.3 The fixedly installed wireless alarm transmitter should have a physical protective shell, which can prevent disassembly alarm and man-made damage.

9.8.4 The security system based on wireless alarm networking should have the function of monitoring the channels used. When a continuous blocking signal or interference signal exceeds 30e, which is enough to hinder the normal reception of alarm signals, the receiver should have a fault signal.

9.8.5 For the security prevention system mainly based on wireless alarm networking, the receiving end should have the function of receiving and processing multiple simultaneous alarms, and there should be no missed alarms.

9.8.6 The power supply of the transmitter shall ensure that the effective service time is not less than 1 day, and can support the transmitter to work normally for 7 days when an undervoltage alarm signal is issued.

9.8.7 The installation position of the receiver shall be determined through field test to ensure that the alarm signal sent by any transmitter in the prevention area can be received.

9.9 Physical protection

9.9. 1 Physical protection is an important measure of cultural relics protection, which should be given priority in preventive engineering.

9.9.2 Physical protection of cultural relics safety mainly includes the following measures:

A) The display cabinets for storing cultural relics shall be made of anti-theft glass or bulletproof glass and related frames, and all display cabinets shall be equipped with anti-theft locks. Ordinary glass display cabinets should be equipped with alarm devices to monitor the cultural relics in the cabinets. B) The general warehouse for storing cultural relics shall be provided with assembled cultural relics vault or anti-theft safe, and the first-class cultural relics shall not be stacked and kept on the shelves of the general warehouse; C) The cultural relics calligraphy and painting on display should be accompanied by physical protection devices; D) Doors and windows of the cultural relics warehouse should be equipped with security doors and security window respectively, and the quality standard of security doors should reach Grade C specified in Article 5.2 of GA25; E) the height of outdoor fence shall not be less than 2.8m.

9.9.3 Obstacles should be set in the parts of cultural relics buildings that are easy to climb and hide people without affecting the appearance.