University security project construction usually includes entrance and exit vehicle management system, video surveillance system, entrance and exit video surveillance and barrier-gate linkage management alarm system, dormitory area barrier gate access control system, cafeteria monitoring and cafeteria operation area access control system, electronic fence system and perimeter video Linkage system, technology and practical application platform, campus card system, power supply and water supply equipment environmental monitoring and alarm system.
Video Surveillance: Reasonable Layout Construction Special Network
The video surveillance system is currently the main technical means of campus security. The scope of video surveillance includes campus entrances and exits, dormitory building entrances, libraries, canteens, perimeters and open air public areas.
The open-air public areas are characterized by high traffic, complicated roads, and difficulties in deployment. Therefore, multiple robbery cases have occurred. At present, many cameras have been installed on most campuses. However, there are generally problems with poor front-end equipment performance, poor camera illumination and wide dynamic capabilities, unclear details of the screen, blind spots, and inadequate daily maintenance. Under the principle of not affecting the monitoring coverage, HD video cameras can be selected for reasonable layout. For the roads on the campus, the use of ordinary manual zoom lenses in narrow areas such as entrances and exits, passages, etc., adjusting the lens focal length according to the actual scene, the lens monitoring angle is relatively small, and the depth is relatively long. Wide-angle lens coverage should be used for open areas such as squares and sports fields. The image transmission of high-definition cameras poses new challenges for the construction of campus networks. A special security network should be built to transmit high-bandwidth image information independently from the existing campus educational network.
Access control card: Doka unified as a CPU card
In order to strengthen the management of various living areas on campus, some colleges and universities have begun to build campus access control systems in recent years. They are mainly distributed in various functional subsystems such as entrance and exit management, dormitory buildings, and canteen access control areas. Each subsystem corresponds to a different population in its own area. Management, centralized management by a unified access control system.
The author proposes to consolidate multiple cards into a single CPU card and distinguish different management functions by dividing different functional sectors into the real one card category. In the era of big data, it is possible to analyze the daily life of students on the campus through the massive data in the CPU card, including three meals a day, eating and drinking, reading habits, and access to dormitories, etc., to better understand each student’s school life. Life conditions.
University security project construction usually includes entrance and exit vehicle management system, video surveillance system, entrance and exit video surveillance and barrier-gate linkage management alarm system, dormitory area barrier gate access control system, cafeteria monitoring and cafeteria operation area access control system, electronic fence system and perimeter video Linkage system, technology and practical application platform, campus card system, power supply and water supply equipment environmental monitoring and alarm system.
Vehicle Management: Double Barrier + License Plate Recognition
The university's entrance and exit vehicle management system is different from ordinary business buildings, large shopping malls, and catering vehicle management. There is no charge for parking in colleges and universities, and ground parking is the mainstay. From the perspective of the student structure of regular colleges and universities across the country, compared to the past, part-time teaching hours (Monday-Friday evenings, weekends and winter and summer vacations) have a large number of off-campus vehicles entering and exiting, making it difficult to control.
Designing full-time teaching time Through the two barriers combined with the license plate recognition system, the campus vehicles are managed around the clock. The first barrier is managed through card readers, while external users use temporary cards to swipe in, and campus users use campus card cards to enter. The second gate adopts license plate recognition management. The license plate number of the campus user is stored in the identification database. After the license plate is identified and compared, the barrier gate is lifted to allow access to the campus. Non-campus users cannot enter but identify the license plate number and record it in the database. Off-campus vehicles can only park in the parking lot. Part-time teaching time vehicles, barriers are always open, license plate recognition system is always working, the system real-time identify and record the license plate number of all vehicles entering and leaving the campus for later inquiry and evidence collection.
The vehicle management system is coordinated and coordinated by multiple subsystems such as barrier devices, long-distance vehicle card readers, and license plate recognition devices. Therefore, the integration of interfaces between devices must be taken into consideration when selecting barriers, card readers, and license plate recognition devices. Technical issues such as the opening of the agreement. In addition to satisfying the needs of the door-to-door local query, the license plate recognition device should also be able to remotely transmit to the campus technical defense application platform through the network to remotely access the query.
With the advent of the 4G era, smart phone replacement for conventional card swipes is just around the corner, and NFC should be considered when choosing a card reader. The card management system should adopt the network transmission method as much as possible, the system construction is easy to connect, the system capacity expansion is strong, and at the same time it is convenient to access the environment of future cloud computing, cloud storage, and big data analysis.
Try facial recognition and intelligent behavior analysis
Some colleges and universities have already established facial recognition access control machines installed in front of classrooms or entrances to student dormitories. The use of facial features to completely replace card recognition has caused great controversy in universities. The above-mentioned integrated off-line card reader (including off-line card reading, control, and image recognition in one), all front-end information collection functions are concentrated on the integrated card reader, the reader is faulty, the point of access control, monitoring, face The function also disappeared.
Facial recognition technology is limited by the appearance conditions, lighting environment, makeup and other objective conditions. As far as the current level of technology is concerned, the false alarm rate is still higher than other biometric technologies such as Hand Reader and fingerprint readers. As an aid to identification, facial recognition is relatively It is more intuitive and easier to sample and apply to other biometric technologies. Therefore, the author proposes an independent distributed network architecture design for access control, monitoring, and face recognition devices, front-access access control card readers, and surveillance cameras. The monitoring signals are transmitted to the center through the server for background facial recognition analysis and recordation. First, the access control management and monitoring system must be guaranteed. The proven utility of these proven technologies is to be used to superimpose face recognition technology or other intelligent behavior analysis functions to enhance the active intelligence analysis capabilities of the entire security system.
Build technical defense application platform
At present, many security companies on the market have their own application platforms. There are a series of old problems such as “too many functional stacks, too good to say, bloated and complicated, hidden collapse†and so on. University users should fully consider when choosing an application platform. Successful applications of the platform itself, integration with downstream subsystem interface success stories, platform stability, platform maintenance, and other comprehensive factors. Traditional close-coupled systems will be overburdened in the field of campus security where many downstream subsystems need to be integrated. The loosely coupled approach enables the abstraction and encapsulation of isomerized service support systems so that upper-layer applications do not need to consider the difference of basic systems, and the integration Interface sets can develop independent applications that are compatible with various business support systems, greatly reducing the amount of development.
The practical application platform of technical defense in colleges and universities should be fully integrated with the academic affairs and practical application of schools, closely follow the development of modern advanced technologies and the future development of system integration. Each subsystem is related to each other, information is shared, security isolation through different networks, interface integration, virtual Such technical means as woven into an integrated business cloud for all types of users to share resource utilization, comprehensive business cloud output of various types of information as input through the big data analysis and mining technology for value exclusion, and derive associated information and value-added Information, such as student use habits analysis, user evaluation, collusion analysis, etc.
To realize the above value-added functions, it is necessary to fully consider the security isolation between different networks in the campus, application negotiation in different service departments, and interface negotiation in different systems. The system interface, device selection, and technology application should be fully considered. Advanced, IT, high integration, compatibility, and cutting-edge issues, and adopt the principle of overall planning and distribution to promote project implementation.
Stress Analysis Gauges,Axial Strain And Stress Changes,Strain Gauge Type Sensor,Cb Series Strain Gauge
Zhejiang Nanhua Electronic Technology Co., Ltd , https://www.nhloadcells.com