2008年12月22日星期一

Three Typical Monitoring Program

At present, there are three main control system of a typical program, the following were each on the strengths and weaknesses of the system.

If installed properly, the traditional security system still has a few advantages. For example, through traditional analog transmission system, CCTV image quality is very good. Moreover, there is no need after a video network, it will not be video-inch extension on the issue. However, such a system in the inferior performance of the in camera and digital video equipment management system between the coaxial cable will be laid to occupy the building expensive space. As the coaxial cable does not support IP-based applications, so. If you decide to use the full IP-based security systems, the current customer base on the need to replace coaxial cable. Analog cameras in the coaxial cable-based facilities on the basis not on the same day can not support the audio-inch transmission, and IP-based cameras to the goods. At the same time, support data, voice and video streaming signal of a variety of large graphical user interface (GUll for video surveillance, the use of hybrid systems from analog technology to the investment lP security system should be commended. Once the system is IP-based, The system will be able to use IP networks to provide all the features, including remote monitoring, however, hybrid systems, there are some disadvantages, which is mainly embodied in an excellent analog video into a video lP costs associated with these decisions at the cost of analog signal transmission line before the digital Coding, as well as the physical location of the encoding / decoding occurred in the number of times, and video quality may be adversely affected.

LP and the standardization of the network provides a good interoperability and compatibility on the network lP not prepared to reduce the long-term infrastructure costs. For the cameras and other equipment for Power over Ethernet (POE) can be installed to further reduce the cost of electricity because it is centrally managed, and reduce the need to install the signal due to the number of wires inside the camera in be coded for transmission lP, and do not need to Converted to analog signals, so saving the cost of equipment conversion. Although lP systems and networking security system has many notable advantages, but there are potential flaws. The big flaw is that the bandwidth out of consideration, lT staff present in the video do not want their products on the network. Dimension, which needs to teach lT managers to understand the different video compression technology division to help ease their doubts.

Developments of Prison Television Monitoring System

Multi-stage video of the prison television network monitoring system (currently common)
The program constitutes a
Squadron room: to accept the front of the camera's video signal; have to be able to control the character with the small and medium-sized front-end analog video matrix, generally 2 to 4 monitors for local monitoring and 2 to 4 analog video upload Battalion; to the front of the video after video distributor all the way to the matrix, at the same time another way to the hard disk video recorder (DVR) the local video, the DVR can watch the display with single or multi-channel digital video (4/9/16) digital images Video, the DVR also has the DVS (video servers) function, it can pass a dedicated local area network upload 2 to 4 digital video control room to the group: group only analog matrix + monitors if there is a group for 6 to 8 squadron Each squadron to upload Battalion 4 analog video, the group to the prison control room from 12 to 24-channel analog video signals, the group also computer software and decoding, can dedicated local area network access to the Internet to see squadrons of digital video signals, the unit can also be Private LAN Control Squadron and the squadron of the matrix DVR, no storage unit; prison control room: from the brigade and analog video signals from the perimeter (the common corridor, the district office) the analog video signals in the control room is equipped with large analog video Matrix, the Matrix could be part of the output signal on the TV wall, a small portion of the analog video uploaded to the Authority, the video server can also convert analog video to digital video signals through the network dedicated to the Authority Board to upload (the latter is at present Commonly used method). In the prison control room through the matrix control signals to control the squadron and the brigade of the matrix, the control signals through dedicated local area network-down. In the prison control room there is a certain amount of storage capacity to address the group regardless of the squadron and regional stand-by capacity. Authority can also signal control (through dedicated local area network) to see the front of any video signal, but a limited number, which is savings. At present, the two groups to see digital video, a DVR through to the other group through the prison control room in the video server.

The program features (the most commonly used)
(1) squadron based squadron to the front of the camera control room, a squadron of analog control room if matrix, DVR, DVS DVR functions, the system more simple, this part of the analog video signal sent to group (4 to 6 general way ), A squadron generally monitors to see 16 images, in order to see the full, DVR can also view the display screen 16, 16 and then the screen can also look at single screen, all the way or the other single-screen in the 2nd Rd Monitors on display, these two single screen to watch important events and circumstances, single-sided surface that can switch between the front of every camera.
(2) per squadron of 4 to 6 analog to the group, the only team to monitor, there is no storage, analog matrix, the matrix output in the control room to send 12 to 16 video signals. General: squadron is a floor, the group is a floor. A brigade normally has 3 to 6 squadron. In a control room control group 6 to 10.

If there is squadron, battalion, prisons, four of the Authority
(1) analog video images are uploaded to a level that is from the squadron group → → prison (in the control room) → Authority. They are the analog video matrix to upload, although some of the images uploaded every level, but can be remote-controlled way to see the front of each image.
(2) if with a selection of DVS (video servers) of hard disk recorders, the squadron will be the way a few digital video signal sent to the local area network, the squadron, group, the Prison Administration, which could see a few local area network digital video signal path, attention DVS's DVR functionality is limited, approach to see it limited.
(3) in the control room with DVS (video servers) to a higher level so that lower-level local area network through a dedicated digital video signal through the remote control can see the front of any image, but not at the same time to see each.
(4) This program is another major features: control signals through dedicated local area network, in theory: squadron, battalion, prisons, the Authority can control each other, the actual control or have the authority, or the general control of a one-way downward, as a result of Digital control signals occupy a smaller amount of information generally does not affect the main functions of the special needs of local area network. Image part of the digital signal on a dedicated local area network, which is a supplement, is only applicable to the use of minority leadership, otherwise this would adversely affect the normal use of a dedicated local area network. This special attention to the local area network refers to the prison system of dedicated local area network, in order to solve the congestion channel, the other should be built for the exclusive use of local area network television monitor it.
(5) This program is a relatively long period of time in the mainstream, the biggest advantages: money, image quality is good, no time delay devices, and so mature.

Modern Prison Smart Security System

In the near future, such as construction or transformation of the recent security prison system, which is a modern prison system includes intelligent, of course, the prison system is a security intelligence prison system, the primary and essential. Modern prison in the Intelligent Security Systems has developed greatly. We are just at the times and technology, particularly in the digital, networked, Intelligent side. The following sub-system, in the case of actual non-essential. According to the actual needs to choose the number of subsystems, as well as the size of the sub-system.

(1) Security Systems (This is the top priority in prison must have the whole range)
TV monitoring systems, access control systems (to prevent and contain physical access control card), perimeter guard system (wind wire, walls, doors, windows, and other entities to prevent and guard against invasion of the system), illegal and out of alarm systems, electronic patrol system.

(2) information management system (in focus and management of regional office)
BA systems, integrated cabling system, program-controlled switches, computer network systems, parking management systems, fire alarm systems, multi-media show of civil, intelligent integration platform, engine room, ground lightning.

(3) cell Management System
Emergency radio, broadcasting daily, with the prisoners in the cell control room (management) intercom system, to visit prisoners Management System (fat, intercom, inspection items, etc.), access and vehicle access management systems, new vehicle at the bottom of the TV monitor System, prisoners of GPS positioning system, the light of the prisoners outside the prison management system (such cases have been abroad).

(4) the residence of the prison system, transmission, cable, fiber optic, cable and so on, they can also be combined use of the available lanes, dedicated local area network can also be used, and so on, dedicated wireless network, wireless mobile communications (GSM, CDMA) wireless intercom system-specific.

The Design of Hotel Video Surveillance System

The system is the use of video technology to detect and monitor the regional security and real-time display and record live images of the electronic system or network. This project at all entrances and exits, the Office of the elevator, the elevator car box set up at places such as surveillance cameras. Power to control use of bus lines, video line for one-on-one. The whole floor, a total of 62 cameras.

(1) security system can be configured for digital recorders and video cameras record data (24 hours a day, one month) in order to record all surveillance activities in the area, and again at any time frame possible. Video disk configuration will be used repeatedly, when the camera detection device to detect anomalies, the video disk recorded under unusual circumstances occurred in the previous section of the 15S will be maintained so that security personnel to track the whole process of the incident.

(2) Center for the host system-wide matrix system, all at the same time video camera. Use of hard disk video recorders. According to the security control room hosts need to achieve full-screen, four screen, the Kowloon-screen, the monitor's display screen includes cameras, address, hours, etc. According to the information needs of some of the security cameras in the control room, such as Yunnan control, focus adjustment, and so on.

(3) the system can switch timing. Switching time adjustable from 1 to 30 seconds, at the same time can manually select a camera to track and video.

(4) CTV with a fixed camera, shaking his head, pitching movement, zoom in and illumination application of the low environmental characteristics, and can be mounted on access to the best picture. Selection of cameras inside the elevator fixed, and other selected places with cloud desktop. Camera ~ 220V power supply, power supply provided by the security control room, equipped with its own camera transformation, rectification and emergency batteries.

(5) selection of video cables SYV - 75 - 5, choose Control Cable RVVP - 2X1. 0, optional power ZRBV - 2X2. 5, the laying of the cable trunking methods used to wear metal, galvanized steel pipe dark enough.

The Design of Hotel Monitoring Center

Monitoring Center, located in a hotel, combined with the fire control room, with an area of 30m2, in charge of the entire large embrace of security control. Security control room for all video cameras and alarm monitoring.

(1) center should be set to monitor the restricted area, should guarantee its own security and protective measures inside and outside the contact means of communication and should set up an emergency alarm and the alarm then left to a higher center of the police communications interface.

(2) monitoring center area with security system suited to the size, not less than 20 h, should be on duty to ensure the normal work of the corresponding ancillary facilities.

(3) Center for Monitoring the indoor surface should be anti-static, smooth, smooth, not dust. The width of the door should not be less than 0. 9m, height should not be less than 2. 1m.

(4) to monitor the temperature inside the center should be for 16 ~ 30 ° C, relative humidity should be 30% to 75%.

(5) control center should have good lighting.

(6) indoor cables, the Line of Control should be laid to set up slot when not to set up slot, the cable can be laid in the frame slot, the cable corridor, the wall plate trough, or the activities of the floor.

2008年12月21日星期日

Video Surveillance Knowledge

Video surveillance camera system is mainly composed of front-end parts, transmission parts, control, and records show that the majority of which consists of four. System so that managers at the control room can be observed in the region to prevent the front end to all activities and personnel records for the security of information systems to provide dynamic images.

With modern computer technology, multimedia technology, network technology and digital image compression technology and the rapid development of the birth of the DVR digital surveillance system is at the core of the multimedia computer monitor, to the management of the computer, not the people's subjective sense. At the same time, its own inherent properties for future development of a broad space, with the society as a whole digital, networks accelerate the pace of traditional analog control system is bound to be a new generation of digital, networked multimedia management control system To replace. As long as needed to be in place to monitor the installation of a certain number of cameras can be on duty at the control center to monitor real-time location of the district's staff activities, and to record preserved. For the investigation of the incident to provide first-hand information.

How to Select a GPS

As some domestic manufacturers to produce products of the GPS is not mature enough, there are always a weak signal, not positioning, not alarm, alarm or disorder with features of its on-board phone owners to easily dropped, and so much trouble. GPS technology experts remind consumers to buy GPS products should pay attention to the following areas.

The stability of the product.

First of all, to consider the option of anti-electromagnetic interference strong, stable performance GPS products. Vehicle hit bumps along the way, the high temperature, EMI, the car is rather poor environmental conditions will affect the operation of GPS, so the stability of the product would like to stress.

Select operator.

To consider the choice of powerful networks, the sustainable development of the operator to prevent the network coverage area is too small or as a result of the closure of the company and can not be reliable follow-up services.

Aesthetics of the product.

GPS products are installed hidden, but the high-end products, usually with on-board telephone (handle), to buy time to consider whether the handle of fashion, design aesthetic appearance, with the interior color guard, and whether the co-ordination and so on.

Tell-level module.

GPS module is divided into two levels, civil and industrial grades. Industrial-class performance and stability of the modules, some of the relatively expensive; civilian class module adaptation to the environment was not so satisfactory, but some of the relatively inexpensive price. Consumers should be considered cost-effective.

Security of energy delivery.

GPS's greater energy expenditure, should set up a dedicated GPS power to prevent ordinary power in the lower-frequency electrical environment of instability, so that the burn circuit fault occurs. Electricity cable car traffic, a common line to connect easily burned, the quality of the cable in order to better ensure the safety and reliable.

Capabilities.

At present, products are not cheap, GPS is a general price increase as an initial installation fee of 50-100 yuan per month cost. Model car of the main economic capabilities.

How to Purchase an Access Control

The basic system consists of access card readers, controllers, cards, electronic control locks and other accessories components. On the stability of the entire system, are essential to any part of, any of the components of the instability will affect the stability of the entire system. However, on security, and the card reader should be the most important cards like an "electronic key", if the key was easy to copy someone else, the entire access control system there is no security to speak of the.

Card identification technology is probably gone through several stages:

Magnetic cards - contactless smart card - card - contactless smart cards. Contactless smart card and proximity card though and are based on the RFID, has a contact-free, easy-to-use features. But among them there are still many differences. From a technical development, the contactless smart card to replace the card is taken for granted. The market situation is also evidenced in China, the contactless smart card has 2 consecutive years of growth in the median, contactless smart card technology is bound to the next generation of mainstream technology, this is an indisputable fact. Domestic and foreign companies have been offering their own contactless smart card reader and (13.56MHz), in the face of so many brands on the market and the card reader, how to choose a safe, reliable products? How do users spend a minimum price from the sensor card technology to upgrade to contactless smart card technology? This is also a concern for many users.

Product Selection

Choice of profession and access control card reader

Speaking of professional, business or project may have a lot of users find it difficult to have a scale, personal feel that the following factors should be taken into account. Follow the ISO standard: 13.56MHz contactless smart card, usually 4 ISO standard: ISO14443A, ISO14443B, ISO15693, ISO18000.

ISO standards are each composed of four parts, such as: physical size, frequency, power and signal interface, initialization and anti-collision and Transport Protocol, and so on. And the card reader to follow the ISO standards in the performance of the user is directly in front of the card reader and the reader distance, speed communications, and so on, such as: ISO15693 in line with the products than the products in line with ISO14443 further reading From the card, but the communication speed slower than the ISO14443. As with the access cards and card readers, among them the volume of data transmission is very small, any ISO standard rate sufficient to meet the communications requirements, but if there are more distant from the reader to be the most convenient Therefore, in line with the ISO15693 standard option cards and card readers for access control system users will be more convenient. However, if the user to carry out, such as fingerprint, iris and palm-shaped, and other biometric authentication, and the biometric templates stored on the card, it is necessary to choose products that meet the ISO14443 standard, because biometric template there is a larger amount of data. Some products may be more than the same time, in line with ISO standards, such as: HID's iCLASS products. HIDiCLASS cards in general iCLASS card reader on the ISO15693 standard used to be distant from the reader; but with a card, close to the iCLASS fingerprint reader will automatically ISO14443B standards for high speed communications.

How to Choose a Security Door

Installed anti-theft door at home but often stolen how the security door can really play a security role, the experts may wish to listen to the presentation.

Price Quality

As the saying goes, the price of a one freight, of course, do not rule out the possibility of business to make money, but as long as the quality of the hardware, this is a grain of truth. At present, there are two to three hundred dollars to sell anti-theft doors, to let an expert accounts, a qualified anti-theft lock in the price of hundred dollars more than the current anti-theft door manufacturer concentrated in the area in Zhejiang, Shaanxi Province to Zhejiang The freight will take about 40 yuan, plus installation costs 20 yuan, the city transport costs around 20 yuan, the door itself is not the cost of its additional costs have nearly 200 yuan, so the quality of such a door can be imagined. Industry experts Yucai Yang, qualified the security door of their normal price should not be less than 800 yuan bottom line.

There are also anti-theft door "ID card"

Qualified security door should have three "card." First, the local public security departments for the record books, and we must pay attention to whether the life of. Secondly, the product testing report. At present, the Ministry of Public Security and General Administration of Quality Supervision authorized testing agencies have seven, respectively, in Sichuan, Beijing, Shaanxi, Guangzhou, Wuhan, Shanghai, Shenyang, and is only valid for two years, expired null and void. Third, the lock detection separate report should be dedicated to anti-theft locks, is valid for two years, expired null and void.

From the outside to watch quality

In addition, when consumers can buy through their own testing to determine the quality of security door. First of all, due to the plate, the larger framework, such as weight, the weight of anti-theft doors in more than 60 kg. Second, turn off the sound when they should be very boring at the same time due to the thick steel plate is not easily deformed, so the gap after the installation of a more even, no small deformation of the phenomenon. Once again, tapping his hand on the surface of the door, issued a dull voice, its steel skeleton is not a filler, the steel skeleton of a normal voice should be clear. Finally, although the countries do not have clear anti-theft door without handrails, but the experiment proved that the handrails will be more and more of a force, it reduces the abnormal opening of the difficulty of the anti-theft outside the table so it is better not to add a good arm.

The more complex the key, the better

The key to the complexity of a direct impact on the structure of the anti-theft lock, the key to cross than the flat-key lock of the internal structure of much more complex, cross-lock four directions are billiards, and the lock plate as long as both sides have to billiards, in the same Under the best conditions for cross-lock option. Also the longer the key, the key point of convex-concave surface of the more complex the lock that the internal structure of the more complex the abnormal opening, the higher the degree of difficulty.

Security Enterprises Focus on China Security Business

2008 China International Exhibition on Public Safety and Security was held on December 9, 2008. World famous security enterprises such as GE, Honeywell, Siemens, Samsung Electronics, Samsung Optoelectronics, Ingersoll-Rand, Panasonic products attended the the security trade show.

During the exhibition, the access control, surveillance and alarm equipment were also be invited to experience to the public free of charge.

China is to build the social security system which provides a rare opportunity to the global security industry.