1. Factory perimeter anti-crossing alarm
The design of the perimeter anti-crossover alarm system in the factory area adopts the perimeter anti-crossover active infrared on-air alarm system to actively detect and locate illegal intruders in the surrounding area.
And the police to tell the security personnel which pair of shooting areas have happened, and prompt the security personnel to take action. Use infrared cameras and red walls
Arming with a combination of external firing. Based on the situation at the site and Party A's recommendations, the number of shots will reach 50 pairs.
Displayed on the map, while the surveillance camera can point to the problem location to view.
2. CCTV surveillance
The main channel of the closed-circuit television monitoring system and the regional closed-circuit television monitoring are multiplexed to give an alarm when a situation occurs, using outdoor color zoom
Cameras or cameras with different illuminance and infrared night vision cameras installed in different scenes. The design system adopts the hard disk recording system of alarm linkage recording
It is used as alarm image storage and large-scale video matrix as central control system.
3. Intercom and Card (including anti-theft)
For effective management and control, peripheral management equipment is constituted by setting the management center machine and door machine, and the indoor unit design is selected to have networking function
Resident extensions, which can complete and expand the functions of the slave system, and can meet different needs and save the cost of adding different system functions.
investment. In addition to the video intercom function, this extension system can also implement the function of calling the property management center. Intercom partially achievable
Functions are: building video intercom, smart home security, community announcements, photo messages, appliance control, lighting control, three-meter query, community service
Services, home assistants, etc. Full Chinese interface, graphic display, touch screen operation lock control, monitoring, soft ringing, front door bell, call door guard, call
Call center, emergency help, wired and wireless zone alarm, MMS sending and receiving, call transfer, care function, mute and do not disturb, support touch screen operation
Make. The card part mainly considers practicality and durability, and is convenient for users.
The remote security monitoring
system uses digital network as the transmission medium and the core of the network video server. Comprehensive use of digital video processing technology,
Automatic control, network transmission technology, artificial intelligence and other technologies, not only have the fast video processing capabilities, digital information of ordinary security monitoring systems
The advantages of anti-interference ability, easy to query records quickly, and relying on the network to take advantage of the advantages brought by the broadband network, through the IP network, the monitoring
The video center and any point that can be connected to the network are interconnected to achieve the remote, centralized, real-time effect of the ideal closed-circuit monitoring system.
1.The structure is clear and simple: Because the monitoring host realizes the video matrix, drawing in the simulation system through the Xiangshi network video centralized monitoring system management software
The many functions of the device such as the surface splitter, and the video recording function through the computer hard disk, greatly simplify the system structure and high integration.
2. Simple management application: Since the digital monitoring
system is based on computers and network equipment, most of the system control and management functions are realized through computers.
There is no need to simulate many complicated equipment in the system, which reduces the management work intensity of operation and maintenance personnel.
3.Powerful operation functions: multiple display modes; multi-screen intelligent switching round tour; multiple early warning modes; real-time, timing, alarm trigger, and start at any time
Stop and wait for a variety of video recording methods; snap photos for printing; smart fast video playback query.
4.Simple monitoring and viewing: Due to the network-based characteristics of the all-digital network video centralized monitoring mode, there is no need to increase equipment investment.
Programs or local monitoring centers can monitor, record or play back one or more monitoring scenes in real time. Authorized networked computers can also
The monitoring function is now in place, which avoids the inconvenience and absence of supervision and management caused by the geographical distance.
5, extremely high security capabilities: image mask technology to prevent illegal tampering of video data; any authorized computer on the network can perform video backup
Effectively prevent malicious damage; Network failure and network disconnection cache function, effectively protect video data; Video interruption host alarm function; Authorized hierarchical management
Function; powerful log management function;
6.Infinite seamless expansion capability: The increase of surveillance cameras is mainly the increase of remote monitoring points on the front end, and the monitoring front end uses the IP address to mark
It just means that the IP address is expanded. The simple structure can form a huge multi-level monitoring network.