This document discusses intelligent surveillance systems for villas. It describes 6 main components: 1) intelligent video surveillance in public areas, 2) intelligent management of personnel and vehicle access, 3) perimeter dynamic environment surveillance, 4) intelligent electronic patrol systems, 5) household emergency alarm systems, and 6) GSM wireless smart home alarm systems. For each component, it provides examples of implementation and lists relevant core products like IP cameras, network video recorders, video servers, decoders, access control systems, fiber optic sensors, patrol management systems, and alarm panels/receivers. The goal is to integrate these solutions to provide comprehensive security and management for villas and their surrounding areas.
A complete intelligent Surveillance system is composed of anti-technology systems, physical defense systems, air defense systems three systems interact with each other to complete the security complex.
Abnormal behavior analysis system with people (drunk faint, run, mob, climbing, etc.), to detect unknown legacy items, personal care items of property, access to automatic vehicle identification management, hazardous staff stay hovering automatic alarm, automatic intelligent video, electronic positioning display, alarm linkage function.
System uses artificial intelligence techniques to monitor the area of road villa temporary parking area and a full range of Surveillance, can effectively gather personnel, wandering, falls, objects left behind and the vehicle stop chaos, swerved retrograde, abnormal obstruction conduct real-time Surveillance and early warning, once the abnormal situation, security personnel can be divert personnel and vehicles, handling lost items in the first time. Can effectively prevent the occurrence of accidents, improve service levels of the property.
Effective use of smart identification technology to ensure personal and property safety club guests, to avoid all kinds of disputes, increase the processing capacity of emergencies. Real-time Surveillance system capable of working conditions cashier, intelligent analysis of human behavior, valid for trailing, theft early warning of suspicious persons on lost legacy item for Surveillance and early warning. Real-time cashier's job status records for suspicious persons close out the cashier, desk early warning.
Use of network-compatible high-definition cameras scalability, access to temperature and humidity, smoke, gas and other sensors, the system can effectively occur on the indoor temperature, smoke, sparks and other phenomena in real-time warning. Pickups and loudspeakers with easy access into the control room staff on duty in a timely manner and warning staff positions for two-way conversation, so that security personnel can be the first time for the staff to help the needy, improve property staff to respond to emergencies handling capabilities and service levels, while providing attentive and thoughtful service for the owners.
System uses a moving object tracking technology, legacy unknown object detection technology, personnel stay hovering technology, enabling real-time Surveillance Square, effectively prevent people wandering stay in the square, retention, staff and other illegal intrusion anomalies in real-time warning of dangerous goods, and displayed in real time via electronic positioning systems, security personnel may be the first time the abnormal situation for processing, to ensure safety in public places.
Using the video tag and storage technologies. In the alarm signal, the video storage, while abnormal behavior in the video, identify objects, and extracts the key information useful for event classification, according to the event can be retrieved afterwards and convenient.
Advanced intelligent early warning Surveillance technologies. Proactively in real time on the video, alarm information collected for intelligence analysis, to identify and distinguish objects define event types, identification of abnormal behavior, automatic warning in time. Abnormal condition occurs before the complete site alarms, alerts and prompts alarm attendant be reviewed, processed, truly trouble.
The use of advanced intelligent image recognition and comparison of the combination of remote RFID identification technology, both accurate, fast and convenient access to vehicles and personnel in the region, while staff can effectively prevent the invasion of illegal vehicles.
Explain the difference between the control terminal equipment and bayonet terminal server, windows system with the client, capture plus terminal functions can be composed of independent systems, a single gateway platform to manage without.
Emphasize the platform to do recording function; 1, no mechanical contact between the RFID tag and reader, avoiding the various failures arising due to exposure reading. Normal life of more than 10 years. 2, the use of non-contact communication, pedestrians reader within 10cm-25cm range even further to complete the reading of labels. Car tag of up to 25 meters. 3, when the RFID tag has a unique number shipped, can not be changed. 4, RFID tags exist fast anti-collision mechanism to prevent interference between the data card, so the terminal can handle more than one label. 5, RFID tags can set multiple permission levels, increasing the security of the entire system is running.
When the fiber-optic sensor is subjected to external disturbances, some characteristics of the fiber will change in the transmission of light through a special sensing device configuration, after the signal acquisition and analysis, will be able to detect characteristics of light (ie attenuation, phase, wavelength, polarization ,) change the mode field distribution and propagation time. Changes in the characteristics of the light through special processing algorithms and analyze alarm controller to distinguish normal interference with third-party intrusion achieve alarm and positioning.
Installed on the fence, buried, the installation on the wall. Alarm control unit for each zone can climb the fence and cut the fence behavioral conduct intelligence analysis, sensor signal in the time domain and frequency domain processing to achieve, to ensure the system has a strong ability to identify, can filter out most of the false alarm sources. Can make security systems functioning in windy environments, but also work well in a storm environment, in some special cases, the system can be flexibly configured with the software. As the fiber itself is not conductive, so it will not damage the lightning. Electromagnetic signals, radar signals, radio signals, high-voltage electrostatic signals in strong electric and magnetic environment to work properly.
A full range of perimeter Surveillance solutions. Using the latest optical fiber vibration perimeter intelligent Surveillance technology to achieve the various regions of the cell-weather intelligence Surveillance.
When laying the cable on the iron, because iron hard, should increase the number of sensing cable to ensure reliable sensing intrusion signal. By analyzing the characteristics of an intruder moves over the fence along the top and bottom of wrought iron levels iron railings each laying a fiber optic sensing.
If an intruder uses climb way into vibration is generated in this process is extremely weak, the sensor cable to the sensor signal is not sufficient as a basis for judging the invasion, so the way to prevent this invasion, the network must be installed on the wall buckle, sensing area to increase strength and vibration.
Patrol management system functions as well as from the terms of the objectives to be achieved, there are three fundamental elements: patrol officer, patrol locations, patrol time. For the administration, full control of these three elements is serious work and supervise security personnel to promote effective management of safety carried out by means of air defense.
Patrol management requires specialized patrol officers, according to the provisions of the Patrol Patrol line patrol, patrol every point has a unique marker, commonly used barcode labels, sealed with chip TM buttons, each patrol members arrived a patrol point, patrol reads markers with numbers, record numbers, and the current time. Read all records management center back through the computer, and can record generation Patrol report.
To achieve villas and other accidents or stolen, the police can make a deal for the first time to notify the property owner and the center. The system consists of three parts: 1, installed in each safe GSM alarm; 2, placed in a police station in the central station receiver GSM module connected via the USB interface on the computer (which need to insert an ordinary phone card); 3 installed in the computer software inside the alarm center. Just set up an alarm center is placed in the police station alarm point for each safe for unified management. Computer equipped with alarm center software, you can display the actual location and the floor by way of an alarm message content, real-time record for the alarm time. After receiving the printer, information and data can be Alarm Date Time. Extension print for future reference, reduce investment costs. With functional and practical, high quality, stable and reliable, is currently the most similar products and reliable security system.
Achieve fire, theft, fire safety unified Surveillance, preventive measures.
Do not answer the phone lines, not afraid of cutting line. When utility power fails and the backup power runs out and then re-calls, the system remains state before power-down settings. When the power cord is damaged or power failure due to other reasons, the system can continue to work spare lithium batteries will be automatically charged after the call. Power and power will be restored to normal text messages and phone call. Alarm system can send text messages to install three group addresses and categories, as well as three sets of phone call alarm and on-site Surveillance. The system can be remotely dispatched via remote alarm center and mobile phones
GSM receiver module mainly completes the GSM SMS data and voice dialing into a standard USB communication protocol functions, connected to the computer via USB composed of the central station.
It sets the alarm receiving, user database, GSM SMS, voice alarm phone alarm, instant print alarm information and other functions in one, it displays an intuitive interface, image, friendly and professional operation without knowledge, but without professional operators, learn to master fast, simple and easy to use. 1, the Surveillance center full-window interface to support multiple languages, fully display the operational status of the entire system. 2, the Surveillance center system capacity: 1,000 Surveillance points. 3, the system administrator must enter the system password after the system to do gymnastics 4, can clearly grasp the functionality through an icon in the menu interface. 5, with personal data registration, authorization, add, delete, modify, and query operations. 6, the administrator for each user according to the actual situation and the need to edit the map 7, system software can accurately differentiate between a variety of different types of alarm information.