The so-called Internet of Things means that the use of sensor technology, including but not limited to radio frequency technology, video technology, audio technology, etc., to achieve the collection of object information, in accordance with the agreement, rely on network technology, including but not limited to GPS positioning technology, Internet technology, 3G technology, etc., transports various information of objects to a storage platform, classifies and statistics the object information through intelligent processing technology, thereby realizing the intelligent management of objects.
Wang Jianzhou, President of China Mobile, further elaborated on the characteristics of the Internet of Things in the two conference proposals “Developing Internet of Things and Promoting Informatization.†The proposal states that the Internet of Things has three main features: comprehensive perception, reliable transmission, and intelligent processing: “Comprehensive perception "Is the use of radio frequency identification (RFID), sensors, locators and two-dimensional code and other means to collect and acquire information at any time and place; "reliable transmission" refers to the integration of the Internet through various communication networks, to the received Object information is transmitted remotely in real time for various effective processing. “Intelligent processing†refers to the use of cloud computing, fuzzy identification, and other intelligent computing technologies to analyze and process the massive amounts of data and information received at any time. Intelligent control of all types of objects.
According to the above definition and related explanations, a large number of products and technologies that we are using in the security industry have very obvious characteristics of the Internet of Things. It can be said that the security industry is a very concentrated and typical area of ​​application of the Internet of Things. In this field, the monitoring and management platform is inextricably linked with the Internet of Things due to its core position in the industry.
The monitoring and management platform is the core of the security monitoring system. Signals of front-end devices such as cameras and alarm sensors are processed and uploaded to the monitoring and management platform through the IP network. The platform is managed, controlled and distributed by the platform. Logically, the monitoring and management platform needs to implement functions such as access and management of all devices, user access and authentication, management of various security monitoring resources, control of service functions, and media distribution and forwarding. For users, only by logging in to the monitoring and management platform, unified monitoring and calling of the entire network can be realized.
The development of the Internet of Things will have a profound impact on the monitoring and management platform. One of the most important ones is to promote the improvement of various resource integration capabilities of monitoring and management platforms, including integration of various types of sensing technologies, integration of traditional security applications, and intelligence. Analysis of business integration and image information integration and other aspects.
The integrated sensing of various sensing technologies is the basis of the Internet of Things. Various types of sensing technologies, sensing products, and even sensing systems are widely used in the Internet of Things. This will surely promote the deep integration of the monitoring management platform with these sensing technologies and products. From the perspective of current and future development, the need for sensing technology integrated with the monitoring and management platform and typical industrial applications will involve a very large number of areas.
The first is RFID. Many industries involve the integration of RFID applications with video surveillance applications. In the logistics industry, the integration of RFID and video surveillance can improve supply chain visibility by integrating data (such as date, time, or serial number) in RFID tags into video images that can be read by users through the integration of platform software. Labels, products can also be seen in real time; RFID tags can automatically record the position of products in the supply chain. By integrating video images, packages and even all trays can be identified at any particular point; the combination of RFID and video images can not only The location of the product is provided, and the current status of the product is also provided. Until the product is delivered, it can be tracked along the way. In the prison industry, the integration of RFID and video surveillance can improve regulatory efficiency and security: professional RFID devices such as handcuffs and anklets are used as information carriers to distinguish and identify people in custody, to manage information in every person in the system and to everyone in reality. Correspondence, convenient target supervision, video surveillance integration with the system, and image supervision can be combined on the basis of personnel location supervision. In the retail industry, RFID technology is used to monitor the position and movement of employees, and then combined with information and video surveillance images to obtain shoppers and their more accurate images of communication with employees, helping retailers to better manage Employee performance and accurate analysis of customer shopping information.
The second category is various alarm sensing technologies. In the field of traditional security, various sensing devices such as smoke, temperature, pressure, and infrared are widely used. With the development of the Internet of Things smart home, these alarm sensing applications will become more popular. The alarm signals generated by these sensing devices can be integrated through the monitoring management platform and uploaded to the monitoring alarm center synchronously with the images. Then the alarm linkage of the monitoring management platform is used to send out various sound and optoelectronic alarms, and at the same time, the images are switched and recorded and stored.
The third category is power environment monitoring technology. In the power industry, there are many unattended substations. Apart from the need to monitor images and sounds, these substations also need to monitor the power environment information of substations so that they can handle emergencies when problems arise. The actual deployment usually includes the following parts: Deploy monitoring cameras at gates, perimeters, computer rooms and substations, etc. to collect images of internal and external monitoring sites in substations; deploy access control, smoke, temperature, infrared and other alarms at entrances of entrances, interiors of computer rooms, etc. Sensing device to achieve fire prevention, anti-theft detection; and power environment monitoring system is responsible for the collection of field transformers, lines, switches, circuit breakers, instrumentation and other equipment operation failure and on-site voltage, current, temperature and other operating environment parameters. After the monitoring management platform is integrated with the above alarm device and environmental dynamic monitoring system, once the alarm or monitoring parameter is abnormal, the platform can be linked and the sound and light alarm, image switching and video control can be performed at the dispatch center. Through information superposition, the user can At the same time see the image and power data information to achieve visual control. In the telecommunications/IT ​​industry, the monitoring of its communications room is similar to the above-mentioned unattended substations, but also involves superposition and integration of monitoring images and power environment. In addition, the environmental protection industry also has similar application requirements. Through the integration of the monitoring and management platform and the environmental monitoring system, the regulatory authorities can visually observe the real-time pollution index of sewage and waste gas while observing the real-time images of pollution sources of polluting enterprises.
Integration of other sensing technologies. In addition to the above common sensing applications, there are many other sensing technologies that need to be integrated with the monitoring management platform to meet industry-specific requirements. Among them, GPS positioning is a very widely used one. Through the integration of the monitoring management platform with GIS and GPS, users can visually display all networked video images on an electronic map. For mobile objects, the GPS information and image information uploaded through the target can be used. Simultaneous display of images, current real-time location, and historical movement trajectories improves command decision-making and rapid response. This will become more and more popular in public security operations such as security management, police deployment, patrolling, and security guards.
The integrated security of traditional security applications involves a wide range of fields. Prisons, finance, education, public security, and many other industries often deploy various independent security subsystems such as video surveillance, alarm, access control, intercom, and patrol. These security subsystems will also be involved in future Internet of Things applications, and they are part of the Internet of Things in the broadest sense.
With the continuous development of security construction and the continuous popularization of security applications, the problems of independent security subsystems have gradually emerged. First, the security subsystems are independent of each other and lack of linkage. In the event of an emergency, they cannot effectively perform early warning and defense. Second, the various security systems are independently managed, the management and maintenance are inefficient, and the police and material resources are wasted.
Through the integration of monitoring management platforms and these traditional security applications, various security subsystems such as video surveillance, alarm, access control, intercom, and patrol can be fully integrated. On the one hand, unified management of these security subsystems can be realized, and management efficiency can be improved. On the other hand, the linkage between the video surveillance subsystem and other security subsystems is implemented to improve the joint defense capabilities of each subsystem and traceability afterwards.
Typical industries such as the prison industry, through the linkage of the alarm system and the monitoring system, when the alarm occurs, the automatic linkage video monitor emits audible photoelectric warning, switches the alarm point image to the wall, performs image capture, starts video storage, and pops up a series of pre-processing plans. operating. Through the linkage between the access control system and the monitoring system, when people enter or exit the access control, they will automatically capture the live image and start the video storage, and record the information of the personnel in and out. These linkages not only enhance the ability of real-time defense, but also provide intuitive information correspondence for subsequent queries.
In the education industry, the most typical is the application of integrated card and video surveillance. In the future, combined with the school’s management information system, students will be able to pass video surveillance systems from the time they enter the school gates, to swiping cards in the cafeteria, shopping in stores, entering teaching buildings/library/dormitories, and disputes with others. Finding corresponding image records greatly improves management efficiency.
Integration of comprehensive image information In recent years, the concept of digital city has been repeatedly mentioned and has been included in the planning goals of many cities. In the future, the most typical application of IoT will be embodied in digital cities. The image is an important part of the digital city, and it is also the most frequent part of the integration of the Internet of Things. Where do these images come from? The most realistic is that a small number of new buildings are built, and most of the existing old image resources are used, including government, public security, finance, transportation, and various social image resources.
For such large and diverse image resources, such as analog monitoring, DVR monitoring, network monitoring, wireless monitoring, mobile phone monitoring, social security monitoring and video conferencing, how to carry out unified management and centralized sharing will be a solution for digital cities. important question.
With the development of networking, the use of surveillance management platforms to achieve image integration and integrated application of image information is becoming an effective way to solve this problem: through the management platform, it realizes the integration of various image resources in both vertical and horizontal dimensions. Sharing, building a ubiquitous image resource large networking platform, eliminating information islanding caused by independent deployment and standard differences, and improving image application efficiency.
Longitudinal is through cascaded networking to achieve the seamless docking of the lower and upper levels of the entire system, and to achieve superior freedom of the lower level of image resources. In the horizontal direction, the access and integration of related image resources are realized through different media gateways, whether analog, digital, network, wired or wireless, all can be accessed on the same platform, and ultimately provided by the platform according to the upper application. Unified scheduling and distribution.
Integrated intelligent image analysis of intelligent analysis services is also a type of sensing technology. Traditional sensing technologies implement information analysis and perception through explicit sensing devices, while intelligent image analysis is based on the intelligent analysis of current images. To perceive relevant information.
Intelligent image analysis is of far-reaching significance both for video surveillance and for the Internet of Things. It can help image workers to free themselves from tedious operations and massive information and help them manage more efficiently and accurately. And use image resources.
At present, more applications for intelligent image analysis are mainly embodied in video surveillance. The result of the analysis of the current image by the intelligent service module can be uploaded to the management platform in real time, and relevant linkage is implemented by the platform. Combining different industries, intelligent image analysis will have different targeted applications. For example, in the public security/traffic industry, intelligence analysis can be used to achieve illegal intrusions, crossing security lines, illegal parking, theft of items, leaving behind suspicious objects, and personnel/vehicle detention. Detection and analysis of various abnormal conditions, such as abnormal accumulation, can be applied to the regulatory industry, such as cordoning, warning zone, and camera protection.
Concluding remarks With the increase in demand and the popularity of applications, the comprehensive perception, reliable transmission and intelligent processing advocated by the Internet of Things will be most vividly reflected in the security field. Among them, as the core of the security field, the monitoring and management platform will surely achieve comprehensive improvement of various information integration capabilities in the process of the gradual popularization of the Internet of Things. The new world brought by the Internet of Things is looking forward to the entire security field.
Wang Jianzhou, President of China Mobile, further elaborated on the characteristics of the Internet of Things in the two conference proposals “Developing Internet of Things and Promoting Informatization.†The proposal states that the Internet of Things has three main features: comprehensive perception, reliable transmission, and intelligent processing: “Comprehensive perception "Is the use of radio frequency identification (RFID), sensors, locators and two-dimensional code and other means to collect and acquire information at any time and place; "reliable transmission" refers to the integration of the Internet through various communication networks, to the received Object information is transmitted remotely in real time for various effective processing. “Intelligent processing†refers to the use of cloud computing, fuzzy identification, and other intelligent computing technologies to analyze and process the massive amounts of data and information received at any time. Intelligent control of all types of objects.
According to the above definition and related explanations, a large number of products and technologies that we are using in the security industry have very obvious characteristics of the Internet of Things. It can be said that the security industry is a very concentrated and typical area of ​​application of the Internet of Things. In this field, the monitoring and management platform is inextricably linked with the Internet of Things due to its core position in the industry.
The monitoring and management platform is the core of the security monitoring system. Signals of front-end devices such as cameras and alarm sensors are processed and uploaded to the monitoring and management platform through the IP network. The platform is managed, controlled and distributed by the platform. Logically, the monitoring and management platform needs to implement functions such as access and management of all devices, user access and authentication, management of various security monitoring resources, control of service functions, and media distribution and forwarding. For users, only by logging in to the monitoring and management platform, unified monitoring and calling of the entire network can be realized.
The development of the Internet of Things will have a profound impact on the monitoring and management platform. One of the most important ones is to promote the improvement of various resource integration capabilities of monitoring and management platforms, including integration of various types of sensing technologies, integration of traditional security applications, and intelligence. Analysis of business integration and image information integration and other aspects.
The integrated sensing of various sensing technologies is the basis of the Internet of Things. Various types of sensing technologies, sensing products, and even sensing systems are widely used in the Internet of Things. This will surely promote the deep integration of the monitoring management platform with these sensing technologies and products. From the perspective of current and future development, the need for sensing technology integrated with the monitoring and management platform and typical industrial applications will involve a very large number of areas.
The first is RFID. Many industries involve the integration of RFID applications with video surveillance applications. In the logistics industry, the integration of RFID and video surveillance can improve supply chain visibility by integrating data (such as date, time, or serial number) in RFID tags into video images that can be read by users through the integration of platform software. Labels, products can also be seen in real time; RFID tags can automatically record the position of products in the supply chain. By integrating video images, packages and even all trays can be identified at any particular point; the combination of RFID and video images can not only The location of the product is provided, and the current status of the product is also provided. Until the product is delivered, it can be tracked along the way. In the prison industry, the integration of RFID and video surveillance can improve regulatory efficiency and security: professional RFID devices such as handcuffs and anklets are used as information carriers to distinguish and identify people in custody, to manage information in every person in the system and to everyone in reality. Correspondence, convenient target supervision, video surveillance integration with the system, and image supervision can be combined on the basis of personnel location supervision. In the retail industry, RFID technology is used to monitor the position and movement of employees, and then combined with information and video surveillance images to obtain shoppers and their more accurate images of communication with employees, helping retailers to better manage Employee performance and accurate analysis of customer shopping information.
The second category is various alarm sensing technologies. In the field of traditional security, various sensing devices such as smoke, temperature, pressure, and infrared are widely used. With the development of the Internet of Things smart home, these alarm sensing applications will become more popular. The alarm signals generated by these sensing devices can be integrated through the monitoring management platform and uploaded to the monitoring alarm center synchronously with the images. Then the alarm linkage of the monitoring management platform is used to send out various sound and optoelectronic alarms, and at the same time, the images are switched and recorded and stored.
The third category is power environment monitoring technology. In the power industry, there are many unattended substations. Apart from the need to monitor images and sounds, these substations also need to monitor the power environment information of substations so that they can handle emergencies when problems arise. The actual deployment usually includes the following parts: Deploy monitoring cameras at gates, perimeters, computer rooms and substations, etc. to collect images of internal and external monitoring sites in substations; deploy access control, smoke, temperature, infrared and other alarms at entrances of entrances, interiors of computer rooms, etc. Sensing device to achieve fire prevention, anti-theft detection; and power environment monitoring system is responsible for the collection of field transformers, lines, switches, circuit breakers, instrumentation and other equipment operation failure and on-site voltage, current, temperature and other operating environment parameters. After the monitoring management platform is integrated with the above alarm device and environmental dynamic monitoring system, once the alarm or monitoring parameter is abnormal, the platform can be linked and the sound and light alarm, image switching and video control can be performed at the dispatch center. Through information superposition, the user can At the same time see the image and power data information to achieve visual control. In the telecommunications/IT ​​industry, the monitoring of its communications room is similar to the above-mentioned unattended substations, but also involves superposition and integration of monitoring images and power environment. In addition, the environmental protection industry also has similar application requirements. Through the integration of the monitoring and management platform and the environmental monitoring system, the regulatory authorities can visually observe the real-time pollution index of sewage and waste gas while observing the real-time images of pollution sources of polluting enterprises.
Integration of other sensing technologies. In addition to the above common sensing applications, there are many other sensing technologies that need to be integrated with the monitoring management platform to meet industry-specific requirements. Among them, GPS positioning is a very widely used one. Through the integration of the monitoring management platform with GIS and GPS, users can visually display all networked video images on an electronic map. For mobile objects, the GPS information and image information uploaded through the target can be used. Simultaneous display of images, current real-time location, and historical movement trajectories improves command decision-making and rapid response. This will become more and more popular in public security operations such as security management, police deployment, patrolling, and security guards.
The integrated security of traditional security applications involves a wide range of fields. Prisons, finance, education, public security, and many other industries often deploy various independent security subsystems such as video surveillance, alarm, access control, intercom, and patrol. These security subsystems will also be involved in future Internet of Things applications, and they are part of the Internet of Things in the broadest sense.
With the continuous development of security construction and the continuous popularization of security applications, the problems of independent security subsystems have gradually emerged. First, the security subsystems are independent of each other and lack of linkage. In the event of an emergency, they cannot effectively perform early warning and defense. Second, the various security systems are independently managed, the management and maintenance are inefficient, and the police and material resources are wasted.
Through the integration of monitoring management platforms and these traditional security applications, various security subsystems such as video surveillance, alarm, access control, intercom, and patrol can be fully integrated. On the one hand, unified management of these security subsystems can be realized, and management efficiency can be improved. On the other hand, the linkage between the video surveillance subsystem and other security subsystems is implemented to improve the joint defense capabilities of each subsystem and traceability afterwards.
Typical industries such as the prison industry, through the linkage of the alarm system and the monitoring system, when the alarm occurs, the automatic linkage video monitor emits audible photoelectric warning, switches the alarm point image to the wall, performs image capture, starts video storage, and pops up a series of pre-processing plans. operating. Through the linkage between the access control system and the monitoring system, when people enter or exit the access control, they will automatically capture the live image and start the video storage, and record the information of the personnel in and out. These linkages not only enhance the ability of real-time defense, but also provide intuitive information correspondence for subsequent queries.
In the education industry, the most typical is the application of integrated card and video surveillance. In the future, combined with the school’s management information system, students will be able to pass video surveillance systems from the time they enter the school gates, to swiping cards in the cafeteria, shopping in stores, entering teaching buildings/library/dormitories, and disputes with others. Finding corresponding image records greatly improves management efficiency.
Integration of comprehensive image information In recent years, the concept of digital city has been repeatedly mentioned and has been included in the planning goals of many cities. In the future, the most typical application of IoT will be embodied in digital cities. The image is an important part of the digital city, and it is also the most frequent part of the integration of the Internet of Things. Where do these images come from? The most realistic is that a small number of new buildings are built, and most of the existing old image resources are used, including government, public security, finance, transportation, and various social image resources.
For such large and diverse image resources, such as analog monitoring, DVR monitoring, network monitoring, wireless monitoring, mobile phone monitoring, social security monitoring and video conferencing, how to carry out unified management and centralized sharing will be a solution for digital cities. important question.
With the development of networking, the use of surveillance management platforms to achieve image integration and integrated application of image information is becoming an effective way to solve this problem: through the management platform, it realizes the integration of various image resources in both vertical and horizontal dimensions. Sharing, building a ubiquitous image resource large networking platform, eliminating information islanding caused by independent deployment and standard differences, and improving image application efficiency.
Longitudinal is through cascaded networking to achieve the seamless docking of the lower and upper levels of the entire system, and to achieve superior freedom of the lower level of image resources. In the horizontal direction, the access and integration of related image resources are realized through different media gateways, whether analog, digital, network, wired or wireless, all can be accessed on the same platform, and ultimately provided by the platform according to the upper application. Unified scheduling and distribution.
Integrated intelligent image analysis of intelligent analysis services is also a type of sensing technology. Traditional sensing technologies implement information analysis and perception through explicit sensing devices, while intelligent image analysis is based on the intelligent analysis of current images. To perceive relevant information.
Intelligent image analysis is of far-reaching significance both for video surveillance and for the Internet of Things. It can help image workers to free themselves from tedious operations and massive information and help them manage more efficiently and accurately. And use image resources.
At present, more applications for intelligent image analysis are mainly embodied in video surveillance. The result of the analysis of the current image by the intelligent service module can be uploaded to the management platform in real time, and relevant linkage is implemented by the platform. Combining different industries, intelligent image analysis will have different targeted applications. For example, in the public security/traffic industry, intelligence analysis can be used to achieve illegal intrusions, crossing security lines, illegal parking, theft of items, leaving behind suspicious objects, and personnel/vehicle detention. Detection and analysis of various abnormal conditions, such as abnormal accumulation, can be applied to the regulatory industry, such as cordoning, warning zone, and camera protection.
Concluding remarks With the increase in demand and the popularity of applications, the comprehensive perception, reliable transmission and intelligent processing advocated by the Internet of Things will be most vividly reflected in the security field. Among them, as the core of the security field, the monitoring and management platform will surely achieve comprehensive improvement of various information integration capabilities in the process of the gradual popularization of the Internet of Things. The new world brought by the Internet of Things is looking forward to the entire security field.
Easy Glass Railing,U-Groove Glass Railing,Hardware Glass Railing,Frameless Aluminum Glass Railing
Ningbo Unikim Metal Products Co., Limited , https://www.unikimrailing.com