Font Size: a A A

The Key Module Of Zhuhai Mobile Security Stereo Control Stepless Monitoring System Design

Posted on:2015-12-30Degree:MasterType:Thesis
Country:ChinaCandidate:Q H LiFull Text:PDF
GTID:2348330485993594Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of communication industry, the base station and the development of more and more service department of Mobile Corporation of Zhuhai, throughout Zhuhai, the security environment has become more and more complex, to ensure that the company property security, security network monitoring is especially important. At present there are 110 Zhuhai Mobile Corporation alarm system, video monitoring system 8 sets of security m onitoring system, but all system s are run independently, the management difficulty is big, the front-end monitoring equipment to network to realize centralized control and management, directly affects the safety emergency efficiency, it is difficult to meet the needs of the develop ment of the company. Aiming at the problem of security monitoring of Mobile Corporation of Zhuhai, combined with the actual needs of Zhuhai Mobile Corporation security work, through theory, in-depth study on intelligen t security networking theory, and to participate in the Zhuhai m obile "security stereo control stepless monitoring system" of the company level project, mainly responsible for the design and Implementation of the key modules of the system. This paper mainly uses B/S architec ture, multilevel network structure, Java language, Oracle database technology, has com pleted the control platform software function security stereo control stepless m onitoring system in equipment management module, real-time monitoring module, system management module and other key modules and the realizat ion of the. And the control platform to carry out the function key m odule test, confirmed the completeness and reliability of the key modules of the platform function of stereo control stepless co ntrol security monitoring system.
Keywords/Search Tags:Security, Mobile communication, Monitor
PDF Full Text Request
Related items