Font Size: a A A

Design And Implementation Of Security Management System

Posted on:2020-06-22Degree:MasterType:Thesis
Country:ChinaCandidate:Z W SunFull Text:PDF
GTID:2428330626457008Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Security companies have early introduced the application,based on the C/S model(Client/Server,client/server mode).When dealing with security business,it is only handled by the security company.When dealing with security affairs,we must contact the colleagues at the PC side.The settlement affects the efficiency of the security company.After repeated studies by security company technicians,we decided to rebuild the application systemThis paper introduces the construction process of security company's application system.The paper first analyzes the research and application status of the security company application system,and then communicate with the staff of the security company application system,and confirm the functional requirements of the application system of the security company,which are composed of information management,accident management,inspection and Intrusion Management and security management and so on,and determine the performance list.Mark.Based on the demand plan,the application system design of security company is completed,which includes the overall framework design,process design and function module division.Then,the implementation of security company's application system is completed according to the design plan.The system has the following innovation points:first,on the basis of analyzing the defects of traditional face recognition algorithm,this paper proposes an improved face recognition algorithm based on PCA technology.Secondly,in order to improve the efficiency of video surveillance,we introduce the compression technology and H.232 protocol,which can improve the efficiency of visual frequency transmission.Finally,it is based on third parties.The automatic alarm function of gateway technology will automatically alarm when illegal persons invade key areas.Finally,the system meets the application requirements of security companiesAt present,the application system of the security company has been completed and applied to the security company,which effectively improves the work efficiency.
Keywords/Search Tags:Security company, PCA technology, face recognition algorithm, video surveillance
PDF Full Text Request
Related items