Job Recruitment Website - Property management - Intelligent property management scheme

Intelligent property management scheme

I have an article for you. There are too many words to understand. I'll give it to you in parts. The answer downstairs is my trumpet. Give me this large size if you want to give points.

security management system

The overall design principle of the security system: pay attention to perimeter prevention and eliminate community dangers; Emphasis on holistic prevention, that is, community-centered (not people-centered) prevention; Three-dimensional prevention, a combination of various preventive measures; "Do not disturb" prevention, that is, to minimize the disturbance to people and let the owners enjoy the service unconsciously; The principle of convenience allows users to use it in the simplest way.

In order to ensure the safety of every square meter of land, it is relatively insufficient to rely solely on the security system. It is necessary to establish a comprehensive monitoring system, form a comprehensive security command system within the community intranet, and strive to strengthen the safety awareness of personnel. Practice has proved that through the security alarm system combining civil air defense with technical defense, the community can be protected by comprehensive security system. The use of electronic security alarm system can greatly improve the police force of security center, effectively combat crime and prevent the occurrence of criminal incidents.

The safety management system includes:

Closed circuit television monitoring

Regional prevention system

Patrol management system

The CCMS safety management system unifies the software and hardware of the whole system, centralizes on a common control platform, and manages all subsystems in a unified way. It has the characteristics of centralized monitoring, centralized control, information sharing and linkage of various systems, and can set access rights of all channels and alarm response levels of all alarms.

1.c TV monitoring system

1. 1 system description

The CCTV monitoring system transmits the photographed images to the management center by setting front-end cameras at the entrances and exits of the community, main passages of the community, important entrances and exits of the community, important buildings and their surroundings, elevator cars and other areas. Conduct unified all-round monitoring, form a curtain-like warning surface to surround the community, and monitor the community in three-dimensional space, so that managers can fully grasp the dynamics of all parts of the community, prevent the occurrence of public safety incidents, and provide scientific basis for quickly eliminating all kinds of incidents.

In the intelligent system scheme, the primary problem to be solved by the integrated closed-circuit television monitoring system is the prevention of entrances and exits and perimeters. According to the different prevention areas mentioned above, this scheme adopts different monitoring and control methods.

The management center should set up a comprehensive monitoring center, equipped with equipment such as image display, switching control, recording and signal processing to realize the functions of image observation, acousto-optic linkage alarm, image storage and printing related data.

1.2 system design

The system is mainly composed of front-end camera and monitoring center, which is explained in advance below:

surveillance center

The CCTV closed-circuit monitoring system of this system adopts AD2150 matrix host, which is connected with the network controller of the whole system through RS-232 communication port to realize the seamless connection between the whole integrated system and CCTV system. All cameras and monitors can control their operations on the workstation, and the position of each camera can be marked on the workstation operation plan. If a camera is selected on the map, the real-time live image sent by this camera can be displayed immediately, so as to achieve the purpose of monitoring the area. At the same time, the system allows CCTV to perform screen display switching, pan/tilt direction rotation, lens zoom control and other operations on the same operation interface. Use two TL-300 long-time video recorders to record all the pictures; Through the 1 robot MX- 16I 16 screen splitter, two 19 "large-screen monitors are connected to the matrix, and the images of 16 cameras can be watched at the same time. All central equipment is placed in the control cabinet.

There is a sub-control center in the attorney general's office, which can conduct various inquiries and controls within the authority of the attorney general. For example, you can adjust the monitoring screen in real time and master the internal situation of the building.

headend equipment

Building entrance and exit

elevator cage

The entrance to the building

basement

Important department entrance and exit

The main equipment of CCTV monitoring system includes:

Matrix host

16 image splitter

Long time video recorder

Color (black and white) display

Color (black and white) camera

video distributor

Automatic aperture of lens

All-weather spherical cover, indoor protective cover and support.

1.3 system functions:

Monitor the main entrances and exits, main passages, parking lots and other important areas of the community;

The central monitoring system should adopt video display technology and be controlled, managed and recorded by computer. Each monitor can switch to watch any image signal at will, or preset the program to play automatically and circularly.

Alarm signal and camera interlock control, video recorder and camera interlock control;

Video loss and equipment failure alarm

By operating the keyboard, you can set the image display channel, picture retention time, time sequence switching combination mode, the number and level of TV cameras controlled by each control point, preset time/date/address subtitles superimposed on each camera picture, assign alarm monitors, set alarm cloth, and disarm the alert time. It also has the function of setting storage, which can still save all information after power failure;

Monitoring images can be switched automatically or manually;

The reserved sub-control interface can realize multi-center control (depending on the situation): the control system is provided with a main center controller and a sub-center controller to realize parallel control or group control. At the same time, the number and function of TV cameras controlled by the sub-center and the optimal level between controllers can be pre-programmed through the programming operation keyboard of the main center control room;

Computer integrated management: the system is linked with the alarm system, which automatically turns on the relevant TV camera and lighting power supply after the alarm, automatically switches the alarm screen to the pre-specified monitor, superimposes the characters of alarm date/time/information (alarm position and category), automatically turns on the video recorder to record the alarm on the spot, and the linked printer automatically prints alarm information and audible and visual alarm prompts; When giving an alarm, the position of alarm point, alarm image, alarm date and time are displayed on the general drawing displayed by the computer at the same time, so that the computer can fully control the working state of the whole system and give full play to the functions of the system and equipment.

1.4 Note:

Referring to the technical indicators of intelligent engineering, our company feels that the first problem to be solved is the quality of distributed video transmission of large surveillance cameras. According to the engineering experience, if the distance between the camera installation point and the central control room is more than 300 meters (when RG598/U video cable is used), the signal on the monitor in the central computer room will become very weak, the high-frequency attenuation will be more serious, and low-quality images will appear on the monitor. As mentioned above, before the video signal reaches the display, there are many factors that affect its intensity. In order to solve the above problems, we use high-quality special video cable for TV monitoring, and install balanced video amplifiers for individual long-distance cameras to compensate.

2. Regional prevention system

2. 1 system description

The design purpose of regional alarm system is to ensure the safety of people, property and other protected objects in the fortified area. Therefore, it is required that the alarm system in each area can call the intelligent management center for help, and when it may be infringed or needs emergency rescue, the intelligent management center can deal with it quickly according to the alarm information.

The system takes the indoor area as the main monitoring target, and takes more than two technical preventive measures in important positions and key indoor parts, mainly aiming at the possible exposure in some cases.

Theft, hijacking, emergency rescue and other illegal invasion

In other cases, detectors and alarm systems installed in the area will be triggered, and the alarm system will send alarm signals to the alarm center through transmission lines. The alarm modes of alarm system include automatic alarm and manual alarm.

2.2 system design

The regional alarm system of this scheme mainly realizes various alarms in the fortified area, including door magnetic alarm (illegal intrusion), panic button alarm (help), microwave infrared double detector alarm (illegal intrusion), glass breakage alarm, etc. According to the situation of Nanjing Cigarette Factory, in the design of this system, we installed infrared double identification detectors, door magnets, panic button and glass breakage detectors in the important areas you selected. Various probes are connected with the field controller (DDC).

Structure and function of front-end alarm system: Front-end alarm system is an alarm system installed in various fortified areas. It is composed of alarm detector and DDC, which can realize alarm and has alarm information memory function. DDC is connected with the management center through network transmission, forming a comprehensive prevention and alarm network system for the whole fortified area.

explorer

In the protected site, various detectors should be installed according to the actual situation. For example, infrared detectors, glass breakage detectors and door magnets are used to monitor human movement. Once illegally entering the site protection area, the detector monitoring the area is triggered, and the detector immediately sends an alarm signal to DDC and then to the factory management center. Similarly, once the scene of panic button, which is used to prevent robbery and theft, is disturbed by criminals, it can send an alarm signal to the management center by manually triggering the manual panic button without the knowledge of illegal intruders.

Control keyboard

Users can turn on and off the alarm prevention system by entering the 4-digit password of 1 through the keyboard. You can also perform simple arming/disarming by pressing the arming/disarming key. If the password is entered incorrectly for three consecutive times, the system will think that someone is trying to decipher the password of the system and will block the keyboard input of the system. The length of the blocking time is set by the user, and even if the correct password is entered during this time, the system cannot operate. The emergency alarm button used to prevent robbery and looting is generally set to a normally open state, and an alarm can be generated as soon as it is triggered.

Prevention area

The gate of each area is the first line of defense against invasion, so it is the first line of defense of the regional security system. Take secondary preventive measures for the prevention area of public lobby to prevent illegal intruders familiar with alarm system from breaking through the first line of defense and causing damage to users. The lobby and its surrounding passages and related parts are defined as the second area.

When the alarm system is prevented, the alarm is sent to the control and management center through the network, so that the alarm can be handled quickly. At the same time, it can notify other networking departments and get assistance from relevant departments (such as public security, electric power, fire protection, etc.). ) (as the case may be). From the investment point of view, the design of this kind of alarm system should not use inferior products to avoid frequent false positives and adverse effects. In order to meet this requirement, the location of alarm equipment in each area should be reasonably selected and fixed, and attention should be paid to the collocation and protection linkage between various alarm equipment, which not only ensures the accuracy of alarm monitoring, but also ensures the safety of alarm equipment itself. Therefore, in the scheme design of our company, in order to make users feel at ease and live comfortably at night, the following settings are made for the anti-alarm system:

Set infrared detectors in the lobby of the fortification area to monitor the status of the lobby;

Set a panic button where the user can reach, and trigger the alarm button in case of emergency;

Install a pair of door magnets inside the user's door to prevent burglary;

Set a glass breakage detector for the window.

System configuration:

Infrared dual identification detector

Broken glass detector

Panic Button

Door magnetism

Field controller

2.3 System functional characteristics

Alarm center

Monitor and record all kinds of information sent by users to the center, such as alarm events, defense/protection reports, fault reports, test reports, etc.

Synchronous map display: display the location of the user area in real time on the simulated electronic map of the prevention area;

Alarm processing function: record the time and place of alarm and the reason of probe alarm; Record the alarm process and record it; Forward the alarm to the superior police unit.

information management

Input, modify and print user information, query user information statistically, and establish user files;

Maintain the user's disarming and testing information in real time;

According to the type of receiving and handling the police and the nature of the police situation, we can find and count all kinds of alarm information, and the histogram statistics shows the reasons of all kinds of alarms and false alarms, automatically calculate the false alarm rate, assist the center management and reduce false alarms.

Other functions

A variety of alarm States can be set, including traffic permission prompt, no traffic alarm and system alarm;

The number and position of detectors can be expanded and adjusted at will according to users' requirements;

Can be linked with the intelligent door lock, and can be automatically removed/unfolded when the user opens/closes the lock;

Reports and logs can be generated and saved.

3. Patrol system

3. 1 system description

Patrol system is a powerful means to strengthen regional security and urge security guards to be loyal to their duties. The system requires security guards to patrol all the places in the community according to the scheduled time and route, especially some places that people rarely go to. The adoption of patrol management system can not only put an end to the incompetence of public security patrol personnel, but also effectively eliminate some hidden dangers of accidents before they happen. Patrol management system has the advantages of low cost, good effect, not easy to cheat, and has the advantages of real-time query and record, and has become a good safety management means at present.

The system collects the patrol situation of patrol personnel through special patrol switches controlled by controllers distributed in residential sites. Parameters such as patrol route, patrol time and patrol personnel can be set on the management software. Patrolmen must work in a fixed way. When patrolling, he will touch the button with the patrol key and send the patrol information (time, place and route) back to the central master computer, which will process, store and print the returned information. Through the electronic map of the floor in the computer, the corresponding floor plan can be directly called up when the alarm is given. Once the patrol operation does not conform to the regulations, the central computer workstation will immediately display relevant alarm information, including inconsistent patrol routes, morning/evening patrol points, patrol point alarm (alarm button alarm) and so on. It is convenient to generate relevant inspection reports for supervision.

The main advantages of this patrol system are:

Patrol information can be fed back in real time and can be queried and printed. The control mode is simple.

Low cost.

3.2 System design

The active system is designed with LCX800I data acquisition module and special patrol switch.

Lc800i data acquisition module: Each Lc800i can collect real-time inspection signals from eight locations in a decentralized way.

System configuration:

Patrol module

Patrol switch

situation

It is planned to set up patrol points around the building, key parts of the community and places with weak security precautions. The specific location of each point depends on the actual building management mode.

3.3 System functions:

Realize the setting and modification of patrol route;

Set and modify the patrol time;

Install patrol stations in important parts of the community and patrol routes;

The center can view and print the arrival time and working status of the patrol personnel;

Patrol violation record prompt.

Automatic management system of parking lot

1. 1 system principle

The system mainly controls the access of two kinds of cards: the registered card of the center and the temporary card (obtained from the card issuing machine or issued by the administrator). For the card registered in the center, the signal is recognized by the card reader and then transmitted to the channel controller. The channel controller opens the gate according to the signal, and decides to open/close the gate according to the vehicle entry and exit status detected by the auxiliary vehicle detector. At the same time, the workstation computer captures the images when the vehicle enters through the camera and the video comparison card for comparison when the vehicle exits. The central workstation records the entry time of the truck. When a car with a card comes out, the workstation computer automatically calls up the image when the car comes in, and the parking administrator compares it. If it does not match, it will be detained immediately.

For temporary cards, the controller only allows entry, not exit. When a vehicle with a temporary card shows the card to the card reader at the exit and asks to exit, the controller sends a prompt to the administrator of the exit booth, who compares the image taken by the vehicle with the image taken at the entrance and opens the door after the agreement.

1.2 system structure

The structure of the parking lot automation management system is as follows:

Imported card reader

Export card reader

Gated output

Induction card reader

invest

Parking entrance

Automatic card issuing machine

Because the parking lot management system adopts the same induction card technology as the gate of important departments, the parking lot, the gate and the canteen can all use the same card, which is convenient and safe, and truly realizes the function of "one card".

The automatic parking management system is mainly designed at two vehicle entrances and exits, one as a dedicated entrance and the other as a dedicated exit. The two gates of the parking lot system and the card reader are installed at these two entrances respectively. The parking lot of the office building is designed as above. It is suggested that the entrance and exit should be in the same place.

The specific operation flow chart of the parking lot system is as follows:

Entrance?

The vehicle enters the work area.

Do you already have a card?

Show the card to the reader.

Obtained from an automatic card reader or issued by an administrator.

Judge whether the card is valid?

The card reader sends the card information back to the computer.

Guide vane opening

Vehicle sensors detect vehicle traffic?

Gate closing

The vehicle leaves the work area

enter

Notify administrator to handle

No card

Youka

be invalid

effective

cross

The paragraph is not over yet.

The computer performs camera comparison and other work.

export

The vehicle enters the work area.

Show the card to the reader.

Alarm duty room

And send the information back to the computer.

Judge card information?

The card reader sends the card information back to the computer.

Guide vane opening

Vehicle sensors detect vehicle traffic?

Gate closing

The vehicle leaves the work area

enter the society

Didn't appear

be invalid

effective

cross

The paragraph is not over yet.

Return the temporary card to the management.

The manager opened the gate.

Temporary card

The computer performs camera comparison and other work.

System configuration:

personal computer

network controller

management software

control module

Automatic?Door?

Video contrast card

card reader

Vehicle detector ground loop.

1.3 features:

Large system capacity: the system can manage at least tens of thousands of cards by using a large database, which can prevent two cars from driving into the parking lot with the same card;

The system can also be implemented in parallel with the monitoring system and parking space retrieval system to achieve comprehensive management, and can be used in any form of parking lot after adding special equipment according to user requirements.

Linkage function: the system provides multiple output ports, which can be linked with CCTV monitoring and lighting system;

The card reader has the characteristics of flexible installation and strong environmental adaptability.

The system has power-off protection function, and the system data will not be lost when power is cut off;

Networking function: the system can share data with other systems to facilitate vehicle inquiry and data sharing in the parking lot;

Safety and reliability: Smart cards have strong anti-counterfeiting ability because of their unique reading and writing characteristics and safety performance. The information stored in them will not be lost or confused due to magnetic interference and external interference like magnetic cards, nor will it be troublesome due to the influence of head wear, magnetic powder shedding and dust. It will also avoid poor reading and writing caused by the exposure of contact ic card chips and card readers, so it can adapt to various environments and is reliable and durable.

Can be extended to the charging system: the charging standard is set by the manager, and the parking fee is automatically calculated by the computer and displayed to the driver through the electronic screen. The charge of each departing vehicle is confirmed and counted by computer, which puts an end to mistakes and cheating and protects the interests of parking lot investors. Intelligent parking lot attracts more customers through fair and fast service, and makes users willing to accept corresponding charges and increase their income.

Smart cards have considerable capacity, and each parking lot smart card provided by our company can manage attendance, personnel, water and electricity costs, club consumption and safety on the same card. When the amount on the smart card is almost used up, you can save money conveniently through the management center to realize reuse.

Image recognition function: through the linkage with CCTV, CCTV system will capture and save the vehicle image when the vehicle enters the parking lot, and when the vehicle leaves the parking lot, the system will automatically identify the smart card and pop up the saved image to compare with the vehicle image to prevent the occurrence of car theft cases;

Other functions: for example, reports that can provide various functions, including daily usage report, abnormal situation report, activities and accidents report within a specified time period and various query reports.

1.4 management software functions:

You can add or delete user information at will (only administrators with this permission can do it);

You can query the user's usage, including name, address, telephone number, license plate, expiration date and usage record;

Can dynamically reflect the use of parking lot users;

Print the in-and-out report of any user in any time period;

Operators can set various levels of operating authority;

It can be networked with other systems to realize data sharing.