2[1]英文翻译格式和要求.doc_第1页
2[1]英文翻译格式和要求.doc_第2页
2[1]英文翻译格式和要求.doc_第3页
2[1]英文翻译格式和要求.doc_第4页
2[1]英文翻译格式和要求.doc_第5页
已阅读5页,还剩9页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

无 锡 职 业 技 术 学 院毕业设计说明书(英文翻译)Access control system principleThe field of national security and mainstream providers, attendance systems, access control card system. The best solutions and attentive service! For office integrated security solutions provide better security protection.Access control system is only in recent years in domestic widely used another high-tech security is one of the facilities, has become a symbol of modern architecture of the intelligent. In more and more attention to business intelligence and security today, to import some important organs, scientific research laboratories, archives, as well as related to the beneficial to the peoples livelihood utilities control center, civil aviaton airport and other places of the staff, to import authorization control.Economic growth is sometimes triggered by the occurrence of crime, the pursuit of security in modern buildings on the security system requirements are also getting higher and higher. Building security system includes not only the closed-circuit television and anti-theft alarm, in addition also includes some door locks, anti-theft doors, anti-theft network and security personnel, the people can not meet the increasing safety requirements.Security management function, can be set using the permissions and access time, can and will use the persons name, age, job, photographs of up to 18content data is input to the computer, convenient query statistics and verification of identity;Attendance function, can according to the actual situation of staff designation classification, according to various holidays, a working day attendance record;Patrol function, can record the patrol route, time and patrol point events such as the door is damaged, elevator fault;Multiple access modes, you can set the door lock is not only into a long, a timing switch, multiple functions and various combinations of;Emergency and statistical functions, this system can be displayed on the computer of a designated cardholder of the physical location, to facilitate the timely contact. In case of fire and other emergency situations, fire doors will open automatically, facilitate the escape, access can also be opened automatically; when the illegal to import, will automatically alarm; the system also can according to customer needs, print out all kinds of statistics.Access control system is a system of public security category. The buildings within the main zone management, import and export, elevator hall, main equipment control center computer room, valuables warehouse and other important department a passageway, installing magnetic switch, electric control lock or reader control device, central control room monitoring system using computer, multiple tasks, to the port of each channel location, traffic object and passing time in real time control or set up procedures to control, to a number of banks, finance and trade building and office building integrated public security management.Access control system function lies in the management of population and control area, restrict unauthorized person import and specific area, and has been authorized to import more forthright in. System available induction card, fingerprint, password, as authorized identification, by controlling the machine programming, recording import person date and time, and can be matched with the alarm and closed-circuit television system to achieve optimum management. Applicable to all types of office, computer room, database, parking and storage.Gateway access control system to take the card to replace the key in the door way. A user with one card can open multiple locks, the door lock opening can also have a time limit. If the card is lost, without replacing the lock, just from the control host cancellation. Gateway access control system is based on the import and export of access control, management and recording device for whom, when and where to detailed tracking, in order to achieve the center on the import and export of24 hours, for control, monitoring and management.Each one of the entrances and exits of a card reader, which reads the card through the controller parameters judgement analysis: access, lock open, personnel may pass. Ban is not action and lock alarm immediately and make the appropriate records; the user can select various types of card reader: a magnetic card reader, card reader, Wei radical induction type card reader, hands-free reader, remote infrared reader, can also use digital password keyboard lock; management the software can not only to different access card reader opening time, access time for programming, but also on each piece of card allows access to the area, time limit to prevent people fall into a wrong path, and can query access; according to the specific requirements of customers customized software attendance, overtime, late time statistics, times, and calculate the monthly salary, should deduct the wages and real wage; the unit leader in special personnel, can have special permissions settings, so as to achieve each entrance and each separate programming staff, unified management of the system as a whole; each movement, such as which opens, time is long, who opens the door and so on, all documented management center. Once the accident happens, these records will become strong and could not change the evidence.System with return prevention transfer function: prevent people to enter an area, the card back to the regional foreign graph with the same card into another staff; has a staff of tracking function: in the outer door was not closed before, could not open the door; if forced the door open, malicious destruction of the card reader or the keyboard, invalid card or bad password attempts to open the door and other abnormal events, management center immediately informed and to remind the guard on duty. System startup scene searchlight, recorders and other related equipment.Induction card characteristicsBecause the induction card listed, then the user does not need to carry the key from the key from being copied, more troubles, again also need not worry about property may incur losses. Induction type signal transmitter for package form has many kinds, including card, key ring type, pen type, glass tube, Mike pen . . And so on, with the volume of the size difference, while the volume size is often correlated with the induction distance proportional to, in general, the use of personnel to access and parking control, in order to facilitate carrying, usually made of card type, it is commonly known as the inductive card.Action principle:The inductive card ( Promixity Card ) to contact card called, magnetic card in use must have swipe action to achieve the purpose of regulation. Usually a card with IC chip, an induction coil and capacitor components. Induction card for the transponder end, while the inductive card reader for receiving end, similar to generator, continuous transmit frequency. When the card close to the card reader sends RF rate range, card within the coil will be receiving this frequency and generate energy, the energy stored in the capacitor, when the energy reaches the excitation state, will the card IC chip are burned to send password card reader card reader identification passes, can open the door there, the brand of card reader emitted by different frequency, so the card does not have exchange and can use condition.Set access control management system the main purpose is to guarantee the regional and area safety equipment for personnel, the reasonable flow of these critical areas, enter personnel to implement various forms of import license management, in order to limit free import. When the staff to enter the regulated area, must be at the door of the card reader card, the door can be opened. Each side of the door card reader through the control interface unit and a system controller by the monitoring terminal control. Each card according to the system settings, only within the time specified in the scope of the provisions of the door open. At the same time preventing foreign agents barge in, if someone forced the door open or work didnt close the door, a door control device sends out warning signal, monitor terminal immediately display alarm door. The design of access control system is designed to realize personnel access privilege control and access information recording.Access control system principle1, to take control of the exit and entrance, installed by the locking device and sensors ( such as: electronic cipher keyboard, a card reader, fingerprint reader ) is controlled by the door;2, authorized personnel holding a valid card, or the password and his fingerprints, can open the gate control;3, all access to information, are recorded by the computer; the computer can be modified at any time the authorized personnel import permission;4, the system can also join the attendance system function;System requirementsA high degree of integration with other systems: the complete linkage, including : fire alarm system, CCTV system, elevator system, information and communication systems, parking systems and building control system.Gao Baoan: requires that the entire system performance is stable, safe and reliable, strong security.Redundancy rate: with large capacity expansion, such as the need to expand without additional equipment, main control part, only need to increase front end equipment and field control unit.System functionRights management: personnel access permissions settings, change, cancel, recovery.Storage: store staff out of date, time, number, whether illegal and other relevant information.Centralized management function: the backstage management workstation can establish the database users, regular or real-time acquisition of each import and export import data, at the same time according to the user query, summary, classification, printing.Abnormal alarm: illegal intrusion, destruction of door lock occurs the system will send out alarm information is transmitted to the management center.Linkage function: may realize the fire, when a fire happens, by in the center of unified open access, can start the CCTV implementation of real-time monitoring of transport.Access control system of microcomputer management functionSystem management:This software is the function of the system all the equipment and data management, have the following content- equipment registerFor example, in increasing controller or the card, need to register, in order to make it effective in reducing the controller card; or is lost, when the people change the failure.- level setIn the registered card, which can pass through those doors, which can not by. A controller can be made which card through which, not allowed by. For computer operation to set a password, to control what people can do.- time managementYou can set certain controllers in what time may or may not allow the holder to the card at any time; which may or may not by what door.- database managementThe system records data storage, backup, archive and reading process.Event log: the normal operation of the system, on a variety of access events, abnormal events and the treatment methods were recorded, stored in the database, for future inquiries.Report generation: according to the requirements of timing or randomly generate various reports. For example, you can find someone in a certain period of time in and out of a door, in a certain period of time who are the import, report generation, and can be printed out by a printer. Find out the management, patrol management, meeting room management .Network communication : a system is not as a single system exists, it will send a message to other systems. For example, in a break-in, television monitoring system to send a message, so that the camera to monitor the situation, and video. So there must be a system for communication between a support.Management system in addition to complete the required function, also should be beautiful, human-machine interface, so that the personnel easy *.Access control systemControlled door; controller; magnetic lock; the card reader and card; manual button; key; lights; and PC communication cable; the upper PC machine; industry-specific softwareAccess control system functionCard door : if the number is incorrect or belong to black list will be closed and the alarmThe manual button to open the door inside the door: personnel going outKey: access control systems administratorPC command switch door : the special case is provided by the host computer instruction door switchThe state of the door and the controlled recording information to the PC: can conveniently queryPC card management: responsible for issuing cards and sign in black listTo access the marketThe traditional personal identification methods can not fully meet the modern social economic activities and social security needs. From the elimination of human unsafe factors, only not easily replaced by others, imitation, even I do not transfer the identity certificate to qualify. Therefore, from a usability, security, maturity and cost and other aspects of comprehensive comparison, along with the IT ( Information Technology ) continues to advance, with recognition technology matures, with the rapid development of computer technology, access control technology is developing rapidly, with breathtaking speed from the traditional keyboard, magnetic card to card multi function card, smart card and the direction of development. Now access control systems can even use the satellite network provides global access control service. From the access control system rapid growth speed can be seen in the product market has gradually become mature, a former alarm and monitoring products rule all the land situation, experts predict that by the recently implemented: induction of access control system of the city is a 300% annual growth rate of the amazing.Access control technology developmentMost people think that access is only a door control device, the most typical is the traditional door mounted to the keyboard controller or a magnetic card reader, and in order to obtain access to credit card. However now access control has more advanced technology and new application market, now used in access control system technology include: bar code, bar code graphics ID, magnetic, Wei radical, induction type, code, biological identification. The induction of access control and biological recognition will become the two big trends of the development of access control.The access control system adopts the technique and can achieve different security level. For example: optical techniques applied to the bar code and graphics in ID system identification stored in the bar code and graphics information in ID; electromagnetic technology is applied to the magnetic card entrance guard system, when the cardholder brush card system will read allowed into the magnetic properties; Wei root technology is extremely clever, still belong to the category of electromagnetics; induction type technology commonly used frequency generally in110 125KHz, the frequency is strong, induction of access control system card reading distance farther, as technology continues to improve, frequency of 13.56MHz induction type entrance guard system card reading distance can reach nearly 1meters, this control system has many other applications, such as: parking field, various charges system. Of course the most secure access control system should be able to identify the biologic characteristics of human body, instead of identifying people holding object features of the system, such as : the use of human unique the biometric identification system can identify fingerprints and pupil structure, it will be the entrance guard system of the highest level, but the price is extremely expensive, difficult for the majority of users accept.Access control system based on computer and communication mode is divided into independent access control systems and networking entrance guard system.Independent of the type of access control systemUnable to communicate with a computer, access control permissions settings in the machine s keyboard or the parent line of cards set. There are also some independent access control machine with liquid crystal display auxiliary keyboard do card authorization.Independent of the type of access control system components:Independent access control machine (including the card and control ) + open button + lock + power + cardSome also can be an external card reader realize the travel card.Common market, an independent access control machineIndependent of the type of access control system has the advantages: cheap price, no computer knowledge of the decoration can be installed.Independent of the type of access control system disadvantage: poor safety, because the electric lock control relay on one machine, illegal personnel without too much professional knowledge can short-circuit or destroy independent access control machine to open the door, and even some.小四号字,单倍行距,首行缩进2个字符,不能定义文档网格。门禁系统原理国内安防领域主流供应商,考勤系统,门禁系统一卡通系统等.最佳的解决方案和贴心的服务!为办公室综合安全解决方案提供更高的安全保护。门禁系统是最近几年才在国内广泛应用的又一高科技安全设施之一,现已成为现代建筑的智能化标志之一。在越来越注重商业情报和安全的今天,对进出一些重要机关、科研实验室、档案馆、以及关系到国计民生的公用事业单位的控制中心、民航机场等场所的工作人员,给予进出授权控制。 经济的增长有时引发犯罪的发生,对安全感的追求导致现代化楼宇对保安系统的要求也越来越高。楼宇保安系统不仅包括闭路电视及防盗报警,此外还包括一些门锁、防盗门、防盗网及保安人员等,以满足不了人们日益增加的安全要求。保安管理功能,可以设置使用人的权限和进出时间,可以将使用人的姓名、年龄、职务、相片等多达18种内容的数据输入电脑中,便于查询统计及验证身份;考勤功能,可以根据实际情况将人员编组分类,针对各种节假日,工作日进行考勤记录;巡更功能,可以记录保安员巡更的路线,时间以及巡更点发生的事件如房门损坏,电梯故障等;多种门禁方式组合,可以设置门锁为只进不出,长开,定时开关等多种功能及各种组合;应急及统计功能,本系统可以在电脑上显示出指定持卡人所处的物理位置,便于及时联系。发生火警等紧急情况时,防火门会自动打开,便于逃生,出入口也可以自

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

最新文档

评论

0/150

提交评论