Joke Collection Website - Bulletin headlines - Who has the latest overall security solution for China’s modern prisons?
Who has the latest overall security solution for China’s modern prisons?
Detention center security system construction plan
1. Overview
With the gradual implementation of the "National Prison Information Construction Plan", combined with the "Detention Center Technology Construction Plan" Specifications" and other related standards. In view of the scientific and reasonable transformation and upgrading of the current security system of the detention center, the main task at this stage is to establish a comprehensive management platform with three-dimensional protection, intelligent application and humanized management. Among them, the video surveillance system has the intuitive function of real-time monitoring and can be linked and integrated with other subsystems, making the entire detention center management system somewhat intelligent and improving the reliability and stability of the monitoring system and protective functions. The goal and direction of system construction is to adopt mainstream technology, scientific planning, and rational construction to make the system forward-looking and advanced.
2. Needs Analysis
Detention centers shoulder the important task of detaining and reforming detainees. As managers of prisons, public security organs must provide a humane and scientific management environment on the one hand, and ensure the absolute safety of prison managers and detainees on the other. How to balance both? This is a question that current managers, executors, and supervisors need to think about together. Therefore, we must adopt more intelligent products in technology, adopt more scientific methods in system, and adopt more humane methods in management to gradually realize this.
The typical subsystems of existing detention centers are mainly:
Communication command system; supervisory information system; emergency alarm system; monitoring system; perimeter control system; prison area access control system; Detainee reporting system; police patrol management system; audio-visual education (broadcasting) system; interrogation command system; interview management system; prohibited items detection system.
Analysis of the current situation of the monitoring system:
1. The original system was built relatively early, many transmission bottlenecks have emerged, and it cannot meet the increasing number of information transmission applications.
2. The original architecture and functions of each subsystem are relatively independent and simple, and do not meet the application requirements of comprehensive digitalization.
3. In the early stage, the mainstream analog-digital combination solution was adopted, but there were still bottleneck problems such as resources that could not be seamlessly integrated and interconnected and controlled, and monitoring was not clear.
4. Some of the digital solutions implemented recently do not truly unify new technologies and various business systems in terms of interface standards; and they do not fully demonstrate the advantages and highlights of digital applications.
5. In addition, the linkage and management of various systems constructed basically remain at the "horizontal linkage" stage, that is, they do not have "three-dimensional" intelligent protection and information processing linkage capabilities, let alone emergency response. rapid response and comprehensive command capabilities.
3. Design Ideas
Our design philosophy:
Synchronization of system planning and construction, synchronization of system design and application,
System Implementation and functions are synchronized, and system application and management are synchronized.
Reflect the high consistency of the four main stages of planning, design, implementation, and application, avoid planning out of synchronization, design being limited to the existing architecture, serious derailment of program functions and practical applications, and failure to fully integrate into the system Information management and other issues. Thus establishing a technologically advanced, functional, practical, stable and reliable security monitoring system.
The prevention system must not only meet existing application requirements, but also be forward-looking and advanced, so that the entire system has strong scalability, compatibility and maintainability.
System diagram:
According to the authority and level of administrative management, it is divided into three levels, namely the third-level sub-control center (the sub-control management center on this floor) and the second-level monitoring Center (monitoring center of our institute), first-level command center (public security monitoring center). Based on the monitoring center of the institute, it also takes into account the command and management functions. At the same time, a network separate control client for managing police officers can be built to realize real-time supervision within the scope of their management. The separate control client for leaders can easily realize overall supervision through the network.
Adopt a three-dimensional monitoring method in combination with the management platform, with reasonable layout and unified integration according to different monitoring areas, different monitoring information and different application systems, that is, to meet the needs of each subsystem in different areas. The application also realizes the authority control and emergency plan handling requirements of comprehensive management. Make the monitoring platform have a certain management width and depth.
IV. System composition
In view of the current security system of the detention center, we take audio/video surveillance as the core and integrate perimeter alarm, access control, AB door, entrance and exit management, visual Intercom, broadcast, patrol and other subsystems are linked. It combines three major technologies: three-dimensional protection, high-definition monitoring, and intelligent analysis to build a powerful comprehensive security management platform.
According to different monitoring areas, high-definition digital monitoring, intelligent video analysis, networked sub-control, real-time information release, radio frequency wireless identification positioning (RFID), GPS positioning patrol, intelligent sound detection, and access control video can be used. Linkage analysis and other technologies interpenetrate, correlate, and complement each other and the subsystems are closely integrated, making it a comprehensive information management platform with scientific organizational structure, rigorous operation logic, and intelligent application.
Use high-definition monitoring equipment, such as high-definition camera PE8080HD, for important entrances and exits and large-scale scene monitoring; combine video intelligent analysis for perimeter protection, such as intelligent analysis equipment PE5010; for image control output , adopts a fully digital high-definition matrix PE90FH, which can be fully compatible with existing SD signals and high-definition signals. It can be easily implemented regardless of network or non-network methods, and supports splicing and image processing functions for large screens.
The overall functional design is built around the three major characteristics of three-dimensionality, high-definition, and intelligence.
V. Plans and features
1. Transmission plan:
The backbone transmission adopts optical fiber to establish office network and monitoring information network respectively. The collection of monitoring information is mainly digital, supplemented by analog, focusing on high-definition and other standard-definition methods; nodes where information points cannot be transmitted digitally are extended and expanded using analog methods.
As shown below:
Transmission characteristics: Collection with less perimeter information and many nodes should use Red Apple passive optical network or node optical transceiver, which saves costs and is easy to manage. ;In information-intensive areas such as prison buildings, the Red Apple multi-service optical transmission platform should be used to make it the most cost-effective.
Schematic diagram of equipment transmission integration:
Application features: Use the most appropriate optical transmission network and equipment according to different application requirements to reduce equipment risks and transmission risks to the greatest extent. and improve system security and efficiency.
2. The overall construction structure of the system:
Feature description:
The high degree of system integration is based on video surveillance, combined with other subsystems, using The digital open interface makes the platform's management capabilities more complete. Networked construction distribution makes desktop applications and sub-control construction very flexible.
The central system uses Red Apple’s latest PE90FH digital matrix, which can easily integrate all other security subsystems such as: access control, patrol, alarm, entrance and exit, etc. It truly realizes the unified management of one center
2. Intelligent audio/video monitoring of the prison building (PE5010 video intelligent analysis module)
Comprehensive and comprehensive monitoring of the prison building without blind spots according to the requirements Video surveillance is provided, and an audio intercom device is installed to facilitate voice communication between detainees in the prison building and the supervision center and police officers on duty. Except for the intercom, which is exposed and anti-riot measures are taken, all other installations are required to be confidential.
Working principle: Record and analyze the activity noise in the prison building. When switching monitoring, the sound information inside the prison building can be monitored at the same time. When a fight or other incident occurs, the abnormal sound detected by the audio probe will increase. We have two ways to implement the sound detection and alarm function. The first solution: The sound wave threshold can be set on the front-end audio probe. When it exceeds a certain decibel, the switching value is output to drive the local intercom equipment and automatically uploaded to the monitoring host of the management center. The center will automatically switch after receiving the signal. It can output video information and audio information to realize direct monitoring and direct operations such as shouting warnings. The second option is to connect the audio signal transmitted to the backend to the DVR and then set the sound threshold. When the set value is exceeded, the management software can be linked to automatically switch out video information and audio information, and can directly shout and warn. If the digital camera method is used, the audio probe is first input to the network camera, and the threshold is set on the network camera. The alarm threshold can also be set on the back-end streaming media server.
As shown in the picture:
(Environmental sound monitoring is normal) (Environmental sound monitoring abnormality will pop up automatically)
As shown in the picture above: Intelligent analysis of indoor scenes can realize the flow of people Density, abnormal behavior and other information can activate early warning measures, inform supervisors of real-time information, and automatically pop up the screen. It can also automatically link IP broadcast equipment to play warning voice messages.
All information is uniformly accessed to the monitoring private network, and is associated with the system linkage and unified management of the PE90FH high-definition digital matrix.
3. Perimeter alarm and video intelligent analysis
Coupled with perimeter infrared radiation to form a combination of visible and non-visible protection.
The video intelligent analysis device PE5010 has been added to the existing perimeter video protection, which can automatically launch defense plans based on the monitoring characteristics of different time periods. The dual guarantees of visual defense and infrared alarm defense complement each other, and warning areas and alarm areas are defined based on the characteristics of the wall warning area.
As shown in the picture above: Set up a defense area within the perimeter. If you appear, wander or stay in this area, you can activate early warning measures, inform supervisors of real-time information, and automatically pop up the screen, and can also automatically link IP broadcast equipment, plays warning voice messages.
4. High-definition entrance and exit management system
The entrance and exit adopt Red Apple high-definition network camera (PE8080) and automatic identification management system, which can quickly identify unit vehicles and automatically record and prompt relevant information to The monitoring center and the guard office also have sub-control display systems that can monitor relevant information in real time. If it is a social vehicle, the vehicle information can be automatically registered, and the license registration form can be automatically printed by simply entering the driver information and vehicle occupant information, upgrading the traditional manual registration of personnel into an automated management system with complete and real-time information.
Based on the safety inspection of vehicles, we have established a dynamic vehicle chassis scanning system, which can completely scan the chassis of vehicles entering/leaving the prison to prevent prohibited items from entering/leaving. After the system detects suspicious information, it automatically activates the barrier gate to close the vehicle driving channel and activates the system's emergency plan.
System scheme diagram:
Snapshot and chassis scan image
5. GPS positioning and tracking patrol system (PE5060 integrated management platform)
< p>The patrol monitoring system based on GPS and GSM mobile communication network uses GIS electronic map to provide managers with real-time location and status monitoring of patrol personnel. It also supports intercom function and video switching linkage, and can track patrol personnel in real time in all directions without blind spots. Ensure the safety of supervisory staff.The mobile terminal is our handheld terminal system, which includes a GPS receiving module, communication controller and peripheral equipment.
The structure is as shown below:
The patrol system is associated with the video surveillance system, voice alarm system, access control system, and video intelligent analysis system to ensure comprehensive coverage and real-time management of information
p>
Patrol personnel use GPS positioning and send coordinates to the GPS control center through terminal equipment and GSM mobile networks. The center can use playback and other methods to observe the movement of patrol personnel on the GIS map in real time, and at the same time call the video surveillance subsystem, video access control, etc. to view the status of personnel in real time. Patrol officers and monitoring room personnel on duty can fully share the information of detainees, and with the overlay of images in each cell, managers can better understand which cells contain dangerous elements and need to be monitored more closely. Through voice intercom and information sharing with patrol officers, video observation and global information display on the map, points, lines and planes are combined to real-time and dynamic understanding of prisoners and surrounding environment conditions. At the same time, GIS map analysis and intelligent analysis software PE5010 are used together to check the locations of patrol personnel and managers online and allocate personnel in a timely manner. Prevent various emergencies such as boundary crossing, invasion, group gatherings and fights in advance.
Device introduction:
Device picture name Device feature introduction
HD digital matrix
PE90FH supports high/standard definition image input
Support digital/pattern image input
Have image control and linkage switching
Have high-definition splicing output function
High-definition network camera
< p>PE8080HD (1080p) 1/2.5-inch CMOSTwo-megapixel network camera
5-megapixel progressive scan image sensor
H.264 Main Profile @ Level 4.1 algorithm
High-speed smart ball
PE3032
Quick installation design
Three-dimensional positioning, automatic tracking (specified camera module )
RS485 online upgrade
Automatic program scheduled running function
Video intelligent analysis
PE5010 supports cross-line and crossing alarm
Support area counting
Support target recognition
Support linkage with other devices
Compatible with other system instructions:
1. Visual intercom (sound monitoring function, prison intercom).
2. Visual access control (abnormal card swiping, anti-trailing, duress code).
3. Perimeter alarm (infrared radiation, power grid).
4. Smart card (RFID positioning, cross-border reminder, access management, people counting).
5. Patrol system (GPS positioning track, over-limit management).
6. Emergency alarm (manual, automatic, coercion).
7. Inspection system (discipline inspection system by region and authority).
Reference design plan appendix:
Detention center plan design basis:
1. "Safety Prevention Engineering Procedures and Requirements" (GA/T75-94)
p>2. "Code for Completion Acceptance of Safety Technology Prevention Projects" (GA308-2001)
3. "General Graphical Symbols for Safety Prevention Systems" (GA/T74-2001)
< p>4. "System Composition and Technical Requirements of Security Technology Prevention TV Monitoring System" GA/T367-20015. "Measures for Preparing Budget Estimates for Security Prevention Projects" GA/
6. "Industrial Television System Engineering Design Specifications" (GBJ115-87)
7. "Civil Closed-circuit Television System Engineering Technical Specifications" (GB50198-94)
8. "Color TV Subjective Evaluation Method of Image Quality" (GB7401-87)
9. "General Technical Conditions for Anti-theft Alarm Controllers" GB 12663—2001
10. "Safety of Security Technology to Prevent Alarm Equipment Requirements and test methods》GB16796-1997101.
11. "Alarm System Environmental Test" GB/T15211-1994101.
12. "Alarm system power supply device, test methods and performance specifications" GB/T 15408-1994101.
13. "General Technical Conditions for Intrusion Detectors" GB10408.1-2000
14. "System Composition and Technical Requirements for Intrusion Alarm Systems" GA/T368-2001
15. "System Composition and Technical Requirements of Entrance and Exit Control Systems" GA/T394-2002
16. "Passive Infrared Intrusion Detector" GB10408.—2000
17 . "Ultrasonic and Passive Infrared Composite Intrusion Detector" GB10408.—1996
18. "Surge (Impact) Immunity Test" (GB/T17626.5)
19 . "Protective Grounding and Lightning Protection Grounding Standard" (IEC364-4-41)
20. "Video and Audio Codec Standard" (ITU H.263)
21. "Intelligent System composition and overall requirements of building security systems》GB/T 50314-2000
22. "Code for construction and acceptance of electrical installation installation projects" (GB50254-96)
23. National Standard for Military Engineering and Software Engineering (GTB856)
24. General technical conditions for related products approved by other industries or approved by the state
- Related articles
- Bless yourself later.
- In order to achieve the goal of high quality and high yield, what should we start from?
- A famous saying that people who don't work are no different from livestock.
- When are English letters capitalized?
- How to be a good director
- The essay and information of Qingdao Changbei football match are urgent! Wait online!
- 202 1 August is a good day for opening.
- Comprehensive content of national defense manuscripts
- When is the best time to go to Lijiang?
- I love my hometown, Harbin, Xiangfang Park. A 400-word essay about Xiangfang Park (scenery)