loading

Application of Internet of Things Technology in Intelligent Parking Lot Management System - Tigerwon

The technical difficulty of vehicle safety management intelligent parking lot management system is the establishment of electronic map and the delimitation of electronic fence. The postal industry has accelerated the research and exploration of key technologies of the Internet of things in recent years. And achieved some results. The establishment of the intelligent security architecture of the postal Internet of things will bring a qualitative leap to the postal security work, and the postal security will enter a new era. The postal industry has accelerated the research and exploration of key technologies of the Internet of things in recent years. And achieved some results. The establishment of the intelligent security architecture of the postal Internet of things will bring a qualitative leap to the postal security work, and the postal security will enter a new era. 1 postal security intelligent platform architecture, however, the application of Internet of things technology in the postal industry is mainly concentrated in various production links.

Application of Internet of Things Technology in Intelligent Parking Lot Management System - Tigerwon 1

Security defense is the basic guarantee of all production activities. The use of Internet of things technology by postal security defense intelligent system is also related to the future of postal services. It is mainly composed of perception interaction layer, network transport layer and application service layer (see Figure 1. The intelligent architecture of postal security strictly follows the architecture of the Internet of things. 1.1 the perception interaction layer is the interface layer between the physical world and the information world. This layer of the intelligent parking lot management system mainly realizes the data collection, information perception, automatic identification and control of the bottom layer through RFID technology, sensor technology or electronic tag technology. For example, the perception interaction layer is postal security The foundation of intelligent anti-theft architecture.

The environmental data of important places are collected through temperature and humidity sensors, Voltage Monitors, smoke sensors, etc., the legitimacy information of Treasury cashboxes is collected through electronic signs and RFID technology, and the information of illegal intrusion objects is collected through pressure sensors, vibration sensors and infrared detectors. 1.2 the main functions of network transmission layer are: To realize information transmission and communication, the network transmission layer is the middle layer of the postal security intelligent system architecture. That is, it is responsible for efficiently, reliably and safely transmitting all kinds of information collected by the perception interaction layer to the application service layer through the postal integrated computer network, Internet or other network infrastructure, so as to realize the interaction between users and objects or the interaction between objects. Postal security intelligent The transport layer of the integrated postal network system will be dominated by the integrated postal network, supplemented by the Internet, so as to enhance the stability of the network as much as possible. 1.3 the application service layer will process and encapsulate the perceived data, and the application service layer will combine the Internet of things technology with the security needs. It will be provided to users in the form of services, that is, the results will be displayed to users according to the needs of postal security. In terms of interaction with users, it is necessary to provide massive services The user interface customization model under the information environment realizes friendly and convenient, especially the intelligent security interaction system with low consumption of network and computer resources. 2 the functions and specific functions of the postal security intelligent system are shown in Figure 2. The postal security intelligent platform mainly studies the application of Internet of things technology from four aspects. 2.1 Intelligent Intrusion Prevention 2.1.1 background, such as Treasury and information Heart, monitoring center, financial business handling place, local important office places, etc. the intelligent parking lot management system needs to go through identity verification to enter these important places.

Many postal places have strict access systems. They can only enter with permission. Some places or areas are not allowed to approach without permission, such as the Treasury, the junction of cash boxes of cash carriers, etc. However, in At present, in the actual work, the identity verification of entry personnel depends on human judgment, which can not ensure the accuracy of identity verification and eliminate the phenomenon of illegal access, resulting in a number of robbery cases. In view of this situation, technical means need to be used to identify personnel identity and take active defense against illegal intrusion. 2.1.2 within specific functional areas, according to specific functions The security level of the site is different. Once someone approaches illegally, it will immediately give an alarm in various ways, and transmit the video image of the alarm area to the monitoring center.

The personnel entering the site will be identified for the first time through the employee card, and then verify the fingerprint and face features. They can enter only after passing all. Once the verification fails, an alarm will also be issued, and the alarm area will be regarded as The frequency image is transmitted to the monitoring center. The phenomenon of trying to destroy building components such as doors, windows and walls entering a specific place also gives an alarm at the first time. 2.1.3 implementation method: various attribute characteristics of the wearer are written in the electronic tag; pressure sensors are arranged on the ground within a certain range around the specific area, and each employee wears an employee card with an electronic tag A long-distance RFID reader shall be placed at an appropriate position. If a person who has not been identified by the RFID reader enters a specific area and touches the pressure sensor, an alarm will be sent, and the video monitoring equipment will be triggered to transmit the on-site image to the monitoring center.

Application of Internet of Things Technology in Intelligent Parking Lot Management System - Tigerwon 2

The person who has passed the identification will conduct fingerprint identification and face recognition as needed to further determine the legitimacy of the identity (see Figure 3 for details). Vibration sensors or acceleration sensors are arranged at the walls, doors and windows, important objects and other positions of the building. Personnel attempting to enter forcibly will send alarm information at the initial stage of damaging or vibrating building components. The data will be output mainly by wired network and supplemented by wireless network according to environmental factors. 2.1.4 technical difficulties. The technical difficulties of intelligent intrusion prevention are a variety of sensors 2.2 cash box transportation and security 2.2.1 background postal branches (lines) The amount of cash needed continues to increase. With the vigorous development of postal financial business, the amount of cash transported from the vault to the branch office every day also increases.

If there is a security loophole in the whole process of cash box transportation, it may lead to criminal activities against the transportation of cash boxes, such as: the cash box is replaced by the security personnel without permission to steal cash; criminals impersonate the security personnel to the branch office to receive cash in advance Cashbox, these criminal activities have seriously affected the healthy development of postal financial business, and also caused great losses to people's wealth. Staff can not accurately identify whether the cashbox is the cashbox handed over by the branch. There are the following potential safety hazards in cashbox Management: first, the judgment of the authenticity of the cashbox still depends on manual identification. It is unable to prevent the occurrence of cases of internal personnel swapping cashboxes; Second, it is difficult to identify the legitimacy of cash delivery vehicles and cash surveyors, especially when the salesperson and outsourced cash surveyors are replaced, there is a potential safety hazard that criminals pretend to be cash surveyors to receive cash boxes; third, they cannot accurately and timely grasp the cash box handover time, and lack of active monitoring means for the cash transportation time limit of outsourcing companies, which is also conducive to the formulation and optimization of cash transportation routes. 2.2.2 abnormal functions are found , automatically identify the legitimacy of escort personnel, escort vehicles and cash boxes. Send out alarm information and transmit regional video images; automatically record the transportation time of cash boxes in all links, give early warning for overtime and failure, assist managers to strengthen the monitoring of escort time limit of external escort companies and optimize cash transportation routes. 2.2.3 implementation methods: each escort personnel and each escort vehicle Electronic labels with various attribute characteristics written in each cash box device, treasury and branch (line) RFID readers are installed at the junction of cash boxes and the door of cash carriers.

Each cash carrier is equipped with wireless communication devices and positioning devices. Branch RFID readers identify the identity legitimacy of vehicles and escorts. Identification of personnel, vehicles and cash boxes: after the escorts enter the set area. If the verification fails, an alarm will be issued and an alarm video image will be transmitted. This function helps the staff to get accurate It can identify whether the cash box is the cash box handed in by the branch, prevent the occurrence of the case of internal personnel swapping the cash box, and solve the problem of identifying the legitimacy of the cash delivery vehicle and the security guard.

Even when the salesperson and the outsourced security guard are replaced, it can accurately prevent the occurrence of the case of pretending to be the escort to pick up the cash box in advance. Cash box transportation control: the cash box is leaving the vault and entering the transportation Cash truck, departure cash truck, arrival branch (line) The RFID reader at each position automatically records the specific time when each cash box is identified. By comparing with each time point set in the background, it can locate the position of the cash transport vehicle that has not reached the designated place after timeout in real time and send early warning information. At the same time, it can accurately and timely grasp the cash box handover time and strengthen the active monitoring of the cash transport time limit of the outsourcing company. 2.2.4 key technologies: linkage between sensors and alarm equipment, image transmission equipment and wireless communication technology. The key technology of cash box transportation and preservation is the access of a variety of sensors. 2.3 environmental monitoring 2.3.1 background environmental temperature and humidity, environmental monitoring is very important in all walks of life.

Various parameters of power supply system, fire monitoring, early warning, whether anti-theft doors and windows are closed and empty Whether the gas quality meets the standard or not requires real-time or quasi real-time monitoring. Radical environmental monitoring requires a lot of labor costs, and the accuracy and timeliness of monitoring can not be guaranteed, resulting in abnormal environmental parameters, which can not be found in time at the initial stage, and eventually lead to accidents and heavy losses. 2.3.2 timely alarm in case of abnormal functions, and real-time or quasi real-time monitoring is required The temperature and humidity of the environment, various voltages and currents of the power supply system, whether there is water leakage, whether the doors and windows are closed, whether there is fire, equipment operation status, etc. and transmit video images. 2.3.3 implementation methods: real time monitoring, environmental temperature and humidity monitoring: install temperature and humidity probes in places with high requirements for temperature and humidity. If the temperature and humidity value exceeds the set threshold, the system will send out alarm information. Especially in business Monitoring of linkage doors and anti-theft doors and windows in the workplace: sensing the opening and closing of doors and windows through the door magnetic sensor installed on the doors and windows. It can detect abnormal conditions in time.

Quasi real-time measuring the zero fire voltage, zero ground voltage, current and other parameters of the power supply system. Parameter monitoring of the power supply system: testing the terminal of device voltage and current to ensure the safety of equipment power consumption. Water invasion monitoring: through water invasion Sensors detect water leakage in machine rooms, warehouses and other places. Real time monitor whether the air quality meets the standard. Air quality monitoring: through the air quality sensors installed in important places.

Ensure the healthy working environment of staff. Ensure that the alarm can be given in time at the early stage of fire. Fire monitoring: through the installation of fire smoke sensors. Take measures immediately. Real time monitor service Monitoring of various parameters of server and server operation status: ensure the stable operation of the system by installing client software in each important server system. Managers can check the actual situation of each important place anytime and anywhere; when there is an abnormal situation in the production environment, the environmental monitoring process is shown in Figure 4. It is arranged through the device of each monitoring sensor.

The environmental monitoring system is automatically arranged in advance The set actions feed back the detailed information of the changing environment, and take the initiative to take effective disposal methods. 2.3.4 the technical difficulty is the linkage of sensors, alarm equipment and image transmission equipment. The technical difficulty of environmental monitoring is the access of multiple sensors. 2.4 vehicle safety management 2.4.1 background is that there are a large number of transportation and delivery vehicles, and the post has a huge physical transportation and delivery network. Many attempts have been made on the safety management of vehicles, such as GP positioning, speed control, etc. most of these methods can not actively monitor and alarm the unsafe behavior of vehicles, can not record the entry and exit of vehicles in real time, need the participation of security personnel, and can not actively supervise the operation range of vehicles. 2.4.2 function also actively prompts the vehicle drivers to prevent speeding and speeding Vehicles outside the operating range give an alarm.

GET IN TOUCH WITH Us
recommended articles
Cases
no data
Shenzhen Tiger Wong Technology Co., Ltd is the leading access control solution provider for vehicle intelligent parking system, license plate recognition system, pedestrian access control turnstile, face recognition terminals and LPR parking solutions.
no data
CONTACT US

Shenzhen TigerWong Technology Co.,Ltd

Tel: +86 13717037584

E-Mail: info@sztigerwong.com

Add: 1st Floor, Building A2, Silicon Valley Power Digital Industrial Park, No. 22 Dafu Road, Guanlan Street, Longhua District,

Shenzhen,GuangDong Province,China  

                    

Copyright © 2024 Shenzhen TigerWong Technology Co.,Ltd  | Sitemap
Contact us
skype
whatsapp
messenger
contact customer service
Contact us
skype
whatsapp
messenger
cancel
Customer service
detect