2[1]英文翻譯格式和要求.doc_第1頁
2[1]英文翻譯格式和要求.doc_第2頁
2[1]英文翻譯格式和要求.doc_第3頁
2[1]英文翻譯格式和要求.doc_第4頁
2[1]英文翻譯格式和要求.doc_第5頁
已閱讀5頁,還剩9頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)

文檔簡介

無 錫 職 業(yè) 技 術(shù) 學(xué) 院畢業(yè)設(shè)計說明書(英文翻譯)Access control system principleThe field of national security and mainstream providers, attendance systems, access control card system. The best solutions and attentive service! For office integrated security solutions provide better security protection.Access control system is only in recent years in domestic widely used another high-tech security is one of the facilities, has become a symbol of modern architecture of the intelligent. In more and more attention to business intelligence and security today, to import some important organs, scientific research laboratories, archives, as well as related to the beneficial to the peoples livelihood utilities control center, civil aviaton airport and other places of the staff, to import authorization control.Economic growth is sometimes triggered by the occurrence of crime, the pursuit of security in modern buildings on the security system requirements are also getting higher and higher. Building security system includes not only the closed-circuit television and anti-theft alarm, in addition also includes some door locks, anti-theft doors, anti-theft network and security personnel, the people can not meet the increasing safety requirements.Security management function, can be set using the permissions and access time, can and will use the persons name, age, job, photographs of up to 18content data is input to the computer, convenient query statistics and verification of identity;Attendance function, can according to the actual situation of staff designation classification, according to various holidays, a working day attendance record;Patrol function, can record the patrol route, time and patrol point events such as the door is damaged, elevator fault;Multiple access modes, you can set the door lock is not only into a long, a timing switch, multiple functions and various combinations of;Emergency and statistical functions, this system can be displayed on the computer of a designated cardholder of the physical location, to facilitate the timely contact. In case of fire and other emergency situations, fire doors will open automatically, facilitate the escape, access can also be opened automatically; when the illegal to import, will automatically alarm; the system also can according to customer needs, print out all kinds of statistics.Access control system is a system of public security category. The buildings within the main zone management, import and export, elevator hall, main equipment control center computer room, valuables warehouse and other important department a passageway, installing magnetic switch, electric control lock or reader control device, central control room monitoring system using computer, multiple tasks, to the port of each channel location, traffic object and passing time in real time control or set up procedures to control, to a number of banks, finance and trade building and office building integrated public security management.Access control system function lies in the management of population and control area, restrict unauthorized person import and specific area, and has been authorized to import more forthright in. System available induction card, fingerprint, password, as authorized identification, by controlling the machine programming, recording import person date and time, and can be matched with the alarm and closed-circuit television system to achieve optimum management. Applicable to all types of office, computer room, database, parking and storage.Gateway access control system to take the card to replace the key in the door way. A user with one card can open multiple locks, the door lock opening can also have a time limit. If the card is lost, without replacing the lock, just from the control host cancellation. Gateway access control system is based on the import and export of access control, management and recording device for whom, when and where to detailed tracking, in order to achieve the center on the import and export of24 hours, for control, monitoring and management.Each one of the entrances and exits of a card reader, which reads the card through the controller parameters judgement analysis: access, lock open, personnel may pass. Ban is not action and lock alarm immediately and make the appropriate records; the user can select various types of card reader: a magnetic card reader, card reader, Wei radical induction type card reader, hands-free reader, remote infrared reader, can also use digital password keyboard lock; management the software can not only to different access card reader opening time, access time for programming, but also on each piece of card allows access to the area, time limit to prevent people fall into a wrong path, and can query access; according to the specific requirements of customers customized software attendance, overtime, late time statistics, times, and calculate the monthly salary, should deduct the wages and real wage; the unit leader in special personnel, can have special permissions settings, so as to achieve each entrance and each separate programming staff, unified management of the system as a whole; each movement, such as which opens, time is long, who opens the door and so on, all documented management center. Once the accident happens, these records will become strong and could not change the evidence.System with return prevention transfer function: prevent people to enter an area, the card back to the regional foreign graph with the same card into another staff; has a staff of tracking function: in the outer door was not closed before, could not open the door; if forced the door open, malicious destruction of the card reader or the keyboard, invalid card or bad password attempts to open the door and other abnormal events, management center immediately informed and to remind the guard on duty. System startup scene searchlight, recorders and other related equipment.Induction card characteristicsBecause the induction card listed, then the user does not need to carry the key from the key from being copied, more troubles, again also need not worry about property may incur losses. Induction type signal transmitter for package form has many kinds, including card, key ring type, pen type, glass tube, Mike pen . . And so on, with the volume of the size difference, while the volume size is often correlated with the induction distance proportional to, in general, the use of personnel to access and parking control, in order to facilitate carrying, usually made of card type, it is commonly known as the inductive card.Action principle:The inductive card ( Promixity Card ) to contact card called, magnetic card in use must have swipe action to achieve the purpose of regulation. Usually a card with IC chip, an induction coil and capacitor components. Induction card for the transponder end, while the inductive card reader for receiving end, similar to generator, continuous transmit frequency. When the card close to the card reader sends RF rate range, card within the coil will be receiving this frequency and generate energy, the energy stored in the capacitor, when the energy reaches the excitation state, will the card IC chip are burned to send password card reader card reader identification passes, can open the door there, the brand of card reader emitted by different frequency, so the card does not have exchange and can use condition.Set access control management system the main purpose is to guarantee the regional and area safety equipment for personnel, the reasonable flow of these critical areas, enter personnel to implement various forms of import license management, in order to limit free import. When the staff to enter the regulated area, must be at the door of the card reader card, the door can be opened. Each side of the door card reader through the control interface unit and a system controller by the monitoring terminal control. Each card according to the system settings, only within the time specified in the scope of the provisions of the door open. At the same time preventing foreign agents barge in, if someone forced the door open or work didnt close the door, a door control device sends out warning signal, monitor terminal immediately display alarm door. The design of access control system is designed to realize personnel access privilege control and access information recording.Access control system principle1, to take control of the exit and entrance, installed by the locking device and sensors ( such as: electronic cipher keyboard, a card reader, fingerprint reader ) is controlled by the door;2, authorized personnel holding a valid card, or the password and his fingerprints, can open the gate control;3, all access to information, are recorded by the computer; the computer can be modified at any time the authorized personnel import permission;4, the system can also join the attendance system function;System requirementsA high degree of integration with other systems: the complete linkage, including : fire alarm system, CCTV system, elevator system, information and communication systems, parking systems and building control system.Gao Baoan: requires that the entire system performance is stable, safe and reliable, strong security.Redundancy rate: with large capacity expansion, such as the need to expand without additional equipment, main control part, only need to increase front end equipment and field control unit.System functionRights management: personnel access permissions settings, change, cancel, recovery.Storage: store staff out of date, time, number, whether illegal and other relevant information.Centralized management function: the backstage management workstation can establish the database users, regular or real-time acquisition of each import and export import data, at the same time according to the user query, summary, classification, printing.Abnormal alarm: illegal intrusion, destruction of door lock occurs the system will send out alarm information is transmitted to the management center.Linkage function: may realize the fire, when a fire happens, by in the center of unified open access, can start the CCTV implementation of real-time monitoring of transport.Access control system of microcomputer management functionSystem management:This software is the function of the system all the equipment and data management, have the following content- equipment registerFor example, in increasing controller or the card, need to register, in order to make it effective in reducing the controller card; or is lost, when the people change the failure.- level setIn the registered card, which can pass through those doors, which can not by. A controller can be made which card through which, not allowed by. For computer operation to set a password, to control what people can do.- time managementYou can set certain controllers in what time may or may not allow the holder to the card at any time; which may or may not by what door.- database managementThe system records data storage, backup, archive and reading process.Event log: the normal operation of the system, on a variety of access events, abnormal events and the treatment methods were recorded, stored in the database, for future inquiries.Report generation: according to the requirements of timing or randomly generate various reports. For example, you can find someone in a certain period of time in and out of a door, in a certain period of time who are the import, report generation, and can be printed out by a printer. Find out the management, patrol management, meeting room management .Network communication : a system is not as a single system exists, it will send a message to other systems. For example, in a break-in, television monitoring system to send a message, so that the camera to monitor the situation, and video. So there must be a system for communication between a support.Management system in addition to complete the required function, also should be beautiful, human-machine interface, so that the personnel easy *.Access control systemControlled door; controller; magnetic lock; the card reader and card; manual button; key; lights; and PC communication cable; the upper PC machine; industry-specific softwareAccess control system functionCard door : if the number is incorrect or belong to black list will be closed and the alarmThe manual button to open the door inside the door: personnel going outKey: access control systems administratorPC command switch door : the special case is provided by the host computer instruction door switchThe state of the door and the controlled recording information to the PC: can conveniently queryPC card management: responsible for issuing cards and sign in black listTo access the marketThe traditional personal identification methods can not fully meet the modern social economic activities and social security needs. From the elimination of human unsafe factors, only not easily replaced by others, imitation, even I do not transfer the identity certificate to qualify. Therefore, from a usability, security, maturity and cost and other aspects of comprehensive comparison, along with the IT ( Information Technology ) continues to advance, with recognition technology matures, with the rapid development of computer technology, access control technology is developing rapidly, with breathtaking speed from the traditional keyboard, magnetic card to card multi function card, smart card and the direction of development. Now access control systems can even use the satellite network provides global access control service. From the access control system rapid growth speed can be seen in the product market has gradually become mature, a former alarm and monitoring products rule all the land situation, experts predict that by the recently implemented: induction of access control system of the city is a 300% annual growth rate of the amazing.Access control technology developmentMost people think that access is only a door control device, the most typical is the traditional door mounted to the keyboard controller or a magnetic card reader, and in order to obtain access to credit card. However now access control has more advanced technology and new application market, now used in access control system technology include: bar code, bar code graphics ID, magnetic, Wei radical, induction type, code, biological identification. The induction of access control and biological recognition will become the two big trends of the development of access control.The access control system adopts the technique and can achieve different security level. For example: optical techniques applied to the bar code and graphics in ID system identification stored in the bar code and graphics information in ID; electromagnetic technology is applied to the magnetic card entrance guard system, when the cardholder brush card system will read allowed into the magnetic properties; Wei root technology is extremely clever, still belong to the category of electromagnetics; induction type technology commonly used frequency generally in110 125KHz, the frequency is strong, induction of access control system card reading distance farther, as technology continues to improve, frequency of 13.56MHz induction type entrance guard system card reading distance can reach nearly 1meters, this control system has many other applications, such as: parking field, various charges system. Of course the most secure access control system should be able to identify the biologic characteristics of human body, instead of identifying people holding object features of the system, such as : the use of human unique the biometric identification system can identify fingerprints and pupil structure, it will be the entrance guard system of the highest level, but the price is extremely expensive, difficult for the majority of users accept.Access control system based on computer and communication mode is divided into independent access control systems and networking entrance guard system.Independent of the type of access control systemUnable to communicate with a computer, access control permissions settings in the machine s keyboard or the parent line of cards set. There are also some independent access control machine with liquid crystal display auxiliary keyboard do card authorization.Independent of the type of access control system components:Independent access control machine (including the card and control ) + open button + lock + power + cardSome also can be an external card reader realize the travel card.Common market, an independent access control machineIndependent of the type of access control system has the advantages: cheap price, no computer knowledge of the decoration can be installed.Independent of the type of access control system disadvantage: poor safety, because the electric lock control relay on one machine, illegal personnel without too much professional knowledge can short-circuit or destroy independent access control machine to open the door, and even some.小四號字,單倍行距,首行縮進2個字符,不能定義文檔網(wǎng)格。門禁系統(tǒng)原理國內(nèi)安防領(lǐng)域主流供應(yīng)商,考勤系統(tǒng),門禁系統(tǒng)一卡通系統(tǒng)等.最佳的解決方案和貼心的服務(wù)!為辦公室綜合安全解決方案提供更高的安全保護。門禁系統(tǒng)是最近幾年才在國內(nèi)廣泛應(yīng)用的又一高科技安全設(shè)施之一,現(xiàn)已成為現(xiàn)代建筑的智能化標志之一。在越來越注重商業(yè)情報和安全的今天,對進出一些重要機關(guān)、科研實驗室、檔案館、以及關(guān)系到國計民生的公用事業(yè)單位的控制中心、民航機場等場所的工作人員,給予進出授權(quán)控制。 經(jīng)濟的增長有時引發(fā)犯罪的發(fā)生,對安全感的追求導(dǎo)致現(xiàn)代化樓宇對保安系統(tǒng)的要求也越來越高。樓宇保安系統(tǒng)不僅包括閉路電視及防盜報警,此外還包括一些門鎖、防盜門、防盜網(wǎng)及保安人員等,以滿足不了人們?nèi)找嬖黾拥陌踩?。保安管理功能,可以設(shè)置使用人的權(quán)限和進出時間,可以將使用人的姓名、年齡、職務(wù)、相片等多達18種內(nèi)容的數(shù)據(jù)輸入電腦中,便于查詢統(tǒng)計及驗證身份;考勤功能,可以根據(jù)實際情況將人員編組分類,針對各種節(jié)假日,工作日進行考勤記錄;巡更功能,可以記錄保安員巡更的路線,時間以及巡更點發(fā)生的事件如房門損壞,電梯故障等;多種門禁方式組合,可以設(shè)置門鎖為只進不出,長開,定時開關(guān)等多種功能及各種組合;應(yīng)急及統(tǒng)計功能,本系統(tǒng)可以在電腦上顯示出指定持卡人所處的物理位置,便于及時聯(lián)系。發(fā)生火警等緊急情況時,防火門會自動打開,便于逃生,出入口也可以自

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
  • 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論