Video surveillance has always been one of the hotspots in the application of security technology. With its intuitive, convenient and rich information content, it has been widely used in the military, banks, customs, airports, highways, shopping malls, hospitals, schools, institutions, social communities, families, etc. Various occasions. The intelligent level and integrated development speed of the video surveillance system also directly reflect the technical status of electronics and communication at different stages.

1. The development of intelligent and networked TV monitoring system

Before the television monitoring system realized digital intelligence, analog image television monitoring was widely used in security, production management and other occasions. Video surveillance is generally transmitted in analog mode, using video cables, and the transmission distance cannot be too far. It is mainly used for surveillance in a small area. The surveillance image can only be viewed in the control center. Pure analog video TV surveillance is not suitable for intelligent and intensive management. Need. Later, with the increasing maturity of digital video compression coding technology and the popularization of microcomputers, PC-based multimedia monitoring has created conditions for PC-based multimedia monitoring. In the remote monitoring site, there are several cameras, various detection, alarm probes and data equipment, which are connected to the multimedia monitoring terminal PC through their respective transmission lines, and pass the information to one or more monitoring through the communication network center. PC-based multimedia monitoring system has strong functions, but its stability is not good enough; high power consumption, high cost, complicated structure, and at the same time, the openness of the software is not good. In addition, there is no standard interface protocol for PC monitoring system software in China. This has led to repeated development, poor transmission stability, and difficulty in integration. This requires more stable and advanced intelligent digital equipment to replace traditional monitoring equipment and network data transmission methods. Therefore, Web-based remote The video surveillance system came into being. The main principle of remote network video monitoring based on embedded Web server technology is that the embedded video recording host has a built-in Web server and an embedded real-time operating system. The video signal transmitted by the camera is digitized and compressed by the high-efficiency compression chip, and then transmitted to the built-in video host's Web server through the internal bus. Users on the network can directly view the camera image on the embedded video host with a browser. Authorized users can also control the camera pan / tilt lens movement or perform remote operation on the system configuration. Because the video compression and Web functions are integrated into a small embedded recording device, it can be directly connected to the Ethernet to achieve plug and play, save various complicated cables, and easy to install (only need to set an IP address ), Users do not need to use special software, just use a browser to watch. With the popularity of broadband networks, network video surveillance has become a new development direction in the field of surveillance, and it will also gradually make expensive digital surveillance equipment popular.

2. Intensive development of TV monitoring system

With the progress of human society, the growth of social wealth and the improvement of technological level, certain negative factors have led to criminal phenomena and criminal methods that have become increasingly concealed, complicated, and even intelligent. Development puts forward new requirements. At the same time, the automation and informatization construction of industrial enterprises has entered a stage of rapid development. The highly modernized and intelligent production process is becoming more and more perfect, and new requirements have been put forward for safety monitoring, control and management in the production process. The new TV monitoring system must complete intelligent and intensive management, which involves intrusion alarm, electronic patrol, TV monitoring, entrance and exit control, building video intercom, document security, GIS geographic information, GPS navigation and control, business Integrated management and control in many fields such as comprehensive management, of which the TV monitoring system is an important part of the entire intelligent and integrated security system, which together with the anti-intrusion alarm system and the entrance and exit control system constitute the three of the modern integrated security technology system The big factor, and, with the development of the security market, the status and role of the TV monitoring system in the security field are increasingly prominent. This is because the image (video signal) itself has the characteristics of visibility, recordability, and large amount of information. The whole situation is clear at a glance, and the judgment event has extremely high accuracy, "seeing is believing", therefore, it is an effective means of alarm review, dynamic monitoring, process control and information recording.

3. Realization of intelligent and intensive intelligent TV monitoring system

Intelligent refers to intelligent judgment of access control, alarm and other information, triggering DVR products to record important information. DVR intelligently records useful information dynamically according to the status of mobile data, and does not necessarily record too much useless information; intensification refers to Integrate the information of independent function modules such as TV monitoring, access control system, and alarm system through a certain software platform for effective correlation processing, and achieve the purpose of real-time early warning and control management.

At present, Beijing Yinhe Weiye Digital Technology Co., Ltd. has successfully launched an integrated management platform for intelligent and intensive TM-XP2.0 TV monitoring system, which aims to control various types of alarms and various access control in the field of security , All kinds of mainstream embedded monitoring, all kinds of mainstream plug-in monitoring, card number capture, geographic information, electronic maps, banknote transport navigation, duty management, patrol system and other technical defense equipment are completely centralized management and control and achieve mutual correlation, The purpose of information sharing is to realize the intelligence and intensiveness of the TV monitoring system in a true sense.

The intelligence and intensiveness of a perfect TV monitoring system should have the integration of the following basic functions: 1. Multi-level network topology. Adopt the cascading topology structure, which can be composed of a monitoring center, a monitoring sub-center, an end station monitoring unit and a monitoring module to form a tree network topology. 2. Digital network monitoring is compatible with analog monitoring. 3. Based on large database and B / S architecture. As an ideal comprehensive management system, we must consider the occasions of some large-scale applications, so that whenever and wherever possible, anyone authorized can remotely monitor, manage, and control. 4. Support multicast technology. Can effectively use the network bandwidth, for multiple monitoring access, the same image signal only needs to be transmitted once. 6. When the network bandwidth of the streaming media forwarding (sub-center) and the end station is limited, in order to satisfy the simultaneous access of the center (sub-center) or other remote customers to the remote end-station monitoring site equipment, the center (sub-center) also needs to configure streaming media forward Server, built-in streaming media forwarding server software for streaming media forwarding. 7. Fire and anti-theft applications. In the field of fire prevention and anti-theft, it supports all kinds of accessible devices, such as smoke detectors, gas detectors, infrared radiation, glass breakage intrusion detectors, access control, etc. These detectors are associated with images and audio in the system according to user-defined methods, including starting sound and light, turning on lights, sending short messages to specified mobile phone numbers, sending emails to specified mailboxes, pushing out alarm screens, etc. 8. Remote data collection application. In many applications, it is necessary to remotely collect some environmental parameters and device operating conditions of the end station, and it is necessary to support users to access various analog data collection devices in a custom manner, such as ambient temperature, ambient humidity, current, and voltage. 9. Distributed image storage / centralized image storage. 10. The communication center supports short message, telephone, e-mail and other communication methods. When an alarm source generates an alarm, it automatically calls the set mobile phone number, sends a short message to a specified number of mobile phones, or sends a message to a specified E-mail in the mailbox; this function is very helpful to ease the difficulty of monitoring staff. 11. TV wall function. In the monitoring center or monitoring sub-center, if a video wall is built, the video wall function of this system can be directly used to decode the monitoring image to the TV wall. The system does not limit the pattern of the TV wall. 12. Provide powerful and centralized user authentication and authority management. Users can be affiliated with the center or sub-center; in order to facilitate the assignment of authority to the staff, the concept of authority group needs to be considered. 13. Negotiation management of control rights. When multiple users are involved in resource competition, they gain control by priority. 14. Intelligent image application. The system will automatically generate an alarm when an image loss, image cover, or motion detection alarm occurs in a pre-defined area of ​​the image; 15. Provide an electronic map monitoring mode to graphically display the operation of each device dynamically The situation and the current status of each alarm monitoring point, when an alarm occurs, promptly and accurately remind the monitoring personnel of the occurrence of an alarm event with a striking red icon and different alarm sounds, and an alarm screen pops up at the same time. Now we take the familiar TM-XP2.0 TV monitoring system integrated management platform as an example to describe the intelligent and intensive realization of a perfect TV monitoring system.

1. Centralized display and control

Centralized management and control of the overall functional interface. The operation interface is professional and humanized. The system clearly divides the functional areas, video preview, video playback, device status, electronic maps, GIS geographic information, GPS navigation management, TV wall, access control management, business system, event log and other functional modules at a glance. The operation is simple and convenient. Each function module is provided with a shortcut button, which is simple, fast and clear to complete the operation and daily duty work.

Centralized control and management of the TV wall. TM-XP2.0 system TV screen wall image display method adopts soft decompression on the wall method (high-cost decoding card method and low-cost VGA soft decompression method), through the display control terminal, to achieve centralized control and management of all TV walls, All TV walls can be controlled by one computer.

The image display is fast and flexible. For the video images connected to the system, the monitoring center can choose to view any real-time image at any time, which can be displayed at any position on the TV screen wall.

View various paths of images. Selecting and reading the image can quickly retrieve and view it through various methods such as tree organization, electronic map, and unit name search.

Multiple displays on the same screen. Supports 1, 4, 6, 7, 8, 9, 10, 13, and 16 screen split display on the same screen, which can display multiple images of the same network point and different images of different network points.

Image grouping is convenient. All video images connected to the system can be combined and grouped at will, and the preset image grouping screen can be read at any time. Images of the same type can be displayed centrally for easy business viewing and tracking.

Group round robin function. For the grouped images, you can set the display and round robin strategy for each group of images. You can easily start, stop or automatically start and stop the display and round robin of grouped images.

Priority access and access authorization control. It supports setting the maximum number of image access channels according to institutions and monitoring points, controlling the network bandwidth occupation of the monitoring system, and ensuring smooth network. Under the limited bandwidth, it is ensured that advanced users have priority in calling video.

Remote video parameter adjustment. Privileged users in the centralized monitoring center can make appropriate parameter adjustments to the front-end video image effects (including brightness, contrast, etc.).

PTZ control. For cameras with a pan-tilt or dome installed at the front end, the monitoring center can perform remote control and adjustment according to the authorization.

Video files can be downloaded and played back remotely. The centralized monitoring center can inquire, download and playback the video on any monitoring host in the front end.

Multi-level streaming media forwarding. Using streaming media multi-level management, forwarding control, and load balancing technology, a multi-level monitoring center, multiple OA sub-control users, and multi-mode browsing real-time video monitoring access platform are created. Realize video data sharing.

2. The alarm processing system can interpret various connected alarm types.

Various combinations of alarm and warning methods. After the system receives the alarm event, it can start the corresponding alarm mode according to the alarm type and level. The warning method fully supports the custom combination of picture, text, sound, light and image.

High-level alarms have priority. The alarm information is graded according to the importance and urgency. Different warning methods and early warning processing plans are adopted for each level. When the alarm information appears at the same time, it is ensured that the high-level alarm information is given priority.

The alarm processing plan is programmed. The early warning information processing flow is designed in the program. When the early warning information appears, the system automatically reminds and processes according to the predetermined warning method.

The early warning linkage display is automatically assigned. When an alarm message appears, the TV screen wall automatically assigns a display screen for alarm.

Alarm remote arming and disarming. The monitoring center can arm and disarm the alarm devices connected to the front end, and support the setting of arming and disarming time for each device according to the alarm type.

The alarm log is automatically associated with the image. Perform the image playback of the alarm scene in the most intuitive way. After the alarm occurs, the log is automatically recorded and automatically associated with the alarm recording.

Alarm linkage remote recording automation. When any alarm is displayed in linkage, the monitoring center system can automatically record according to the predefined recording mode, and the alarm log processing record is directly related to the recording file.

Alarm information is uploaded step by step. After an alarm occurs in the front end, it is directly sent to the monitoring center at this level. The system determines whether it needs to be reported to the higher-level monitoring center according to the alarm level setting and processing plan. Each level of monitoring center can develop its own handling plan.

Front-end device alarm linkage function. The detection, control equipment such as alarm, access control, door magnet, electronic identity verification, fire protection, etc. installed in the front end (including vaults, outlets, self-service equipment, office buildings, etc.) can be effectively associated. The alarm or warning signal can be uploaded to the monitoring center system in real time, and the time, location, type of alarm, and processing status of the alarm can be automatically recorded.

SMS group sending function. Important alarm information can be automatically notified to the objects to be sent (such as the person in charge of the unit, the person in charge of security, etc.) through the short message platform through the short message platform.

Mobile phone real-time monitoring function. In the event of an important alarm, the person in charge can check the situation on the spot remotely and wirelessly via a 3G mobile phone to make the most accurate judgment at the first time.

Intelligent monitoring and alarm system access. The system effectively supports the more commonly used intelligent identification devices.

3. Integrated management integration

Workflow tracking and management. In order to improve the management and control capabilities and work efficiency, the system provides part or all of the automated process management for certain business processes, and process tracking, query, and statistical summary of the work tasks or alarm information to be processed.

Equipment management. The equipment connected to the system (including monitoring host, alarm, access control and other technical defense equipment) is managed according to different categories. The upper-level monitoring center can remotely query and count the file information of the equipment connected to the lower-level monitoring center through the network.

Fault information management. It can display the distribution of central equipment (database server, central server, central video surveillance storage manager, streaming media distribution server) and front-end equipment (embedded hard disk recorder) and mutual connections in the form of a topology diagram. And collect real-time host indicators and fault information of all devices. (Such as: system CPU usage, system memory size, memory usage, number of processes in the system, network card in / out direction traffic, CPU usage percentage exceeding threshold alarm, disk usage space exceeding threshold alarm, memory Usage percentage exceeds threshold alarm, video input signal interruption alarm, disk failure alarm, etc.). According to the preparatory rules, the specific equipment on which the fault occurs can be clearly marked on the topology map, and the fault information can be automatically displayed at the same time, and the text description of the fault information can also be sent to the designated personnel by SMS. Fault information query and statistics The device fault information can be queried based on the device's IP address, device name, device class, time period and other conditions. The fault information includes: the time when the fault occurred, the fault type, the fault recovery time and other information. It can count the availability of front-end monitoring points within a specified time period. It can query all host indexes and fault indexes of the management equipment, and can also generate reports of historical records.

Front-end monitoring host inspection function. Set a patrol inspection strategy for the front-end monitoring host connected to the system, perform regular or irregular patrol inspection, and automatically obtain the running status of the front-end host.

Automatic batch timing function. Perform manual or automatic regular time adjustment on all front-end monitoring hosts connected to the system to ensure the consistency of front-end equipment time and center.

System operation log management. All actions such as system configuration, parameter settings, local login operations, remote login operations, front-end configuration changes, and system maintenance are fully recorded in the system operation log. The higher-level monitoring center can remotely read the above system operation log information to realize the supervision of the system operation of the lower-level monitoring center by the upper-level monitoring center.

The system is docked with GPS. It can intuitively reflect the position of the banknote transport vehicle on the way and compile the running track through the GPS system on the GIS map.

Task plan assignment. The system supports the task scheduling function for each logged-in user to automatically record the task completion status and completion rate.

Report processing. Query system operation, equipment operation, business inspection, alarm, attention, identity verification and other log records, can automatically generate reports according to different conditions, and can be exported to Excel documents. Print the generated report.

Counter business supervision. Remotely supervise the bills and vouchers that need to be supervised by the counter business through the OA sub-control method, and provide the off-site inspection and supervision platform for the business department.

Centralized storage management. The system supports centralized storage of disk arrays to achieve long-term storage of various key videos in the monitoring center. You can manually or automatically select remote video storage for any image you view; the alarm linkage video image is automatically stored. For the addition of video server outlets, it will automatically link to the center for recording at night or when the equipment fails, ensuring the continuity of the recording data.

Multi-level interactive management, data synchronization. The system adopts distributed database management with strong performance to achieve the functions of data synchronization, information interaction, information forwarding and automatic system update among multi-level monitoring centers.

System security control management. For all users who use the system, the system has carried out rigorous rights configuration and management. Strict control and unified management of user application, approval, authority allocation and other links.

System network resource control. Effectively control the number of access channels of the front-end DVR device. When the number of access channels is exceeded, the necessary restrictions can be made, and priority priority is given to priority access; when the access limit is exceeded, the queue is waited according to priority.

4. Voice intercom

Voice intercom center. The voice center system is aimed at the needs of remote centralized monitoring, remote training, remote conferences, office communications, call services, etc., and provides the best voice intercom results based on the use of network resources and voice resources.

Voice broadcasting and calling. Use the voice equipment on the office computer to establish a "call" and "called" relationship with the voice center system to achieve a clear call effect.

Voice conference. Establish a broadcast group in the voice center system. If it is associated with the video image, it can realize remote video conference and video training at multiple sites.

Instant intercom. In the process of viewing the video image, the voice intercom will be started immediately.

Self-service bank shouts. For the long stays in the self-service banking area that are too long (e.g. cold, overnight), crowd gathering, or other security incidents, you can shout and talk to them in the monitoring center to drive or stop to prevent the case.

5. OA sub-control use management

Support WEB client. In the case of not installing any client program, OA sub-control users share the information of the monitoring center and perform related business processing through the browser.

OA sub-control user management. For users who install OA sub-control software, according to the needs of the work, the authority and scope of use responsibilities can be assigned to each specific camera channel.

Pay attention to the video function. When reviewing and reviewing the video images, if you find violations or need to focus on the review, you can immediately initiate "Follow" to save the real-time images. Record the handling information of “concerned” situations in the system, and feedback the results.

OA sub-control use management and supervision. The track record and query of the operation information of users using OA sub-control, including the login time, address, login duration, viewed outlets and image information, etc. 6. Electronic map navigation

Linkage between electronic map and alarm. All front-end alarm information will be sent to the electronic map server for warning and processing, including automatic positioning of the alarm location on the electronic map, automatic pop-up of images, voice text prompts, and information output on the large screen.

Quick navigation of electronic maps. With the latest technology, electronic maps and video images are fused together, and users can directly select images at a certain location with a simple click.

Electronic map editing. According to the location of the center, set up an electronic map of the entire jurisdiction (the top map of the jurisdiction), which can be pushed down and zoomed layer by layer, and the multi-level electronic map of the organization and equipment configuration is completed by this level. After the upper or lower center configures or modifies the electronic map, the system automatically updates synchronously.

Automatic linking of electronic maps. The electronic map supports any multi-level map configuration. The hot spot of the electronic map can display the bitmap of the target area. Click on the associated technical defense equipment to directly view the on-site monitoring images and equipment status.

4. The application status of intelligent and intensive TV monitoring in China

1. Safe City "311" Project

With the implementation of the "Safe City" strategy by governments at all levels in China, the development of intelligent and intensive management of video surveillance has been comprehensively and effectively promoted, and the existing network conditions and network infrastructure have been vigorously transformed to build a basic network with China Telecom as the backbone. It has basically been able to meet the needs of current local intensification. Major cities across the country have deployed public security departments around the center as large-scale deployments of intelligent and intensive network video surveillance systems. After the system is completed, two types of monitoring resources including public security private network and external network are included to form a "Tianluodi network" covering all major public areas of the city. In such a large-scale monitoring and networking system application, in fact, it does not fully realize the comprehensive integration and management of video surveillance, alarm linkage, access control system, satellite navigation, GIS electronic map, etc., but realizes the simple transmission of video surveillance and alarm . The video surveillance network management platform represented by Galaxy TM-XP2.0 can fully meet the comprehensive integration needs of safe city construction.

2. Security protection project in the financial industry

At present, the TV monitoring systems in the financial industry that simply implement localized intelligence and localized intensive management mainly include Bank of China, People's Bank of China, China Construction Bank, and China Rural Credit Cooperatives. , TV wall output and other functions, the realization of other functions will take some time.

3. Other industries

Other industries mainly involve entertainment and service industries such as hotels and Internet cafes.

V. Summary

The traditional TV wall monitoring has gone a long way towards intelligent and intensive development. With the development of the economy, security precautions have become more and more important. Today, broadband networks have become popular, and digital equipment has become more and more sound. Advanced network technology integrates video images, alarm processing, voice intercom, access control, electronic identity authentication, lighting linkage, remote scheduling, electronic maps and other equipment or subsystems, and builds information collection, transmission, control, display, Storage, management and other functions, the intelligent and intensive development of alarm, video monitoring and security management of the targets that need to be guarded are already unstoppable.


Product categories of Steel Tubular Pole , we are specialized manufacturers from China, Galvanized Steel Poles , Galvanized Tubular Poles suppliers/factory, wholesale high-quality products of Steel Tubular Pole Tower R & D and manufacturing, we have the perfect after-sales service and technical support. Look forward to your cooperation!

we also provide 30ft Galvanized Steel Pole, Hot Dip Galvanized Pole , Hot Dip Galvanized Steel Pole.


a) Since 2001

b) Location: located in the beach of scenic and rich Taihu Yixing with good transport service.

c) Total Staff: 136 people

d) Certificate: ISO 9001:2008, ISO 14001:2004, OHSMS idt OHSAS 18001 and 500KV power transmission line tower production license

e) Equipment: ranging from angle bar fabrication, plate fabrication, drilling hole, bending, gas/plasma cutting to welding. Besides, we can galvanize by ourselves with 2 Zinc Baths. Our annual maximum capacity amounts to 100,000 tons.

f) Anti-Corrosion: Hot-dip galvanization as per ISO 1461 or ASTM A123.

g) Welding: CO 2 welding or Submerged arc auto methods.

h) Products: power transmission steel tower, telecom steel tower, TV/radiobroadcasting steel tower, drilling well tower, and similar steel structures for substation,plant workshop etc.

i) Experiences: Bangladesh(Desco), Sudan, the Philippines(Transco), India(Reliance), SriLanka(Lanka Bell), Indonesia(PLN),Ghana, Sierra Leone, Tanzania, Ethiopia.

Our motto is: Quality is the life blood of the company, therefore, We have been making every effort to provide high quality Galvanizing Steel Pole .


galvanized steel pole

Galvanized Steel Pole, Galvanized Steel Light Pole, Galvanized Steel Electric Pole, Galvanized Steel Street Pole,Galvanized Steel Poles,Galvanized Tubular Poles,30ft Galvanized Steel Pole,Hot Dip Galvanized Pole,Hot Dip Galvanized Steel Pole

YIXING FUTAO METAL STRUCTURAL UNIT CO.,LTD( YIXING HONGSHENGYUAN ELECTRIC POWER FACILITIES CO.,LTD.) , https://www.chinasteelpole.com

Posted on