Taipei Parking Management Office surveillance system facilities.
We provide solutions to reduce security blind spots and potential dangers in parking facilities. The object of this project is to implement a surveillance system across 58 parking lots. It will comprise a control server to monitor real time video, camera and intercom systems in each parking lot, and a recording and broadcasting server in the parking lot offices.
Surveillance cameras normally differ in installationlocations and application needs, network-based camera extensions should beimplemented for the security blind spots in parking garages, such as staircaseor the corner of stairwell.
2. Fault-tolerant and redundant systems
Images are transmitted from the cameras across allthe parking lots data network and stored on a server.
3. Multiple usage
Thevideo images can be transmitted to different clients through the video stream,to fulfill the clients’ needs of monitoring and control.
Intelligent Video Surveillance with Cloud Computing.
1. Cloud video monitoring platform
The system is built around a central management/command and control center in order to provide effective cloud-based service that can be accessed remotely as well. SaaS architecture is utilized as the foundation of the system. It’s functions include:
(1)Provide remote video monitoring and control
(2)Provide remote access to the video imaging
(3)Provides remote device management
(4)Provide identity authentication service integration
(5)Provide electronic map image monitoring mode
(6)integrated electronic map, video surveillance,and alarm events
(7)TV wall display and management functions
(8) integrated intelligence image analysis system in emergency alert notification
2. Video recording surveillance system
The system has two modes:A. Clustering on cloud site, or B. Decentralized monitoring local site. The system stores all images of the video recordings, streaming forwarding, system operation log, abnormal events and other functions, you can save the image to central storage for preventing mislaying, to effectively integrate it into the systems. The system can also be integrated with the cloud-based video surveillance platform, to achieve a network of remote management and centralized storage management. Its features include:
(1)The camera front end performs video streaming recording, video data recovery, breakage detection, device status supervision,configuration and management of equipment parameter.
(2)CMS system to set all parameters for NVR and the cameras and stored in the CMS system. For the future replacement of NVR and the cameras, you can restore the original device directly through CMS parameter, it is conducive to maintenance, repair and replacement.
(3). NVR uses N +1 as the redundancy design, even if a NVR equipment malfunctioned, other NVRs will start to record, security video data is not to be missed.
(4) NVR adopts single disk array host architecture, unlike the traditional NVR host and storage needs to be the high cost of two sets of equipment
(5)Unified management of front-end equipment, all front-end cameras, alarm I / O and other devices, can all be set up and managed, operating status of the equipment can support real-time monitoring.
(6)To attain video data transfer ability,portability, etc., if the computer facility changes in the location, you simply reset the IP address of the server relocation. It will not affect the video architecture.
(7)Storage server and hard disk devices are able to obtain maintenance and warranty, emergency maintenance and SLA provide fast service quality.
(8)The systems support uses local site storage and cloud site remote backup architecture.
3. Intelligent Video Analysis System
The program provides smart intrusion detection systems and event alert management to attain the goals of automation and intelligence. Through integration with video recording system, it can capture live video images to conduct data analysis, its features include:
(1)Intrusion detection in warning area.
(2)Immediate image tracking of the invasion object.
(3)Integrating with the electronic map.
(4)It presents a two-dimensional coordinate values of the intrusion object on the electronic map, and continue to coordinate and track the position.
(5) Perform immediate alert and event notification, alert messages sent through SMS, Email and other notifications, and recorded in the event log.
(6)camera image is out of focus, blurred, steering and other detection.