Network video surveillance applications continue to expand IT technology has become a supporting technology in the field of security
The security field has always been a relatively independent and closed market. With the popularity of video surveillance, especially network video surveillance in 2007, monitoring equipment and monitoring systems are rapidly developing in the direction of digitization and networking, and IT technology has become the security field. It is playing an increasingly important role in the construction of safe cities and safe communities. Suddenly, like a spring breeze, thousands of trees and pears bloom. In 2007, the relatively closed and silent security market door was suddenly opened overnight by the hands of "Safe City". Relevant information shows that by 2008, China will become the world's second largest security monitoring market, with a market capacity of 100 billion yuan. This big cake is undoubtedly exciting and coveted. Traditional applications continue to expand The detonation of the network video surveillance market started from the construction of China's "safe city". Urbanization is an important "wheel" to support China's economic growth in the future. With the further acceleration of China's urbanization process, China is already the world's largest construction market, with an annual construction area of ​​nearly 2 billion square meters. Most of the buildings are distributed in cities, and the requirements for building intelligence and security are very high. It is particularly worth mentioning that the 2008 Olympic Games in Beijing, the 2010 World Expo in Shanghai and the Asian Games in Guangzhou played a driving role, which led to a rapid increase in safety investment in transportation and public places in these cities. At the same time, the security needs of public places such as libraries, museums, and parks have also led to the construction of video surveillance systems. It is reported that the budget security funds announced by the Beijing Olympic Organizing Committee has been greatly adjusted, and the entire budget is close to the level of 2.4 billion yuan for the Athens Olympic Games. Across the country, the Ministry of Public Security is carrying out the "311" (i.e. Safe City) project in 22 pilot cities across the country. The number of cities with high-tech police that first started in coastal areas has increased by 38, and now there are nearly 100 pilot cities. Under the leadership of this tide, 400 cities across the country (about 2/3 of our domestic cities) are promoting the construction of "safe cities" to varying degrees, and the construction of traffic monitoring in the vast number of small and medium-sized counties in China is also being carried out on a large scale . In addition to the driving force from urban construction, the security needs of many traditional industries themselves cannot be underestimated. Industries such as finance, insurance, petroleum and petrochemicals, power and communications have strong security application requirements. At the same time, with the further acceleration of China's industrialization process, the safety production problems of coal, non-ferrous metals, energy and other industries have become increasingly prominent, and the norms and requirements of safety production have become more and more clear. Safety production has become a basic requirement for these industries and enterprises. Network video surveillance is the core of ensuring security. In addition, with the substantial increase in production automation and modern manufacturing lines, the demand for monitoring applications is also increasing, with amazing capacity. On the other hand, the situation of informatization construction in which urban emergency response, digital city, safe city and information city are independent and striving to take the lead has changed considerably. increasingly integrated. The specific manifestations are: the construction of the system is more practical, and the various application systems and platforms begin to integrate, integrate and collaborate. Although the current integration is still in its infancy, there will definitely be greater development in the future. In these applications, network monitoring is a very important part and acts as the most basic platform. Without video monitoring, an important information collection and transmission management platform, other systems cannot play their due role. Due to the integration of IT technologies, many systems are in urgent need of upgrading. In China's existing 43 billion square meters of construction area, many of them were not installed with security equipment and systems. Most of the existing ones are also high-energy-consuming systems. Therefore, including upgrading from analog to digital and front-end intelligence The market size formed by the improvement of networking and pixels and the conversion of traditional circuits from analog to network is not small. IT becomes the supporting technology of security In fact, the hand behind the door to truly open the traditional security is the introduction and integration of IT technology into the traditional security industry. The traditional security technology is gradually being digitized and networked, and the front-end video and other acquisition equipment is gradually transitioning to network digitization, so that the collected information is easier and clearer; the front-end camera is spherical, and the latest electromechanical technology is introduced. It has high-end features such as wide dynamic range (WDR), and integrates high-speed gimbal, protective cover and decoder, making the structure tighter, lower moment of inertia, faster speed, and higher positioning accuracy, which is both beautiful and more concealed flexibility and easy installation. In the front-end equipment of monitoring applications, due to the expansion of the application, there are not only cameras, but also front-end sensing equipment, so that the composition and concentration of gases and liquids can be easily detected to monitor the places that people cannot enter. In addition, due to the adoption of digital front-end equipment, the collected data can be transmitted through the intermediate IP network. Although these transmissions have strict requirements on the network, such as the network requires that the transmission delay be within 400 milliseconds, the image jitter should be within 50 milliseconds, the packet loss rate should be less than 3/1000, and mosaics should not appear, etc. However, due to the network infrastructure construction With the increasingly complete and mature wireless network transmission equipment, these data can be easily transmitted through various IP networks, which greatly facilitates the application and promotes the popularization of the application. In addition, due to the increase of data, the storage, management and application of the collected information have been put on the agenda, from the coexistence of traditional DVR (digital hard disk video recorder) storage and network-based storage, and gradually migrated to network storage, management of background information Storage is also starting to come up with new demands such as search. New technologies continue to mature The market is driving the continuous emergence of new technologies, such as biometrics, behavior recognition, multimedia content search, 3G technology and the maturing of infrastructure, making true multimedia monitoring including audio and video possible. For example, there has been a major breakthrough in face recognition in biometric technology today, and the uniqueness of recognition can be guaranteed through three-dimensional face recognition. Currently, such products have appeared in the market, and their recognition accuracy can meet actual needs. The behavior and body recognition technology uses the powerful data processing function of the computer, combined with the intelligent video technology, can perform high-speed analysis on the massive data in the video screen, filter out the information that the user does not care about, and only provide the monitor with useful key information. Identify different kinds of objects. For example, at the entrance, if the set item or person does not pass through, the image will not be recorded and stored. In places where parking items are prohibited, the system will alarm if there are items parked; when the stored items are taken out of the range that the system can monitor, the system will alarm. The application of these technologies can make monitoring from passive security to active prevention. . Due to the enhancement of the functional requirements of front-end equipment, the monitoring system has become not only an intelligent computer equipment, but an integrated combination of various applications, namely face recognition, video motion detection alarm, perimeter alarm, access control, license plate recognition, etc. Combined with video surveillance in the same equipment terminal. In background management, the most important thing is to be able to search for information. It can be calculated simply. Assuming that there are 100,000 cameras, and each camera is collected in CIF (352×288) format and 25 frames per second, the storage capacity required for 1 second is about 6.4GB, which is easy to store in one day. It is about 553T. In the face of such a massive amount of data in the storage device, it is tantamount to finding a needle in a haystack to manually search for a video from the storage device. The existing method is that the monitoring personnel only need to select the monitoring point and time period to extract the corresponding video data according to the alarm information, and the research direction is to be able to search for the information in the picture. Preliminary search for human-definable suspicious targets and alarms. New applications are emerging Although monitoring devices are increasing, monitoring cannot be ubiquitous. For environments where fixed monitoring is not deployed, remote mobile wireless monitoring becomes a remedy in the event of an emergency. In addition, many industrial applications require the temporary use of monitoring systems. For example, construction sites need to monitor the section of the project to avoid accidents and illegal operations. At this time, the monitoring system based on mobile cameras and wireless networks can meet such requirements. need. It has become a relatively common method in developed regions such as the Pearl River Delta, where there are many manufacturing and energy industries, through monitoring systems to promote the completion of corporate environmental protection and emission reduction targets. The environmental protection department establishes a monitoring system at the sewage outlet of the enterprise's factory, and supervises the implementation and compliance of the enterprise in terms of energy conservation and environmental protection by monitoring the concentration and composition of gas and liquid. In addition, the establishment of network monitoring for the water quality of urban rivers and water sources has become increasingly popular. In addition to the application of security precautions, network video technology has also begun to extend to more businesses. Some insurance companies in our country use remote high-precision video cameras to remotely identify the damage of vehicles in the repair station to determine the level of indemnity insurance. At present, this kind of monitoring has also begun to be applied in other industries. The field of personal monitoring is also changing quietly, and its market is showing an optimistic development trend. With the increasing demand for home security by individual users, the awareness of using monitoring systems to ensure residential security has been significantly strengthened, and the scope of the monitoring market will continue to expand. On the other hand, the real arrival of the 3G era, the increase of mobile terminals and videophones provided by 3G mobile phones make it more convenient for us to check the network at home, and it is gradually approaching that the monitoring target can be viewed anywhere, at any time, and through any device. Do monitoring at any time. The market is facing a reshuffle The network monitoring market is generally optimistic, and various manufacturers are flocking to it. However, for these manufacturers, the challenges in the future will be very severe. According to the data, there are currently more than 10,000 enterprises in the security monitoring field in China, but each company has only 29 employees on average. The scale of the enterprise is relatively small, the independent innovation ability of science and technology is weak, many key technology products rely on imports, and the management methods are relatively backward. , many are just agents, the industry management is also weak, and the market order is not standardized enough. In the face of market opportunities, every manufacturer will not give up easily, so the market competition will be very fierce and cruel, facing major variables. First of all, due to changes in technology and industry chain, including the entry of a large number of non-security manufacturers originally belonging to the IT field, traditional security manufacturers invariably choose to break out collectively. Facing the entry of new heavyweight manufacturers in the market such as Huawei 3Com, Ericsson, ZTE, Cisco, and IBM, they began to use their technical advantages to seize the market. Traditional big manufacturers such as Sony, Samsung, and Panasonic strive to develop the monitoring department business, strengthen research and development, and actively To expand their power, local traditional security companies in China use their own industry advantages to operate in capital, or establish their own cooperative alliances, or expand their strength through listing financing, etc., and invest capital in technology for R&D and technology acquisitions. Some Powerful manufacturers began to develop monitoring and management platforms and middleware. At the same time, the industrial chain is also further elongated, and software manufacturers, search manufacturers, communication manufacturers, and storage manufacturers have entered. As large-scale applications need to use the telecommunication network, mobile telecommunication manufacturers have also entered the field of network monitoring. The telecommunication giants use their powerful funds and resources to establish monitoring systems to provide rental services, hoping to gain a favorable position in the future. On the other hand, the development of mass storage from the current storage system to the network also provides opportunities for traditional IT storage vendors. Secondly, the introduction of standards and related regulations will accelerate the reshuffle of the market. my country's security industry standards are relatively backward, the Security Technology Standardization Committee has drawn up plans to formulate 19 standards in the past two years, of which 11 will be issued by the end of 2007, including transmission, control, etc. There will be specific standards. At present, the national standards of "one big and three small" have been formed, including technical specifications for security protection engineering (GB50348-2004), engineering design specifications for intrusion alarm systems (GB50394-2007), engineering design specifications for video security monitoring systems (GB50395-2007), Entry and Exit Control System Engineering Design Specifications (GB50396-2007), the latter three standards should be completed in 2007. In addition, among the industry standards, 17 standards for safe cities are being formulated, and old industry standards and norms such as cultural relics museums and banks are also being upgraded and revised. Although the standard is being developed, there are still many problems. For example, in terms of compression standards, there are international H.264 standards, MPEG4 standards, AVS and other standards, and different industries also have different standards, and each place also has its own standards. Many standards make enterprises at a loss when deploying, and for manufacturers, in the current situation where many standards coexist, they must ensure maximum compatibility of their products and systems. Without strong technical support, it is impossible to achieve this. at this point. In addition, the Security Association will also make certification requirements for the qualifications of enterprises, and some enterprises will be eliminated. At the same time, higher requirements will be put forward for construction personnel, and security occupational grading certification will be launched, including security design appraisers (divided into multiple levels), security installation and maintenance personnel (divided into multiple levels), etc. In the future, the threshold for network monitoring will be raised. In the traditional video surveillance industry, the technical and capital thresholds are relatively low, the business model is easy to replicate, and the market profit is relatively low. Due to the advancement of technology and the increase of product and system integration, small projects have gradually decreased, large projects have increased, and construction difficulty has increased, so that many manufacturers were forced to withdraw due to lack of funds and technology. With the further regulation of the market, product technology, construction, and services have all changed. Without strong financial support, it will be difficult to survive in the market. For manufacturers, the building of services and brands also needs to be strengthened. Brand is the foundation of an enterprise. In the current competitive market, it is impossible for users to let manufacturers use themselves as experimental products. When choosing products and systems, brands are increasingly becoming one of the focuses of attention. At the same time, the application of the monitoring industry will not be built once and used forever. The increasingly complex monitoring system and the changing needs of users all require strong service guarantees. All of these are challenges faced by manufacturers participating in the security market. Smart Phone Holder For Car Vent Smart Phone Holder For Car Vent,Air Vent Iphone Mount,Air Vent Phone Holder,Air Vent Cell Phone Pouch Holder Ningbo Luke Automotive Supplies Ltd. , https://www.car-phone-holder.com