Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A community security system based on cloud computing

A security system and cloud computing technology, applied in computing, closed-circuit television systems, computer components, etc., can solve problems such as inability to prevent and accurately distinguish outsiders

Active Publication Date: 2021-01-22
南京顺斯谷德科技有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The community security system mainly includes five categories: residential alarm subsystem, access control subsystem, video surveillance subsystem, electronic patrol subsystem and parking management subsystem. In addition, when the light is insufficient or too strong, adjust the shooting position and fill light conditions, so as to achieve the effect of improving image clarity, so as not to make it difficult to accurately distinguish outsiders and give criminals the opportunity to enter. provide adequate protection;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A community security system based on cloud computing
  • A community security system based on cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] like Figure 1-2 As shown, a community security system based on cloud computing includes a data collection module, a matching and comparison module, a signal processing module, a controller, an action command module, an image analysis module, a personnel collection module, a householder confirmation module and an image verification module;

[0053] The data acquisition module is used to collect the voice element information of the foreigner in real time, and transmit it to the matching and comparison module, and the voice element information includes pitch data, sound intensity data, sound length data and timbre data, and different foreigners are Different pronunciation bodies, the sounds produced by each pronunciation body are different in pitch, sound intensity, sound length and timbre;

[0054] After the matching and comparison module receives the real-time voice element information, it compares the pitch data, sound intensity data, sound length data and timbre data ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a community security system based on cloud computing, which includes a data collection module, a matching comparison module, a signal processing module, a controller, an action instruction module, an image analysis module, a personnel collection module, a householder confirmation module and an image verification module; The present invention combines the distance of the outsiders with the ambient light intensity of the outside world to control the movement of the components in the access control identification device, and then adjust the shooting position of the camera according to the distance and light conditions of the outsiders at that time. , in order to improve the clarity of image collection, so as not to be difficult to accurately distinguish outsiders, and give criminals opportunities to enter, it cannot play a sufficient preventive role, and adjusting the irradiation position of the fill light can play a supplementary role. At the same time as the effect of light, it can also avoid the negative impact caused by direct light on the face of outsiders.

Description

technical field [0001] The invention relates to the technical field of community security systems, in particular to a community security system based on cloud computing. Background technique [0002] The main function of the community security system is to improve the effect of security precautions, and the biggest threat to residents' lives and property in terms of security includes two aspects: one is the damage caused by man-made, and the other is the damage caused by non-human. The security system is to prevent these unsafe factors through effective measures, so as to create a safe and comfortable living environment for the residents of the community. [0003] The community security system mainly includes five categories: residential alarm subsystem, access control subsystem, video surveillance subsystem, electronic patrol subsystem and parking management subsystem. The distance between people is different, and when the light is insufficient or too strong, adjust the sh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/37G06K9/62H04N5/232H04N5/235H04N7/18
CPCG07C9/37G10L17/06G10L17/02G10L17/22H04N23/57H04N23/611H04N23/695H04N23/74
Inventor 刘小兵尹向东杨杰段华斌谭道军
Owner 南京顺斯谷德科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products