Look at this silent "Bodyguard", the smart security mode has been turned on

Brushing the face into the door, returning home to lie on the sofa, directing the robot to complete the work of sweeping the floor, ending the tea, etc., you can see the situation at home when you go out... At the second security product exhibition held recently, a series of The scenes that can only be seen here are staged here. These products and their application technologies, which are closely related to the “safe” and “convenient” life of the people, make the people dizzying and stunned.

With the rise of smart cities, there are predictions that the security industry will enter a stage of great development. The data shows that the size of the domestic security industry in 2016 was 540 billion yuan, an increase of 11% year-on-year, and the annual added value of the industry was about 190 billion yuan.

So what is smart security? What is the current development status and problems of smart security? What is the trend of smart security in the future?

Silent "Bodyguard"

The intelligent door lock experience hall, set by the staff, the public stood in front of the door lock, the face was aligned with the identification area of ​​the door lock, and the door "dropped" was opened.

Look at this silent "Bodyguard", the smart security mode has been turned on

“This is a door lock that combines key unlocking, password unlocking, and face unlocking.” The staff said that you can set dozens of faces and set the number of times a person can use it. In addition, mobile phone remote monitoring is also popular in the field, as long as the camera is installed at home, and then download a special APP, you can use.

In fact, whether in life, at work, in shopping, or in leisure, we can see the security system. It is like a silent "bodyguard" that guards the safety of our people and property, and the public security department relies on security. The monitoring system has successfully solved thousands of cases, and now many new and old residential communities in many cities have installed intelligent security systems.

The anti-corruption drama "The Name of the People", which has just ended the game, has a lot of security elements, such as video surveillance, building intercom, face recognition, etc., which showcases a number of intelligent security devices.

According to experts, intelligent security systems can be understood as the technical system for the transmission and storage of images, the storage and processing of data, and the selective operation. A complete intelligent security system mainly includes three parts: access control, alarm and monitoring; The biggest difference between security is intelligent, because intelligent security can realize intelligent judgment through the machine, so as to realize what people want to do as much as possible; and traditional security is more dependent on people, and it is very labor-intensive.

Security monitoring entered an outbreak

“Security monitoring is the first area where artificial intelligence is the first to generate commercial value on a large scale. This can be seen in 2016. In 2017, there will be at least 10 times more growth than last year,” said Zhao Yong, founder of Gling.

With the advancement of smart city construction, the security industry is entering a new historical period. Then, how much security market growth will bring in the construction of smart cities?

According to market research organizations, it is assumed that there are 146 prefecture-level cities in China that start smart city construction, and different investment proportions are estimated according to the size of urban population. Only the smart city construction investment of these prefecture-level cities will reach 412 billion yuan, of which security will occupy A larger share.

It can be seen from the analysis of the downstream demand of China's smart security industry in 2017 given by professional institutions that video surveillance accounts for 51% of the domestic security industry. Safe city and intelligent transportation are the main reasons for the rise of demand. From the perspective of downstream applications, security products are mainly used in safe cities (24%), intelligent transportation (18%), and intelligent buildings (16%). These areas are currently in a period of rapid development.

Zhao Yong believes that artificial intelligence is not an industry. It is more like an energy, such as water or electricity. When artificial intelligence flows into different industries, it will nourish the development of these industries. Only different industries have different growth rates with the participation of artificial intelligence. Among them, security monitoring is the fastest field of artificial intelligence commercialization.

It is predicted that although the current stage of video surveillance is in the main role of intelligent traffic applications, the Internet of Things is only an aid, but the future trend, for the intelligent security of buildings, the Internet of Things has great potential. According to the statistics of the National Security Center, many cities have begun to use the IoT technical security system on the new security window to connect with the community security system monitoring platform.

Big data is the bottleneck

Although there are huge market potentials in the construction of security intelligence, it also contains many risks and challenges.

"When the data we need becomes structured data, there must be a large number of data mining applications in different industries and different scenarios to effectively transform structured data into meaningful intelligence. In the future, artificial intelligence will be in the security monitoring industry. A large number of application software market space, for each vertical industry to do targeted data mining." Zhao Yong said.

Therefore, big data and its intelligent applications are the key technologies to improve the level of security intelligence. Only by making full use of video image structuring algorithms and making full use of artificial intelligence technology for massive data mining and analysis can real security intelligence be realized. Only after major breakthroughs have been made in key technologies such as machine vision, speech recognition, and biometrics, intelligent security will show its due performance.

"Security monitoring data is actually the lowest value data. There are so many cameras and video data, many times we just put these video data there, and we won't look at it. It can't be seen anyway, it's actually wasteful. But What the customer needs is always meaningful intelligence. Whether it is for security reasons or management factors, it needs meaningful intelligence." Zhao Yong said.

At the same time, the security industry is an application industry. After the industry is intelligent, the product categories are continuously enriched, and many market segments will be derived. How to provide different products and solutions for different levels of customers is a problem in the industry. Achieving the precise division of the industry and giving practical and comprehensive solutions is a severe test for the overall strength of the company.

Subversive power

"In the future, we will not need to swipe our cards. We have an interesting solution: smart door lock based on face recognition and identification technology to realize the application of no front-end hotel." Sun Qiang, founder of Qingdao Lock Intelligent Technology Co., Ltd. It is said that ID card identification and facial recognition with lock intelligence are completed by connecting the public security system. It is based on the requirement that the public security system requires me to stay, so that the user can go directly to the room for identity authentication and independent occupancy.

“This is to reduce the burden on the front desk of the hotel. Second, the entire check-in process has a good guarantee for user safety and privacy. This can provide a new experience for the hotel industry.” Sun Qiang said.

Look at this silent "Bodyguard", the smart security mode has been turned on

Internet of Things applications provide a broader space in the field of intelligent security. The development of the Internet of Things has opened up the deep application of security intelligence, and has become an important symbol of the era of smart security, becoming the second spring of intelligent security services.

For example, the LCD splicing screen in the "People's Name" drama is similar to the characteristics of Emperor Ai Di's "HD surveillance intelligent cloud screen", which are based on the Internet of Things, mobile Internet, big data, cloud computing, data sharing, artificial intelligence, New technologies such as interconnection and interoperability.

The person in charge of Emperor Aidi Electronics introduced that “HD surveillance intelligent cloud screen” only needs one network cable to play the entire Internet and can be remotely managed centrally. The intelligent management is realized, and the system is integrated into the security big data. Once the situation is abnormal, the alarm can be automatically prompted, and the video information immediately appears on the cloud screen to assist the public security command department in direct command and dispatch.

At the same time, in recent years, deep learning has gained some applications in the fields of image recognition and speech recognition. At present, the most widely used deep learning technology in the security industry is the visual field, that is, the analysis of images and videos. In image analysis, such as familiar face recognition, text recognition and large-scale image classification, deep learning greatly improves the accuracy of complex task classification, which makes image recognition, speech recognition, and semantic understanding accuracy significantly improved.

Li Ming, senior technical manager of Nvidia China, used the example of traffic congestion in Beijing to illustrate the development space of intelligent security: the video taken during the driving of the Golden Gate Bridge in the United States, as the vehicle travels, can identify vehicles, roads, pedestrians, etc. in real time. Information; the video of the US police patrolling the parking lot outside the supermarket can monitor and record information such as the license plate, color, and surrounding human characteristics.

Therefore, deep learning technology is also known as one of the disruptive forces in the security industry. In the man-machine battle between AlphaGO and Li Shishi in March last year, breakthroughs in deep learning have promoted the vigorous development of artificial intelligence, and it will promote the development of intelligent security in the future.

6.7MM Wire To Board Connectors

6.7MM Wire To Board Connectors.6700series.


What are the main types of wire to wire connectors? In the connector industry, there is also a kind of product called connecting wire, which is often said to be terminal wire. Some terminals have terminals at one end, the other end is welded on the circuit board, and some have terminals at both ends. When these terminals form a male and a female, when the wire rod and wire rod form a mutual connection, the terminal can be regarded as A wire to wire connector, that is to say, most terminal blocks are a wire to wire connector product.


Line to board connector, connector product connecting wire or cable to circuit board. The main embodiment of the line to board connector is that the I / O terminal wire is formed by adding a connector, and the other end of the terminal line is welded on the circuit board, and the connection relationship is formed by the male and female docking of the connector, forming a complete connection scheme. Relatively speaking, many connectors can form a line-to-line relationship, and can also form a line-to-board relationship. One of the more easily distinguished cases is that one section of the connector is welded to the circuit board, and not all connectors are installed on the circuit board in the common welding way.

6.7MM Wire To Board Connectors

ShenZhen Antenk Electronics Co,Ltd , https://www.antenkcon.com

Posted on