1, video monitoring subsystem
The video monitoring system can monitor the images in real time, and effectively record and play back the images of important parts and places such as main passages, elevators and cultural relics exhibition halls, cultural relics warehouses and temporary storage rooms in buildings. The quality of recorded and replayed images shall meet the management requirements of traceability certificate, and the image quality shall not be lower than Grade 4; The video surveillance system should be linked with other security systems such as intrusion prevention alarm system, access control system, etc., so as to make the prevention ability more powerful.
2. Intrusion alarm subsystem
The intrusion alarm system should have protection against disassembly and destruction. When the intrusion detector is damaged, the shell is disassembled or the signal transmission line is short-circuited and connected in parallel with other loads, the detector should be able to send an alarm signal. Multi-beam perimeter, window perimeter, wall perimeter and other combinations are adopted to effectively protect open areas, doors and windows, important warehouses and so on. And implement real-time monitoring of multi-defense zones, and closely combine technical defense with civil air defense to form countless invisible hidden infrared networks. For the indoor key areas of the museum, three detectors should be installed to detect the abnormal intrusion of personnel in time. When people patrol, the traditional sign-in form of autograph book is prone to sign-in or make-up sign-in problems. Checking the sign-in is time-consuming and laborious, and it is difficult to analyze the theft and dereliction of duty. Therefore, electronic patrol subsystem should be adopted.
3. Access control management subsystem
Access control points are set at the main entrance of exhibition hall, office area and warehouse, and the card is swiped by inductive card reader to enter.
All card reading must be recorded, and card authorization, loss reporting and deletion can be carried out. When an alarm event occurs (such as using a loss reporting card or illegal entry), you can connect a camera and a monitor to monitor the access point. Access control management subsystem should be able to facilitate card issuing task, authority management task, access control time management and flexible and convenient off-line working ability. [Next Page]