共查询到20条相似文献,搜索用时 62 毫秒
1.
随着智能大厦及智能小区的发展日益迅猛,作为智能大厦安防系统重要组成部分的智能门禁管理系统已成为保证人民人身和财产安全的最主要的安防措施之一。为了实现对门禁管制区域的智能化管理,采用生物识别技术中综合性能最为可靠的掌形识别技术,设计和实现了一套基于SSH的智能门禁管理系统,通过对掌形仪传来的信息进行分析、识别,从而进行有效的监视和管理。 相似文献
2.
3.
冯德尹 《电脑编程技巧与维护》2014,(16):59-61
基于B/S架构的实验室门禁管理系统,实现了管理员或者教师在客户端使用浏览器管理门禁权限的功能。实验室门禁管理系统是一种出入口控制系统,它作为一种现代化的新型的安防管理系统,集自动识别技术和现代安防管理措施为一体,可以十分有效地保证个人和集体的财产的安全。 相似文献
4.
基于生物识别技术的门禁系统是目前最为安全的识别系统。本文设计了一种基于CC2500无线收发器的门禁控制系统,在人脸识别门禁控制系统中加入了无线传输模块,提高了门禁控制器的安全性,节省了传统的布线成本。实现了人脸识别系统和门禁控制之间的双向通讯。 相似文献
5.
6.
智能化门禁管理系统通过对出入口的控制来限制人员进出公司,进而达到确保公司安全的目的。提出了一个非接触式IC卡智能门禁管理系统,包括管理中心端、门禁端和非接触式IC卡。介绍了各组成部分并着重设计了M1卡与读/写卡器的通信及控制器与PC的通信。该系统使用简单,可靠性高,系统维护方便且价格低廉,有很好的应用推广价值。 相似文献
7.
8.
《A&S:安防工程商》2013,(5):108-109
针对省级银行中心的银行单位,银行门禁的安防整体解决方案包括:银行综合一卡通管理系统,该系统集门禁管理、视频监控、语音对讲、防盗报警、生物识别、车牌智能识别、远距离RFID感应等多种技术于一体,采取事前防范、事中监控、事后查询等多种手段于一体,为银行综合安防管理保驾护航。 相似文献
9.
本文提出了根据实验室不同类型人员性质,构建“信息采集+人脸识别+无感测温”和“定制OA流程+身份识别+无感测温”通行模式的信息化门禁管理系统,以此代替复杂化的人工审核验程序。实践表明,该系统有效解决了实验室门禁管理的困境,有力提升了门禁通行效率,逐步完善了实验室疫情防控长效机制。 相似文献
10.
《A&S(安防工程商)》2005,(5):22-22
生物识别系统是采用了人体特征作为身份识别的特殊工具,提高了门禁、考勤等应用的安全性和方便性。近年来,随着生物识别产品拒真率和认假率的越来越低,得到广泛的认可和实际应用。本期我们来到风光秀色的杭州,走近浩普的最新产品——HPD2100指纹门禁管理系统。 相似文献
11.
张涛 《计算机测量与控制》2015,23(1):86-89
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值. 相似文献
12.
Recent years have seen rapid advances in various grid-related technologies, middleware, and applications. The GCC conference has become one of the largest scientific events worldwide in grid and cooperative computing. The 6th international conference on grid and cooperative computing (GCC2007) Sponsored by China Computer Federation (CCF),Institute of Computing Technology, Chinese Academy of Sciences (ICT) and Xinjiang University ,and in Cooperation with IEEE Computer Soceity ,is to be held from August 16 to 18, 2007 in Urumchi, Xinjiang, China. 相似文献
13.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times. 相似文献
14.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice. 相似文献
15.
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs. 相似文献
16.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel. 相似文献
17.
《浙江大学学报:C卷英文版》2014,(11)
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and 相似文献
18.
Zhao-hui WU 《浙江大学学报:C卷英文版》2014,(10)
正Brain-machine interfaces(BMIs)aim at building a direct communication pathway between the brain and an external device,and represent an area of research where significant progress has been made during the past decade.Based on BMIs,mind information can be read out by neural signals to control 相似文献
19.
《浙江大学学报:C卷英文版》2014,(10)
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate 相似文献