Urban Security Business Development Trend and Discussion on Key Technologies

This paper analyzes the development history and trends of urban security operations and technologies, extracts and excavates major technical problems that need to be resolved, and through the breakthroughs and innovations of relevant core technologies, it can eventually promote the continuous development of urban security and the future of urban security. Prospects for business and technology development.

I. Current status of urban security and challenges

With the in-depth development of multi-polarization, economic globalization, and social informatization, the international anti-terrorism situation is facing new challenges. The large-scale domestic population flow and the social security system have not yet been fully established, seriously affecting social stability and harmony. According to the "Blue Rule Book of Law" published by the Chinese Academy of Social Sciences in February 2010, the number of criminal cases in China reached 5.3 million in 2009, an increase of more than 10%, and the number of policing cases reached 9.9 million, an increase of about 15%. State Councilor Ma Kai pointed out that China is in a period of rapid industrialization and urbanization. Various interest relationships are complicated. Various traditional and non-traditional, natural and social risks and conflicts coexist. The task of maintaining social stability is arduous. The security situation is more complicated and severe.

At present, with the vigorous development of “Safe City”, the requirements for security products, technology, and business are constantly increasing, as well as the ever-changing security market environment and demand, the security industry in China faces the following four issues and challenges in its development:

(I) Urban security construction is still in the stage of expansion

With the promotion of the construction of “Safe City”, although the scale of security video surveillance continues to expand, the construction of security systems is still at a low-level stage of scale expansion. The system’s operating mode is more primitive, mainly for emergency alarm and after-sale evidence collection. It is impossible to provide efficient, reliable, and safe audio and video information and intelligence sharing services for front-line officers. The support to the main lines of front-line police officers is obviously insufficient. At the same time, based on policing informatization, it is based on mobility, coordination, analysis, and early warning. The response to the demands of the modern policing revolution with accurate strikes as a symbol is not enough, and the comprehensive prevention and control effect is very limited.

(II) Urban security equipment and systems are restricted by environmental factors

Since the existing security equipment and systems are subject to too many environmental factors and poor environmental adaptability, the use of the entire security system in actual video surveillance environments is very limited.

(C) Comprehensive analysis of urban security video surveillance alarm data is inefficient and insufficient in application capabilities

Because video surveillance alarm data is discarded because of the massive data storage cost and the lack of data lifecycle management technology, security digital information resources are not effectively used, so historical and remote analysis cannot be carried out, and it is difficult to discover the deep clues required for tracking a suspect target. Therefore, the integrated analysis of video surveillance data by the security system is inefficient, and the depth of application capability is insufficient.

(IV) The lack of theory and methods for urban security system effectiveness evaluation

The theoretical basis for efficiency assessment in the field of security systems in China is currently lacking. The effectiveness evaluation of security facilities remains at the stage of subjective experience, and there is a lack of scientific and objective quantitative assessment of the effectiveness of the security system. This makes it difficult to effectively prevent the effectiveness of security systems. Play.

In response to the above mentioned problems and challenges currently faced by the security industry in China, it is urgently necessary to analyze in depth the development trend of the urban security business and technology, to extract and excavate the major technical problems that need to be solved, and to breakthrough and innovate through relevant core technologies. Ultimately, it will promote the continuous development of the urban security industry.

Second, city security business and technology development trend

Urban security services and technologies include multimedia information technology, security digital content management technology, and security system effectiveness assessment technology. The development trends of these four security services and technologies are described below[4][5]

(I) Development history and trends of multimedia information technology

The development trend of video compression coding standards is shown in Figure 1. At present, in the actual environment, limited resources have increased the dependence of business expansion on efficient media compression technologies. However, in recent years, the development of conventional technologies that increase the compression efficiency by increasing the computational complexity has become a bottleneck and the improvement of technology has become more and more difficult. ITU, MPEG, and AVS have already initiated the formulation of next-generation coding standards. Supporting broadband mobile services is one of their important goals, but the direction and route of technology that should be adopted in the future are still diverse. Figure 2 shows the development process and trends of multimedia core technologies.

The development trend of video compression coding standards

The development trend of video compression coding standards

The Development and Trend of Multimedia Core Technology

The Development and Trend of Multimedia Core Technology

(II) Development history and trends of security digital content management technology

As shown in Figure 3 below, the development of security digital content management technology has gone through three stages since about 1980: The first stage is the traditional management stage of documents. In the past, due to relatively backward technology, digital content mainly takes manual records and paper. Quality archive. With the development of computer technology and database technology, security digital content management has undergone the second stage, that is, the technology management stage. The digital content of this phase mainly uses database backup and electronic archiving. In the 21st century, security digital content management experienced the third stage, namely the information resource management phase. Digital content in this stage is mainly storage access to some unstructured data. Many departments have established their own specialized massive data centers. After the development of the above three phases, digital content management will move toward the trend of quantification, isomerization, unstructured, and networking in the future, from the single point of data management in the past to the management of the entire data lifecycle. That is, unified management of the process of data generation, recording, dissemination, collection, processing, storage, retrieval, transmission, analysis, selection, evaluation, utilization, and destruction.

3

Security Development and Trends of Digital Content Management Technology

(C) Security System Objective Evaluation Technology Development Process and Trend

As shown in Figure 4 below, since the 1970s, the development of the objective evaluation technology of the security system has undergone five stages. The effectiveness evaluation of the security system still focuses on the qualitative and semi-quantitative models of management science. In 1973, the Sandia National Laboratories under the U.S. Department of Energy proposed the first qualitative model of the effectiveness evaluation of security systems, the opponent sequence diagram model, which analyzes the various obstacles that hypothetical opponents need to achieve in order to achieve their goals. Find out the shortcomings of the security system; in 1984, Doyon proposed a comprehensive path analysis model, which can analyze and select multiple paths for adversary attacks. At the same time, SAVI's evaluation software was developed. The software is designed to evaluate Software for the effectiveness of external adversary physical protection systems. In 2006, the Oak Ridge National Laboratory in the United States established a combined three-dimensional geometric model. This model is a powerful facility description model. Through a set of dedicated software calculations, the system can be analyzed and evaluated in detail.

4

The security system objectively evaluates the technological development process and trends

In summary, in the process of urban security business and technological development, five major technical issues that need to be solved are as follows:

5

Major technical issues that need to be resolved

As shown in Figure 5 above, the five major technical issues that need to be addressed are: 1) high coupling of system architecture and lack of flexibility; 2) lack of service support technology and platform for first-line civilian police services; 3) failure to break audio and video quality Inefficiency bottlenecks; 4) Security digital resource management faces three major gaps and a technical bottleneck, that is, the underlying cognitive gap, that is, data lacks the cognitive expression of its representative objective objects, manifested as data ontology and object descriptions. There is a huge gap; the middle-level data gap, that is, there are multiple formats for the same object, different data center unstructured data (including all formats of office documents, various reports, text, XML, HTML, graphics and audio and video information, etc. The data isomerism phenomenon is very prominent; the high-level service gap, that is, the service gap between the industry business model and the system support model, represents a huge gap between the user's diversified needs and the simple service model. A technical bottleneck is the bottleneck of massive data distribution. 5) The lack of an objective evaluation system for the security system makes it impossible to measure scientifically and objectively.

Steel Grating plate is made of high quality steel plate after bending machine, made after punching, sturdy and durable, easy to install, galvanized after the installation of a beautiful folder, and not rust, can be a good fixed installation folder.

The installation of the steel grating can be fixed by welding and mounting fixture fixed in two ways. Welding fixed for permanent removal of the site, such as the equipment around the platform, and the use of the installation folder does not damage the zinc layer and easy to remove the characteristics.

The mounting clip is suitable for all kinds of steel gratings, which consist of upper card, lower card and M8 bolt. Welding fixed method is: in the steel grating each corner of the first flat steel, the weld length of not less than 20mm, high not less than 3mm of the fillet weld.

 Installation Fastener

 

Steel Grating Mounting Clip

Steel Grating Mounting Clip, Stainless Steel Mounting Clip, Galvanized Mounting Clip, Carbon Steel Grating Clip

Hebei Zhenxing Jinyuan Wire Mesh Group Co.,Ltd , http://www.zxsteelgrating.com

Posted on