Shenzhen Taishou Intelligent Technology Co., Ltd
Home>Products>Wanjia School Home School Interconnection Solution
Firm Information
  • Transaction Level
    VIP member
  • Contact
  • Phone
    13760370168
  • Address
    3rd Floor, Building A, Aerospace Micro motor Factory, No. 25 Keji North 2nd Road, Songpingshan Community, Xili Street, Nanshan District, Shenzhen
Contact Now
Wanjia School Home School Interconnection Solution
Wanjia School Home School Interconnection Solution
Product details
Construction Plan for Campus Security Integration Management System with Facial Recognition in Wanjia School


Chapter 1 Overview

1.1 Background

School is an important place for students' learning and life, and campus safety is crucial for students' healthy development. Currently, parents are concerned about their children's safety in campus life. Generally speaking, parents of students do not directly send their children to campus during school and school hours, but may send their children to places far away from the campus, or take the bus or walk to school by themselves. This child is very likely to have an accident on their way to school. Many parents are worried about whether their children will arrive at school safely during school hours and have already left school during school hours. As parents currently cannot know whether their children have entered or left school, they may worry about the safety of their children during school hours, which also brings unnecessary trouble to parents.

With the increasing emphasis on campus environmental safety, some schools have begun to use advanced technology and equipment to improve their existing safety management systems. Some schools have taken the lead in using facial recognition systems as teaching management aids, which can record students' entry and exit times in detail and notify parents in a timely manner. This not only strengthens teaching management work, but also reassures parents about students' safety issues during their school years.

1.2 Requirement analysis

The primary task of students is to study, and their personal safety during the learning period cannot be ignored. With the rapid development of society, various safety hazards that pose a threat to students have also emerged. If schools do not strengthen management, this harm is likely to spread directly to weaker student groups. The application of facial recognition system vigorously solves the loopholes in student management, records students' entry and exit time in detail, prevents students from not arriving at school or leaving early during the school period, timely notifies parents, and ensures students' personal safety.


Chapter 2 System Design Principles

ØEconomic viability

Make full use of existing transmission lines and minimize new investment through a reasonable structure;Avoid blindly pursuing the latest technology while also preventing insufficient system processing capabilities;The entire system is user-friendly, practical, and easy to maintain.

Øreliability

The use of reliable software and hardware products is the key to ensuring system reliability. The system should integrate stable and excellent technologies and components to the maximum extent possible, and adopt mature technologies to reduce system instability;The system should support load balancing based on cluster technology to ensure sufficient backup and fault tolerance of core applications, and improve the reliability and stability of the system.

ØOpenness

The technical solutions and software have good interconnectivity, interoperability, and upgrade capabilities, following the latest international standards, national standards, and industry standards, and adhering to the principle of openness. Easy to integrate with higher-level management software.

Øprogressiveness

The technical level of the system ensures progressiveness and conforms to the development trend of computer science today. The system software platform and hardware platform technology represent the direction of current computer technology development, and have been proven to have strong practicality through practice;The development unit has the ability to carry out the continuous development of the product, which can ensure that the technology is constantly updated and smoothly upgraded to maintain the progressiveness of the system.

ØScalability

The system structure is easy to expand to accommodate potential larger task loads in the future. The hardware platform is upgradable and can be expanded by devices when needed to improve the system's processing power, thereby protecting the original investment. The system software should have scalability. Adopting object-oriented structural design, it has strong flexibility, operability, and scalability. The fully modular software architecture ensures that the addition and modification of modules should not affect other modules in the event of future business changes.

ØUsability

Adopt a familiar and easy to maintain system platform. Operability and user-friendly interface, fully considering the characteristics of users, make data processing work simple, convenient, and fast. The business process is clear and in line with conventional business processing habits. Based on network architecture, remote configuration management is possible, which is easy to implement and maintain. The system software adopts a unified style software interface, which is easy to operate,Adopting a Chinese graphical interface.

Øoverall

The system can provide various functions proposed by the police station, meet all the basic requirements stated in the requirements, and has good compatibility and scalability.

Chapter 3 Solution

3.1 Introduction to Facial Recognition Technology

Facial recognition is a type of biometric authentication technology for the human body. Compared to other biometric technologies, facial recognition technology has the characteristics of biometric uniqueness, measurability, recognizability, and lifetime invariance. Facial recognition uses visible light to obtain facial image information, which is different from fingerprint recognition or iris recognition. It requires the use of electronic pressure sensors to collect fingerprints or infrared to collect iris images. These special collection methods are easily detected by people, making them more likely to be disguised and deceived.

The facial recognition system responds quickly, from comparison to judgment1Within seconds. It is tens of times more confirmed by manual comparison. Simultaneously adopting portrait tracking technology, reducing the number of photos stored for the same person, and lowering data redundancy and hardware investment. Compared to other recognition technologies, facial recognition technology has essential differences:

Nature: Suitable for the natural habit of visual "recognizing people by appearance";

Concealment: Not being detected is also important for a recognition method, as it makes it less offensive and less likely to be deceived because it is less likely to attract people's attention;

Non contact: Users can obtain facial images without direct contact with the device;

Ø Non mandatory: Users do not need to specifically cooperate with facial capture devices, and can almost unconsciously obtain facial images. This sampling method is not "mandatory";

Concurrent: Multiple faces can be sorted, judged, and recognized in practical application scenarios.


A typical facial recognition system mainly includes the training process and recognition process. The training process mainly involves locating known faces, extracting and selecting features, and designing classifiers; The recognition process completes the processing of unknown images and ultimately identifies the classification and decision-making of identities. The workflow is shown in the figure:



3.2 Scheme Design

3.2.1 System Structure

According to the on-site investigation, the school is divided into two main gates, with the main gate being wider6Meter, width of side door2.6Mi, the width of the back door's entrance is wide6Meter, width of side door1.5Mi, there are also ones on campus5A staircase passage. Here are the current pictures:



Based on the above situation,

1. Design a side door at the main entrance2.6Wide student entrance and exit passages, equipped with two cameras and one camera for each entrance and exitNPUFacial recognition server and one55Inch TV screen;

2. Deploy four cameras for entering the school and two cameras for leaving the school on each side through the backdoor, as well as one cameraNPUFacial recognition server;

3. In5Deploy one belt for each staircase passage4GFacial recognition tablet for communication.


The on-site deployment rendering is as follows:

1. Main entrance and exit:




2. Entering and exiting the school through the back door:


3. Stairway entrance:


The overall system architecture is as follows:

3.2.2 System Process

On the system management end, manage the portrait database and facial recognition devices of school students, and issue a list of student image databases to the facial recognition host. The front-end camera captures the facial images of passing students, compares them with the student portrait database in the facial recognition host, determines whether the person is a student on campus, and records the passage time, whether they enter or exit, etc; All captured recognition records are uploaded to the management end and pushed to the campus management system;


The specific workflow is as follows:

1)On the management end, import all students' facial image information into the system, establish a student facial database, and distribute the personnel templates in the database to the facial recognition host;

2)The facial recognition host compares the facial images captured by the channel camera with the student facial database photos in the database;

3)Compare and match, record information such as travel time, on-site photos, and entry and exit directions, and push the information to the campus management system;

4)Inconsistent comparison, determine that the person is not a student on campus, and save the record.

The system comparison flowchart is as follows:

(To view the complete campus facial recognition solution, please call 0755-82266116)



Topology diagram:






Online inquiry
  • Contacts
  • Company
  • Telephone
  • Email
  • WeChat
  • Verification Code
  • Message Content

Successful operation!

Successful operation!

Successful operation!