智能门禁系统中英文对照外文翻译文献
- 格式:doc
- 大小:53.50 KB
- 文档页数:11
The Access control systemAccess control system is widely used in recent years and it is one of the high-tech and safety equipment , has become one of the intelligent signs of modern architecture. Access control , the export and the entrance control system, is to control the export and entrance channel system. Access control system is developed on the basis of the traditional locks (Entrance Guard/Access Control in English).Access control is, in reality, an everyday phenomenon. A lock on a car door is essentially a form of access control. A PIN on an ATM system at a bank is another means of access control. Bouncers standing in front of a night club is perhaps a more primitive mode of access control (given the evident lack of information technology involved). The possession of access control is of prime importance when persons seek to secure important, confidential, or sensitive information and equipment .Item control or electronic key management is an area within (and possibly integrated with) an access control system which concerns the managing of possession and location of small assets or physical (mechanical) keys.Physical access by a person may be allowed depending on payment, authorization, etc. Also there may be one-way traffic of people. These can be enforced by personnel such as a border guard, a doorman, a ticket checker, etc., or with a device such asa turnstile. There may be fences to avoid circumventing this access control. An alternative of access control in the strict sense (physically controlling access itself) is a system of checking authorized presence, see e.g. Ticket controller (transportation). A variant is exit control, e.g. of a shop (checkout) or a country. In physical security, the term access control refers to the practice of restricting entrance to a property, a building, or a roomto authorized persons. Physical access control can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through technological means such as access control systems like the Access control vestibule.Within these environments ,physical key management may also be employed as a means of further managing and monitoring access to mechanically keyed areas or accessto certain small assets . Physical access control is a matter of who , where, and when. An access control system determines who is allowed to enter or exit, where they are allowed to exit or enter, and when they are allowed to enter or exit. Historically this was partially accomplished through keys and locks. When a door is locked only someone with a key can enter through the door depending on how the lock is configured. Mechanical locks and keys do not allow restriction of the key holder to specific times or dates. Mechanical locks and keys do not provide records of the key used on any specific door and the keys can be easily copied or transferred to an unauthorized person. When a mechanical key is lost or the key holder is no longer authorized to use the protected area, the locks must be re-keyed. Electronic access control uses computers to solve the limitations of mechanical locks and keys. A wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked.When a credential is presented to a reader, the reader sends th e credential’s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door remains locked. If there is a match between the credential and the access control list, the control panel operates a relay that in turn unlocks the door. The control panel also ignores a door open signal to prevent an alarm. Often the reader provides feedback, such as a flashing red LED for an access denied and a flashing green LED for an access granted .The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room but Bob does not. Alice either gives Bob her credential or Bob takes it; he now has access to the server room. To prevent this, two-factor authenticationcan be used. In a two factor transaction, thepresented credential and a second factor are needed for access to be granted; another factor can be a PIN, a second credential, operator intervention, or a biometric input.There are three types (factors) of authenticating information :▪something the user knows, ega password, pass-phrase or PIN▪something the user has, such as smart card▪something the user is, such as fingerprint, verified by biometric measurement.Passwords are a common means of verifying a user's identity before access is given to information systems. In addition, a fourth factor of authentication is now recognized: someone you know, where another person who knows you can provide a human element of authentication in situations where systems have been set up to allow for such scenarios. For example, a user may have their password, but have forgotten their smart card. In such a scenario, if the user is known to designated cohorts, the cohorts may provide their smart card and password in combination with the extant factor of the user in question and thus provide two factors for the user with missing credential, and three factors overall to allow access. Now, as people's living standards improve and technology advances, more and more local needs of access control system such as residential entrance, garage entrance, the entrance and other public places. Many different types of access control system; because it has different characteristics, so do not use the place, IC card access control system because of its higher security, better convenience and cost-effective access control system into the mainstream. IC card technology is currently widely used in various industries, particularly public transport, wireless communications, identification, financial transactions and security and defense industries. Access Control System software is easy to use, simple features, operators do not need a professional level of computer operation.。
基于语音的电子密码锁设计外文文献翻译(含:英文原文及中文译文)文献出处:MS Hossen. Voice of Electronic Password-lock Design [J]. Hospitality Upgrade, 2013,2(4):56-66.英文原文Voice of Electronic Password-lock DesignMS HossenAbstractThe design is the use of voice recognition technology and keyboard input, Surplus SPCE061A SCM in achieving a voice electronic password lock authentication system. Voice recognition and electronic password lock function of the ordinary locks, and dual role of security. The password lock safe, effective, reliable, but also , password Preferences, confidentiality strong, tips and other features of error. Key words: SPCE061A; voice recognition, electronic password lock; FLASH 1IntroductionAs people's living standards improve and strengthen the sense of security, safety locks system becomes essential, therefore a password lock, magnetic locks, electronic locks, laser lock, voice-activated lock locks, etc., they are On the basis of traditional keys, using one or more passwords, different voices, different magnetic field,different sound, different light beams of different images (such asfingerprints, retina retina, etc.) to control open the lock. In this paper, using speech recognition technology and keyboard to control the importation of the integration of SCM in Sunplus SPCE061A achieve a voice on the electronic certification system password lock.2voice electronic password-lock systemThis system is mainly composed of Sunplus SPCE061A SCM, MIC in put circuit, voice output circuit, 4 x 4 keyboard, six Qidua n LED display and output control and FLASH memory components. System is the main function: the training, the speaker's voice through a microphone into the speaker voice signal acquisition front-end circuit, by voice signal processing circuit on the acquisition of the characteristics of voice signals and voice processing, from the speaker'spersonality characteristics and parameters Store, a speaker parameters database. In recognition, will be voice recognition and speaker parameters database matching, voice recognition and complete control of the keyboard, and activate or release of locks, the final completion of the lock. System is relying on make comparison and identification of voice greatly improved3SystemThe system using a single kernel of Sunplus SPCE061A, the chip easily complete the design of module.SPCE061A is Sunplus microphone amplifier, AGC AGC function of thesingle voice of A D converter, and the audio output of the dual-channel 1 O-bit D A converter in the 2.6 V ~ - 3.6V operating range of frequency range of 0.32 MHz ~ - 49.152Mhz, system to support 1 O interrupt vector And l4 from the system can be a clock, timer counter, time benchmark generator, external interrupt, key wake-up call, Universal Asynchronous serial communication and software interruption interrupt source, Very suitable for real-time applications; u'nSPTM command system also provides instructions and directives within theplot operation, the DSP for the application of additional features in a complex digital signal processing both Very convenient than the DSP chip for much cheaper.3.1Voice input circuitSPCE061A built-in 8-channel 1 O-bit A D converter, which will be seven channels for analog signals (such as voltage signal) converted to digital signals, a channel used only for voice input, through thebuilt-in automatic gain control amplifier The microphone channels (MIC-IN) input. Therefore, it can be directly given to the voice signal input channels, the completion of 8 kHz voice signals in the collection, encoding and storage to off-chip FLASH, simplifying the circuit design.3.2Audio output circuitSunplus SPCE061A MCU with audio output of dual-channel 1 O-bit D Aconverters can complete user training, identification of various operations, such as the voice prompts. SPCE061A provide audio loseA way for the dual-channel DAC, in this manner, DAC1 and DAC2 conversion of analog current output signal passed AUD1 and AUD2-pin output, enter the number of volume into the P-DAC1 (write) (0 x7017) and P - DAC2 (write) (0 x7016) unit.3.3Six-segment digital circuitLED displays in each LED through 5 ~ 20mA current to achieve the normal brightness, and the IO I SPCEO61A output current up to 5 mA, do not order to meet the reliability of systems design, driven by a transistor circuit. The whole process showed that the use of dynamic, that is, six monitors each cycle, each sustained lms or 10 ms cycle again, can also be appropriate to make changes, but the refresh rate not less than 30 per second, so that temporary stay because of the visual phenomenon , Is six Qiduan see the LED display at the same time show.3.4Matrix keyboard scan circuitEnter key part of a total of the number keys, passwords, keys set, the key shown password, to confirm removal of keys and passwords, and other key 16 keys, enter your password and for the realization of function keys. This design uses a wake-up function keys of the IO low eight IOA0 -~ I0A7 to 4 x 4 as the con trol in put of the keyboard,which can be rational use of keyboard keys are pressed whether the method is: Let all out lines are low, check the traffic on whether there is a no keys are pressed (Actual programming keys should be taken into account the impact of jitter, usually always use the software delay processing methods Consumers buffeting). Identify specific keys used scanning method: be sure this column cross-point Button is pressed.3.5FLASH expansion of external circuitSPCEO61A FLASH memory chip of only 32 K, large number of playersin the voice of resources needs of expanding memory. The design Sunplus Technology, Inc., SPR4096 as a memory expansion, combined with SPCE061A broadcast voice. SPR4096 in use, the use of SPR4096 ResWriter to read and write operation, used to store the speaker's personality parameters reference template.3.6The lock and lift activationSCM SPCE061A complete identification and display, the drive to realize the implementation of the electromagnetic lock function, and to detect its drive current value, to receive alarm signals sent by sensors, such as sending data. SCM receive the type code, and stored in FLASH in the password, if the correct password, the drive for the implementation of the electromagnetic lock, if your password is not correct, allowing operators to re-enter your password, can enter up tothree If the three are not correct, the MCU through intelligent communication lines to monitor the police. SCM will unlock operation and each time the electromagnetic actuator drive current value as a status information sent to the smart monitor, will receive the report from the sensor interface information is also sent to the intelligent monitoring, as smart Analysis of the basis. In the transmitter, electronic locks through the pulse transformer T will modulation good boost after data signals sent out in the receiver, pulse transformer T will receive the data signal demodulator buck evacuation to reduce the carrier signal transmission In the process of wear and tear. In order to reduce communication and mutual interference between the power supply, chokes L, the choice of coupling capacitance C to comprehensive considerations, shown in Figure 4, a carrier frequency f0-400kHz, in order to ensure that most of the energy transmission signal to the receiver Duan, L for a 33.7 H, C1-0.047 ~ F.Current surveillance function is to prevent the destruction of communication lines and electromagnetic actuator, for some reason the flow of electromagnetic coil currents too large burning coil. Current Monitor by MAXIM company's current voltage converter chip MAX471. The chip can be measured current I into pairs to the output voltage U, and is measured Wai, and U output voltage proportional to the measured current I characteristics. Current monitor output voltage service A Dconverter, read through the single A D converter results in the current line was informed of the situation, through the timely detection of abnormal, issued its report.4System software designSPCE061A the development of online debugger PROBES To achieve. It uses a built-in online SPCE061 Circuit Simulation ICE (In-Circuit Emulator) and Sunplus's online series Line programming. PROBE can work in Sunplus IDE Integrated Development Environmental software nSP (tm), with editing, compile, link, debug and simulation capabilities. Use IDE friendly interface, the drop-down menu, shortcuts and quick accessto the list can be ordered so that the user's programming and commissioning work more convenient and efficient. In addition, IDE software simulation can not connect the simulation board under the simulated conditions of the various functions to the the system work, the main function of the call to complete a specific function of the voice training, training for the future success of voice recognition, according to the order to identify the implementation of the keyboard control operation, according to the different function keys, the implementation of the corresponding procedures, to complete Password changes settings, contrast, shows, and other functions.5ConclusionThe system uses a SPCE061A 16-bit microcontrollers embedded voiceprocessing and control system, easy to use, easy to use, but the speech recognition capabilities have yet to be improved. Electronic password lock technology development so far, has been widely used in higher property security areas as information technology and computer文档来源为:从网络收集整理.word 版本可编辑.欢迎下载支持. technology and the constant development, voice, electronic password lock technology will have greater development and, ultimately, achieving efficiency, safety and reliable Voiceprint control of the voice of electronic locks.中文译文基于语音的电子密码锁设计作者:MS Hossen摘要该设计是利用语音识别技术和键盘输入,在凌阳SPCE061A 单片机中实现了语音电子密码锁认证系统。
中英文对照外文翻译(文档含英文原文和中文翻译)原文:Intelligent Entrance Guard SystemIntelligent entrance guard and safety management system is a new type of modern safety management system, which combines the microcomp uter automatic identification technology with the modern safety manag ement practices into an organic whole. It contains lots of new techno logies such as the electronic, mechanical, optical, computer technolo gy, communication technology, biotechnology, and so on. It is an effe ctive measures to achieve the goal of implementing safety management at the inward and outward of important departments. It can be applied to all kinds of confidential departments, such as banks, hotels, gen eratorrooms,the armory, confidential rooms, offices, intelligent commun ities, factories etc. With the rapid development of digital technolog y and network technology today, access control technology finally get s the good chance to develop rapidly. Entrance guard system has far t ranscends the pure doorway and key management.It has gradually develo ped into a set of complete access management system.1 The Development of Entrance Guard SystemInward and outward entrance guard system just as its name implies is a control system of managing the inward and outward channels, whi ch is developed on the basis of the traditional door lock. The tradit ional mechanical lock is just a simple mechanical device, so no matte r how reasonable the structural is designed, how strong the material is made, people can always open it through various means. Key managem ent is very troublesome in places like offices and hotel rooms where so many people entering and leaving the passageway. Whenever the keys are lost or employees are replaced, locks and keys must be renewed. In order to solve these problems, electronic card lock and electronic trick lock are invented. These two kinds locks’ appearance raised t he management level of inward and outward channels from a certain ext ent and has impelled the channel management to enter the electronics era. But with the continuous application of these two kinds of electr onic locks, the defects of themselves are gradually exposed. The prob lem of magnetic card lock is the easy replication of the information, a greater degree of wear between card and card reader, high failure rate and low safety factor. The problem of combination lock is that t he password is easy to leak and we do not have even any small clue to investigate with, so the safety coefficient is very low. At the same time, it is easy to be unlocked by people outdoor because most of th e reading card (password) and the control part is installed together outside the door at this period. Entrance guard system in this period have remained in its early immature stage, so the entrance guard sys tem is usuallyreferred to as electronic locks, which has not been widely applie d. With the development of inductive card technology and the biologic al recognition technology in recent years, the entrance guard system has got a leap-style development and has entered into the mature peri od. they have their special strong points in various aspects like saf ety, convenience, manageability, etc. The application fields of entra nce guard system is becoming more and more abroad.2 Function of Entrance Guard SystemBasic functions realized by mature entrance guard system: 2.1 The management of the channel access permissions.·Access permissions are set to formulate who can pass in and out each channel and who can't.· The way to pass in and out the channel means to scope out the a uthorization of the way to pass in and out to people who can pass in and out the channel. The ways to pass in and out includes entering pa ssword, reading the card(biometric), reading the card(biometric) plus entering password.· Access time means to set the range of tim e during which people who have the permission can pass in and out. 2.2 The function of real -time monitoringSystem administrators can keep a watchful eye on the situation ofpeople passing in and out of each gate region(there are photos as well at the same time) and the situation of each gate region(includi ng the door switch, warning in various kinds of abnormal conditions) through the microcomputer in real-time; they can also open and close all the door area in emergency conditions.2.3 Function of querying records of in and out:System can store all the in and out records, status. You can quer y the records and status according to different querying conditions. It is equippedwith corresponding attendance software so as to realize the purpo se of checking-in and guarding with one piece of card. 2.5 Function o f abnormal alarming:It can realize microcomputer alarm or alarm with siren in excepti onal cases, such as: illegal intrusion, not closing the door overtime, etc.It can also implement the following special features according to different entrance guard system:Fire alarm monitoring linkage function: The entrance guard system can automatically open all the locks to let the people inside to esc ape at any time in the event of a fire alarm.Automatic monitoring linkage commonly refers to the monitoring sy stem which will record the situation at that time and the warning con dition when someone charges (valid/invalid).Settings, managing and monitoring functions of the network : most of the entrance guard system can only use a microcomputer management, but advanced technology of the system can set, monitor, query and ma nage the whole system at any location which has been authorized in th e network. It also can set, manage, query and monitor in a different place through the INTERNET.Function of open the door logically: Simply put is that several p eople have to swipe the cards through the same door at the same time (or in other way) so that the electronic door lock will open. 3 Appli cations of Intelligent Entrance Guard System3.1 Application of Entrance Guard in The Work of The Companies in side The Intelligent Office Buildings:Doors installed with entrance guard on the door in the companies can effectively prevent the foreign salesman to disturb the order of office, and also can prevent foreign sundry to enter the company effe ctively , and then ensure the safety of the company property and thei r employees. You can display and improve the company's management lev el and improve the corporate image. Itcan also track whether the employees leave the company without ap propriate reasons. You can check on work attendance by using the atte ndance management software without buying time recorder. The results are more objective and fair and faster with higher accuracy rate. It can reduce the power and amount of work of personnel department. It c an effectively solve the problem that the employees have to change th e keys of the front gates due to fear. You can arrange the limites of authorities and door-open time flexibly. Workers just need to take o ne piece of card without adorning a large number of heavy keys and it is safer than keys.You can avoid the materials and documents in the leaders’ office been leaked by others and give the leaders a more secure and private environment by install entrance guard system on the door of the leade rs’ office. you can guarantee the core technology and data not been stolen easily by outsiders and prevent the employees of other departm ents from entering this department to disturb the developing work by installing entrance guard system in the development of technical depa rtment. You can guarantee the security of the property and the safety of the company's financial information by installing entrance guard system in financial department. You can prevent the other person from entering into the production workshop effectively and avoid causing safety problems by installing entrance guard system in the production workshop gate.3.2 Applications of in and out Management Control in The Intellig ent CommunityGenerally installed entrance guard system in the cell gates, elec tric gates, unit of steel fire doors, security doors can effectively stop other workers from entering into the community and conduct the c losed-end management in the community effectively. It can also change the old inaccurate and less rigorous management style of community s ecurities who distinguish whether he or she is an outsider just rely on their memory. If the new security guards stop the new residential, it will annoying them. If outsiders wear very well, the security gua rds will consider them the residential and let them in without any qu estion, which will bring potential safety hazard.The entrance guard s ystem of safety science and technology can improve the level of prope rty and it is better for developers to promote property. Owners will also benefit from the scientific and effective access of management. Networking entrance guard is advantageous to the security of monitori ng all the situation of in and out of the door at any time. If there are accidents or cases, it can provide evidence when the police later query the records.You can combine it with intercom system with visual intercom syst em. You can combine it with internal consumption IC card and parking management implementation into one card.3.3 Applications of Entrance Guard in The Government Offices:It can effectively standardize the order of office and prevent il legal personnel shocks to government offices, protecting personal saf ety of leaders. 3.4 The Application of Entrance Guard in Telecom Base Station and Substation Power Supply Bureau:Typical base station and substation power supply bureau has such characteristics: many base stations, big system capacity requirements, large distribution range or even hundreds of square kilometers. It h as its own network connected to the Internet. In some places it is ev en unattended, which needs the central dispatching room scheduling st aff flexibly at any time. Implementation scheme is to use the network entrance guard controller, to realize remote management through the LAN or the Internet. 3.5 Application of Entrance Guard in intelligent elevator control:It is also known as access control elevator, elevator card, IC ca rd elevator, which only authorized users can have the right to recall the elevator and choose hall according to the floor. More and more i ntelligent communities have been using relate equipments. The intelli gent control system of science and technology of Shenzhen has develop ed specially elevator control entranceguard control system form designing a proprietary elevator entran ce guard control system.中文译文:智能门禁系统智能门禁安全管理系统是新型现代化安全管理系统,它集微机自动识别技术和现代安全管理措施为一体,它涉及电子,机械,光学,计算机技术,通讯技术,生物技术等诸多新技术。
电子密码锁中英文对照外文翻译文献(文档含英文原文和中文翻译)2THE DESIGN OF MATRIX KEYBOARD AND LCD DISPLAY BASED ON MCUAbstractThe development of microelectronics technology and industrial measure requirement bring a good opportunity for development and research system,which makes it a broad prospects. The equipment has the advantages of small size, single power supply and a variety of output voltage leads it has a special module. Through the analysis of the hardware structure, we can summarizes each module needs.For example,we often go through the keys to realize the control of the electronic device. Small to watch mobile phone, to the TV computer, to a variety of complex instruments, all need to realize various operations through the buttons. This design is an important part of step for the further research,using buttons to control the display,include some modules like LCD 1602 liquid crystal display,4*4 matrix keyboard,STC89C52single-chip microcomputer and other bine with the Proteus software,the simulation results are displayed on the LCD in 1602 type of data.KEY WORDS: Single-chip; LCD 1602 liquid crystal display; 4*4 Matrix keyboard31 IntroductionWith the development of economy and the progress of science and technology, Microprocessors and peripheral chips have developed rapidly. The newest development of the integrated technology is the CPU chip and external. Like the program memory, data memory, parallel, serial, I/O timing / counter, interrupt controller and other control components are integrated in a chip—single chip. SCM has a manufacturing process CMOS, The smaller lithography process improves integration which make the chip space smaller, lower cost, lower working voltage, lower power consumption. Adopts double CPU structure, increasing the width of data bus, improve the speed and the ability of data processing, a pipeline structure, improve the processing and computing speed, in order to meet the needs of real-time control and processing. To increase the storage capacity, the internal EPROM EPPROM, secure program, to improve the driving capability of parallel port, in order to reduce the peripheral driving chip, increase the logic function and control the external I/O port flexibility. Peripheral in serial mode based expansion; peripheral circuit internal installation is an obvious trend to connect the internet. Reliability and application level is getting higher and higher. Some high-end microcontroller and launched in recent years also contains many special function unit, Such as A/D4converter, modem, communication controller, PLL, DMA, floating point unit etc.So,as we add some external expansion of the circuit and channel interface it can constitute a variety of computer applications, such as industrial control systems, data acquisition system, automatic test system, intelligent instrument, intelligent interface, function module etc. With MCU development and complete structure,SCM has become a powerful tool and will have a higher level and broader development.2 Design of the whole structure of systemThis design is based on single-chip, include matrix keyboard and LCD display module. Single-chip is the first model to select the appropriate target, function, reliability, cost, accuracy and speed control system. According to the actual situation of the topic selection, configuration management model different mainly from the following two aspects: First, supply chain management has strong anti-interference ability; second, SCM has a higher price. For information input module, keyboard selection can use economic benefits and meet the requirements of the 4*4 key matrix keyboard can realize multi function key requirements. As for the output module, using LCD 1602 liquid crystal display module, liquid crystal to achieve key information processing functions after the show. The circuit of the system is required by AT89C51 chip, clock circuit, reset circuit, driving circuit, scanning line5driving circuit and LCD1602 LCD screen. 4*4 matrix keyboard accessof P1.0 —P1.7,LCD 1602 screen to access P0.0—P0.7.3 System hardware circuit design3.1 Liquid crystal moduleThe principle of liquid crystal display is the use of physical properties of liquid crystal, The display control area voltage, power is displayed, it can display graphics. Liquid crystal display with thin thickness, suitable for large scale integrated circuit directly driven, easy to realize full color display characteristics, has been widely used in many fields of portable computer, digital camera, PDA mobile communication tools etc.1602 liquid crystal is also called the 1602 character LCD, which is a special used to display letters, numbers, symbols of the LCD module. It is composed of a plurality of 5X7 or 5X11 dot matrix character components, each dot matrix character who can display a character, there is a distance between the interval of each, there are intervals between each line, played the character spacing and row spacing, and because of this it is not well display graphics (with custom CGRAM, show the effect is not good). 1602 LCD refers to the display of the content for the 16X2, which can display two lines, 16 characters per line (LCD moduledisplay characters and numbers).63.2 Matrix keyboard module1. Key characteristicsThe keyboard is composed of a number of separate keys, press and release key is through the closed mechanical contact and off to achieve, because of the elastic action of mechanical contact, in the closing and the opening of the moment has a dither. Jitter must be eliminated, include software and hardware elimination.2.Scanning principleFirst determine whether a key is closed, and then one by one scan to further determine which button closure;(1) D0 ~ D3 output 0, level detection line D4 to D7. If the D4 - level D7 all high, said no key was pressed. If the D4 - level D7 is not all high, said the key was pressed.(2) If no key closure, return the scanning. If there is a button closure, in column by column scanning, closed key key number to find out. The D0=0, D1 ~ D3=1, D4 ~ D7 level, if D4=0, said the K1 key is pressed; similarly, if the D5 ~ D7=0, K5 respectively, K9, K13 key is down; if the D4 ~ D7=1, said that without a key is pressed. Then the D1=0, D0, D2, D3 was 1, the scanning of the second columns, which were carried on, until the closure of the key found.4 Software design7The software design mainly consists of keyboard scanning procedures, write instruction code program of LCD module, LCD module display data initialization code written subroutine, liquid crystal display module, liquid crystal display a character subroutine, time delay subroutine and so on. Programming for each module, software programming ended, Keil software was used for debugging, when the various parts of the program debugging is correct, according to the source sequence of calls, the parts together, compile, compile successfully downloaded to the mcu. The result is when the user presses a key, LCD display of the button is pressed after the realization of functional parameters corresponding to the. When the system power supply, P1 port scan cycle and the key button debounce, after completion of input through the SCM processing, output in the P0 port, through the liquid crystal display program content, complete system function.5 ConclusionWith the continuous development of high and new technology, the miniaturization and the miniaturization of electronic products has been achieved. And all kinds of new technology, as a single field of the new method, the development trend of new products and symbol -- intelligent significantly is one of the trends in development. The module design display microcontroller matrix keyboard and LCD, make us understand8to this technology innovation, through in-depth study on this technology, we can master the use in other areas, such as the design of electronic password lock, adjustment and control of indoor temperature and humidity, field access control system design etc.. Technological progress and economic development are the main themes of the present era, the improvement of people's living standard is bound to the requirements of electronic products increase, the design of any a small system is for a foundation, design of system innovation, the hardware, software integration, method and technology of virtual display and soft measurement artificial intelligence, I firmly believe that our life will be more colourful.9基于单片机的矩阵键盘与液晶显示的设计摘要微电子技术的发展和工业测量的需求,给系统的开发及深入研究带来了良好的契机,发展前景广阔。
门禁监管系统外文翻译(含原文)access-control-system
原文
Access Control System
翻译
门禁监管系统
门禁监管系统是一种用来控制和监控进入建筑物、区域和特定房间的访问权限的系统。
这种系统可以用来提高保安水平,防止未授权进入和窃盗事件的发生。
门禁监管系统通常由门禁设备、控制器和管理软件组成。
门禁设备包括门禁卡、指纹识别器、人脸识别器、密码等,控制器是整个系统的核心,负责控制门禁设备,管理软件用于管理整个门禁系统。
门禁监管系统有许多优点。
首先,它可以提高保安水平,只有授权人员才能进入安全区域,这可以有效地保护机构、企业和个人的财产和机密信息。
其次,门禁监管系统可以减少盗窃,保护员工和客户的财产和安全。
最后,门禁监管系统可以提高工作效率,通过自动化和数字化的方式,减少需要人工干预的时间和努力。
总的来说,门禁监管系统是一种非常实用和有效的安全措施,在今天的社会中非常必要。
结论
门禁监管系统是一种用于控制和监控进入建筑物、区域和特定房间的访问权限的系统。
它可以提高保安水平,减少盗窃,保护员工和客户的财产和安全,并提高工作效率。
这种系统的主要组成部分包括门禁设备、控制器和管理软件。
在今天的社会中,门禁监管系统是一种非常必要和实用的安全措施。
基于单片机的智能门锁设计英文文献Title: Design of an Intelligent Door Lock System Based on Microcontroller.Abstract:This paper presents the design and implementation of an intelligent door lock system based on a microcontroller.The system utilizes voice recognition technology to authenticate users and grant access to the locked area. The hardware components of the system include a microcontroller, a gating circuit, an extended memory, and a voiceinput/output circuit. The software components comprisevoice training, voice recognition, voice data processing, and a voice-activated control module. This paper discusses the design considerations, hardware selection, software development, and testing of the system. The resultsobtained from the testing indicate that the system is reliable, accurate, and user-friendly.Keywords: Microcontroller, Intelligent Door Lock, Voice Recognition, Hardware Design, Software Development.I. Introduction.With the increasing demand for security and convenience in modern homes and offices, intelligent door lock systems have become a popular choice. These systems combine the traditional locking mechanism with advanced technologies such as voice recognition, fingerprint scanning, or facial recognition to provide secure and convenient access control. This paper focuses on the design and implementation of an intelligent door lock system based on a microcontroller and voice recognition technology.II. System Design.The intelligent door lock system is designed to authenticate users based on their voices and grant accessto the locked area. The system consists of hardware and software components. The hardware components include a microcontroller, a gating circuit, an extended memory, anda voice input/output circuit. The software components comprise voice training, voice recognition, voice data processing, and a voice-activated control module.The microcontroller serves as the brain of the system, controlling and coordinating all other components. It receives voice input from the user, processes it through the voice recognition module, and compares it with the pre-stored voice templates stored in the extended memory. If the match is successful, the gating circuit is activated, unlocking the door.III. Hardware Selection.In this system, the microcontroller plays a crucial role. We have chosen the SPCE061A single-chip microcontroller due to its excellent performance, low cost, and ease of programming. The gating circuit is designed to control the locking mechanism of the door. The SPR4096 extended memory is used to store the voice templates and other important data. The voice input/output circuit is responsible for capturing the user's voice and generatingthe necessary audio output.IV. Software Development.The software development process involves writing code for the voice training module, voice recognition module, voice data processing module, and voice-activated control module. The voice training module allows users to record their voices and create voice templates. The voice recognition module compares the user's voice input with the pre-stored voice templates and determines whether the match is successful. The voice data processing module handles the preprocessing and feature extraction of the voice signal. The voice-activated control module controls the gating circuit and unlocks the door if the voice recognition is successful.V. Testing and Evaluation.To evaluate the performance of the intelligent door lock system, we conducted rigorous testing. The testing included testing the accuracy of voice recognition, theresponse time of the system, and the durability of the hardware components. The results obtained from the testing indicate that the system is reliable, accurate, and user-friendly.VI. Conclusion.This paper presents the design and implementation of an intelligent door lock system based on a microcontroller and voice recognition technology. The system provides a secure and convenient access control mechanism for modern homes and offices. The hardware components include a microcontroller, a gating circuit, an extended memory, and a voice input/output circuit. The software components comprise voice training, voice recognition, voice data processing, and a voice-activated control module. The testing conducted on the system demonstrates itsreliability, accuracy, and user-friendliness. Future work includes enhancing the system's performance, integrating additional security features, and exploring other biometric technologies for authentication.。
电子密码锁中英文对照外文翻译文献This article discusses the design of a matrix keyboard and LCD display based on a microcontroller unit (MCU) for use in electronic password locks。
The keyboard and display are crucial components of the lock。
allowing users to input their password and receive feedback on the lock's status。
The design includes a 4x4 matrix keyboard and a 16x2 LCD display。
both of which are controlled by the MCU。
The article provides a detailed n of the design process。
including the hardware and are components。
and XXX.nXXX and electronic components to provide users with access control。
One key component of these locks is the keyboard and display。
which allow users to input their password and receive feedback on the lock's status。
In this article。
we will discuss the design of a matrix keyboard and LCD display based on an MCU for use in electronic password locks.DesignThe design of the matrix keyboard and LCD display is based on an MCU。
Design and Realization of Fingerprint Door Access SystemVincent C. HuAbstractThis article summarizes the background of fingerprint door access system and its applied fields, then describes the entire d esign of fingerprint door access and the related modules, after that presents a fingerprint door-access network based on R S-085bus,expatiates the design of communication protocol, some problems and the corresponding resolvents on network connection.Access is limited access by a device, the development of access code, experienced, IC card, infrared, biological technology i dentification card, however, a series of process based on the radio frequency card number and password, the entrance gua rd system due to its inherent defects in safety and convenience, only in this hovering, between the fingerprint identificatio n technology, we will introduce security area, and puts forward the concept of fingerprint identification devices. Compared with the traditional access system, fingerprint door does not need memory identity number and password, also need not carry keys, such as IC card, use only one finger, and due to the features of human reproduction of the characteristics of con venient, also brought the reliable safety. The system can be widely applied financial unit, confidential unit, government org ans, enterprises and major department is important, airport, prison, parking lot, warehouse etc for its entrance to monitor and manage all occasions.Working principleFingerprint identification technology according to the uniqueness of fingerprints, through the analysis of the fingerprint ch aracteristics, such as local and global impulse, valley, the destination, the bifurcation point or bifurcation, extracting these f eatures from the fingerprint and relative position can reliably identified a person's identity. Fingerprint door through the a dvance in the system, and will keep the user information stored in the fingerprint characteristics of fingerprint module cont ainer. When a user access, fingerprint collector first collection of users, and then calculating fingerprint characteristic value , and carries on the analysis comparison tohost, decide if users have access permissions. If a user has the corresponding privileges, so in the control unit after verificat ion through lock device, the output will start to lock locking control signal equipment, realize the control, If the user does n ot have relevant authority, after verification of the information given will fail, and the validation report according to the ou tput Alarm. Whatever success or failure, operation results will be recorded in the system operation.System structureFingerprints scanned by fingerprint identification system control module, collection and processing chip, unlock control circ uit, electronic locks, liquid crystal display unit, audio circuits, keyboard, real-time clock, memory, "the mouth expansion cir cuit and decoding circuit, etc. 1.System diagram 1。
自动门的外文文献及翻译Revised as of 23 November 2020毕业论文外文文献与翻译(一)AutomaticdooranditscontrolsystemintroductionAuthor:Unit:PrincetonUniversity755CollegeRoadEast,Princeton,NJ08540Productofhumancivilization,automaticdoorshavebeendozensofyearsofdevelopment,sofar,throughtheapplicationofPLCcontrolsystemandothertechnologyprodu cts,alreadyhaveanditscontroltechnology,formedthelargescaleautomaticdoorofthefamily.Anda ccordingtodifferentrequirements,formulatedaseriesofstandards.People'sRepublicofChinainthe 2005-12-01standardofChinaautomaticdoornumber,standardcontentmainlyinclude:rulesforbuildingthec lassificationofthevariouskindsofautomaticdoor,specifications,codes,materials,requirements,te stmethods,inspectionrulesandsigns,packaging,transportandstorage.Thisstandardappliestopush -pullautomaticdoorautomaticdoors(arc),foldtheflatopenautomaticdoors,automaticdoors,revolv ingdoors.Youmayrefertootherautomaticdoor.Havespecialrequirementsofautomaticdoors,stills houldseeitsrelatedandhumancivilizationisatwin,itisaccompaniedbythedevelopmentofhumanci vilizationandchatter.Forthousandsofyears,thedoorhasbeenasthepatronsaintofthehumansociety activities,intruderintheroom,andasachannelofhumansocialactivities,carryingthedoorandciviliz ation,pursuingpeopletoyearnforthegloryoftheotherdesireisendlesstocivilization.FromancientE gypttoRomantotoday'smodernsociety,canseethedoor,passiveisolationbarrierfunctionofthedoo ris,andthechannelroleistoensurethatonlyinthe21stcentury,thedoorevenmorehighlightedsafetyc oncept,emphasizestheeffectiveness:effectivelyprevent,passage,evacuation,andalsohighlightst heconceptofarchitecturalart,doorandbuildingandthesurroundingenvironmentcoordination,the harmoniouswhole.DooradvancedformsofautomaticdoororiginatedinEuropeandtheUnitedStates,inAugust18 02,theGermanstandardcompanysuccessfullydesignedanddevelopedtheworld'sfirstsensingauto maticdoors,doorlarge-scalespecializedproductionbeganinthe150yearsago,intheprocessofconstantdevelopmentandpe rfection,emergedalargenumberofscaleofprofessionalmanufacturers.Rapiddevelopmenttotoda y,hasformedacompletekinds,functionperfect,workmanshipfineautomaticdooroftheasearlyasm orethanadecadeagobegantorefertotheautomaticdoors,andapplyitinthehotel,airport,shoppingce nters,Banks,officebuildingsandotherlargeandmedium-sizedpublicplaces,forthesebuildingsaddedbrightbeautiful,chic,dooraccordingtothedifferentuse functionandcanbedividedintoautomaticslidingdoor,automaticdoor,automaticrevolvingdoor,au tomaticarcdoor,automaticfoldingdoor,etc.,includingflatdoorwithfeweroccasions,revolvingdo orduetotheexpensiveandverybig,onlycommonlyusedinhigh-gradehotels,inneedautomaticslidingdoorismostwidelyused,peoplegenerallysayautomaticdoor, automaticinductiondoorisslidingslidingdooristhemostcommonformofautomaticdoormachinea ddradaronbothinnersideandoutsideofthedoor,automaticdoorwhenthemancamenear,theradarbyemittingmicrowaveinductiontoman'sexistence,openthedoortothecontrollerasignal,thecontroll erthroughthedrivetoopenthedoor.Whenthemanbythedoor,andthenclosedtheformofinfraredsen sor,mainlythroughtheinfraredtofeelthetemperaturechangeswithinthespecifiedrange,whenpeop lewalkinto,microwaveinductiontheemissionsignalcontrolchangesinthedoor.Microwavesensorsandinfraredsensorsdifferenceismainly:microwavesensor,alsoknownas microwaveradar,reactiontothemovementoftheobject,andreactionspeed,suitableforwalkingspe ednormalpersonnelthroughtheplace,itscharacteristicisthatoncethedoornearthestaffdon'twantto gooutandmotionless,radarwillnolongerresponse,automaticdoorwillbeclosed,likelyclampingph enomenon.Infraredsensors,existinresponsetotheobject,regardlessofwhetherornotmobilestaff,a slongasinsensorscanningrange,itwillrespond.Reactionspeedisslowerthanthemicrowavesensor ofinfraredsensors.Accordingtodifferentrequirementsofsome,somemanufacturersintheproductionofautomat icdoorscanincreasesomepersonalfunction,facilitatethemanagementandmaintenance.Suchasfu zhoublueelectronicco.,LTD.,automaticdoor,ithasthefollowingcharacteristics:1,automaticdoor sensorsreacttothemovementofobjectsinmicrowave,sensitivityisadjustable,stableperformance! 2,automaticencryptiongathermulti-functionremotecontrolintoanorganicwhole,theinductiondoorforencryption,canavoidtheproject appearsonthewelsh,baddebts,etc.Phenomenon,thuseffectivelyprotecttheinterestsofdealers,atth esametime,canrealizetheremotecontroltoopenthedoor,alwaysopen,lock,unlock;Hasconnectedt othecardreader,fingerprint,homebutton,peripheraldevices,suchaselectriclockfunctions.3,safet ylightcaneffectivelyovercometheblindareaofinductiveprobesensorislessthan,sothattheinductio ndoorsafer.4,self-helpbankcardslotmachineoveralldesign,ABSelectroplatingshelldurableandconvenienttoinstall ,canmatchanybankATMcard,nocardcapacitylimits,importedalloyhead,superwear-resistanthighsensitivity,high(400)orlowresistance(300)Oefilecanbeused;Issuitablefortheself-servicebank.Microwavemodule5,automaticdoor,kickingmedallion,IDcardpassword,remotetra nsceivermodule,electriccaralarm,telescopicdoors,electronicdisplayscreen,motorcyclealarm.PLC(ProgrammableController,hereinafterreferredtoasPLC).PLCisintheorderofthetraditi onalcontrollerisintroducedonthebasisofmicroelectronicstechnology,computertechnology,auto maticcontroltechnologyandcommunicationtechnologytoformanewgenerationofindustrialcontr oldevice,thepurposeistoreplacerelay,executethesequencecontrolfunctionsuchaslogic,timing,c ounting,establishflexibleSPCsystem.Programmablecontrollerhasthestrongability,highreliabili ty,flexibleconfiguration,simpleprogramming,etc,isamajormeansofcontemporaryindustrialpro ductionautomationandautomationcontrolequipment.DuetotheadvantagesofPLCinautomaticco ntrol,thusiswidelyquotedintheautomaticdoorsystem.DuetothePLCinthedevelopment,therefore,fortheexactdefinitionismoredifficult.American electricalmanufacturersassociation(NEMA)afterfouryearsofresearchwork,in1980,officiallyna medProgrammableControllerPC(ProgrammableController),butaPersonalComputerPC(Person alComputer)inordertodistinguish,oftenreferredtoasPLCProgrammableController,andmakesad efinitionforPLC,ProgrammableControllerisakindofwithinstructionmemoryanddigitaloranalog input/outputinterface,withanoperationisgivenpriorityto,canfinishthelogic,sequence,timing,co untingandarithmetic,andotherfunctions,isusedtocontrolthemachineortheproductionprocessaut omationcontroldevice.In1985aseconddraft,andin1987thethirddraftofPLCinthefollowingdefinition:"aPLCisadigitaloperationoftheelectronicsystem,designedforindustrialenvironmentapplicationanddesign.It USESaprogrammemory,usedinitsinternalstorageimplementationlogicoperation,sequenceoper ation,timing,countingandarithmeticoperationinstruction,andcanthroughdigitaloranaloginputa ndoutput,controlvarioustypesofmachineryorproductionprocess.Programmablecontrollerandre latedperipheralequipment,shouldbeinaccordancewiththeeasilyandindustrialcontrolsystemasa whole,easytoexpanditsfunctiondesignshowsthatthedefinitionofPLCisakindofcanbedirectlyap pliedtotheindustrialenvironmentofthedigitalelectronicdevices,isbasedonmicroprocessor,comb inedwithcomputertechnology,automaticcontroltechnologyandcommunicationtechnology,inpr ocesscontrolandtheuser's"naturallanguage"programmingofasimple,convenientoperation,highr eliabilityofanewgenerationofgeneralindustrialcontroldevice.mainfunctionsofthePLC(1)theswitchcontrollogicandorderThisisthemostwidelyPLCapplication,thebasicsituation.Itsmainfunctionistocompleteswit chlogicandsequentiallogiccontrol,andthuscanrealizevariouscontrolrequirements.(2)thesimulationcontrol(A/DandD/Acontrol)Manycontinuousvariationintheprocessofindustrialproduction,theneedtocontrolthephysic alquantities,suchastemperature,pressure,flow,level,etc.,theseallbelongtoanalog.Longerthanint hepast,thePLClogiccontrol,analogcontrolmainlybyinstrumentordistributedcontrolsystem,PLC productspossessmuchnowdealingwiththiskindofanalogfunctions,andprogrammingandeasytou se.(3)thetiming/countingcontrolPLChasastrongtimingandcountingfunctions,itcanprovideuserswithdozensorevenhundred softimersandcounters.Forthetimer,timerintervalcanbesetbytheuser;Tocounter,ifneedtocountof highfrequencysignal,canchoosehighspeedcounter.(4)thesteppercontrolPLCprovidesuserswithacertainnumberofshiftregister,useshiftregistercaneasilyfinishstep pingcontrolfunction.(5)motioncontrolInthemechanicalprocessingindustry,programmablecontrollerandthecomputernumericalc ontrol(CNC)integratedtogether,tocompletemachinetoolmotioncontrol.(6)dataprocessingMostPLChasadifferentdegreeofthedataprocessingability,itnotonlycanperformarithmetic operations,datatransmission,butalsofordatacomparison,dataconversion,datashowstheprintope ration,alsocanundertakesomePLCfloatingpointarithmetic,andfunctionaloperation.(7)communicationnetworkPLChasthefunctionofcommunicationnetwork,itmakesPLCandbetweenPLCanduppercom puter,PLCandotherintelligencetoexchangeinformationbetweendevices,formaunifiedwhole,rea lizethecentralizedcontrol.PLCcansorapiddevelopment,inadditiontotheobjectivedemandoftheindustrialautomation, hasmanyuniqueadvantages.Itwellsolvedinthefieldofindustrialcontrolwidelyconcernaboutthere liable,safe,flexible,convenient,economicandotherissues.Itsmainfeaturesareasfollows:(1)highreliabilityReliabilityreferstotheaveragetrouble-freeworkingtimeprogrammablecontroller.Duetotheprogrammablecontrollerhasadoptedaseriesofhardwareandsoftwareanti-interferencemeasures,stronganti-interferenceability,MTBFreachingtensofthousandsofhours,canbedirectlyappliedtoindustrialpr oductionfieldhaveastronginterference.Programmablecontrolleristhemassesofusersrecognizedt obeoneofthemostreliableindustrialcontrolequipment.(2)controlfunctionisstrongAsmallprogrammablecontrollerwithhundredsofthousandsofprogrammingelementsavaila bleforuserstouse,paredwiththesamefunction ofrelaysystem,ithastheveryhighcostperformance.Programmablecontrollercanbethroughtheco mmunicationnetwork,realizesthedecentralizedcontrolandcentralizedmanagement.(3)theusereasytouseProgrammablecontrollerproductshavebeenstandardization,seriation,modularization,equi ppedwithawiderangeofvarioushardwaredevicesforuserselection,userscanconvenientlyflexible systemconfiguration,systemcomposedofdifferentfunctions,differentscale.Programmablecontr ollerwouldbeveryconvenientfortheinstallationofwiring,strongloadcapacity,candirectdrivegen eralsolenoidvalveandaccontactor.Thehardwareconfigurationisdetermined,youcanchangetheus erprogram,convenienttoquicklyadapttochangesinprocessconditions.(4)programmingconvenient,simpleLadderdiagramisaprogrammablecontrolleristhemostu sedprogramminglanguage,thesymbol,expressionwayandtherelaycircuitprinciplediagramissim dderdiagramlanguage,image,intuitive,simple,easytolearn,familiarwiththerelaycircuitdi agramoftheelectricaltechnicianjustspendafewdaystimecanbefamiliarwithladderdiagramlangu age,andusedtopreparetheuserprogram.(5)thedesign,installation,commissioningperiodisshortProgrammablecontrolforsoftwarefunctionreplacedtherelaycontrolsystemofalargenumber ofintermediaterelays,timerelays,counters,etc.,makethecontrolcabinetdesign,installation,wirin ggreatlyreducetheworkload,shortentheconstructionperiod.Programmablecontrolleroftheuserp rogramcanbesimulatedinthelaboratorydebugging,simulationdebugagainaftergoodwillinthepro ductionsiteforinstallationandwiringofPLCcontrolsystem,atthesceneofproblemsfoundinthetrac kingprocessbymodifyingtheprogramcansolve,greatlyshortenthedesigncycleandwasputintoope ration.(6)easytorealizemechanicalandelectricalintegrationProgrammablecontrollerissmallinsize,lightweight,lowpowerconsumption,vibrationresist ant,moistureproofandheatresistantcapabilityisstrong,makingthemeasytoinstallinsidethemachi neequipment,producemechanicalandelectricalintegrationproducts.NowwithPLCasthecontroll erofCNCequipmentanddevicehasbecomeatypicalrobot.自动门及其控制系统介绍作者:吉恩F.富兰克林单位:普林斯顿大学地址:新泽西州普林斯顿学院东路 755号邮编08540作为人类文明的产物,自动门已经发展了几十年,到目前为止,通过PLC控制系统和其他技术产品的应用,再加上其控制技术的成熟,自动门控制系统已经成型。
智慧门禁系统英文设计方案Design Proposal for an Intelligent AccessControl System1. IntroductionAn intelligent access control system is a sophisticated security system that uses advanced technology to control access to buildings orspecific areas within buildings. This systemprovides enhanced security by allowing only authorized individuals to enter restricted areas. This design proposal presents an overview of an intelligent access control system, its components, and its benefits.2. System ComponentsThe intelligent access control system consistsof the following components:2.1 Access TokensAccess tokens are provided to authorized individuals and grant them access to specific areas. These tokens can be in the form of access cards,key fobs, or biometric information such as fingerprints or facial recognition.2.2 Card ReadersCard readers are installed at access points and require users to present their access tokens. These readers communicate with the central system to verify the authorization of the individual and grant or deny access accordingly.2.3 Central SystemThe central system manages and controls the access control system. It houses the database of authorized users and their access permissions. It communicates with the card readers to verify access requests in real-time and logs access events for auditing purposes.2.4 Monitoring StationThe monitoring station provides a centralized view of the access control system. Security personnel can monitor access events in real-time and respond to any security breaches or anomalies.3. System FunctionalityThe intelligent access control system operates as follows:3.1 Access RequestWhen an individual approaches an access point, they present their access token to the card reader.The reader sends the token information to the central system for verification.3.2 Authorization VerificationThe central system checks the access token against the authorized users' database and verifies the individual's access permissions. If the individual is authorized to access the requested area, the central system grants access and sends a signal to the card reader to open the door.3.3 Real-time MonitoringThe monitoring station receives real-time updates on access events. Security personnel can monitor access attempts, identify unauthorized individuals, and take appropriate actions in case of security breaches.3.4 Logging and ReportingThe central system logs all access events, including successful and unsuccessful attempts. This information is used for auditing purposes and generating activity reports.4. Benefits of an Intelligent Access Control SystemImplementing an intelligent access control system provides several benefits:4.1 Enhanced SecurityBy allowing only authorized individuals to access restricted areas, the system significantly enhances security and prevents unauthorized access.4.2 Improved Access ManagementThe centralized system simplifies access management by providing a single point of control. Administrators can easily add or remove users, modify access permissions, and monitor access events.4.3 Real-time Monitoring and AlertsThe monitoring station provides real-time updates on access events, allowing security personnel to respond promptly to any security breaches. The system can also generate alerts in case of unusual access patterns or suspicious activities.4.4 Auditing and ReportingThe system logs all access events, providing a detailed audit trail. Activity reports can be generated to track access patterns, identify potential security gaps, and comply with regulatory requirements.5. ConclusionAn intelligent access control system is acrucial component of modern security infrastructure. By utilizing advanced technology, such as access tokens, card readers, and a centralized system,this system provides enhanced security, improved access management, real-time monitoring, and comprehensive auditing capabilities. Implementing such a system ensures the protection of valuable assets and enhances the safety of individualswithin a building or restricted area.。
中英文对照外文翻译(文档含英文原文和中文翻译)原文:Intelligent Entrance Guard SystemIntelligent entrance guard and safety management system is a new type of modern safety management system, which combines the microcomputer automatic identification technology with the modern safety management practices into an organic whole. It contains lots of new technologies such as the electronic, mechanical, optical, computer technology, communication technology, biotechnology, and so on. It is an effective measures to achieve the goal of implementing safety management at the inward and outward of important departments. It can be applied to all kinds of confidential departments, such as banks, hotels, generatorrooms,the armory, confidential rooms, offices, intelligent communities, factories etc. With the rapid development of digital technology and network technology today, access control technology finally gets the good chance to develop rapidly. Entrance guard system has far transcends the pure doorway and key management.It has gradually developed into a set of complete access management system.1The Development of Entrance Guard SystemInward and outward entrance guard system just as its name implies is a control system of managing the inward and outward channels, which is developed on the basis of the traditional door lock. The traditional mechanical lock is just a simple mechanical device, so no matter how reasonable the structural is designed, how strong the material is made, people can always open it through various means. Key management is very troublesome in places like offices and hotel rooms where so many people entering and leaving the passageway. Whenever the keys are lost or employees are replaced, locks and keys must be renewed. In order to solve these problems, electronic card lock and electronic trick lock are invented. These two kinds locks’ appearance raised the management level of inward and outward channels from a certain extent and has impelled the channel management to enter the electronics era. But with the continuous application of these two kinds of electronic locks, the defects of themselves are gradually exposed. The problem of magnetic card lock is the easy replication of the information, a greater degree of wear between card and card reader, high failure rate and low safety factor. The problem of combination lock is that the password is easy to leak and we do not have even any small clue to investigate with, so the safety coefficient is very low. At the same time, it is easy to be unlocked by people outdoor because most of the reading card (password) and the control part is installed together outside the door at this period. Entrance guard system in this period have remained in its early immature stage, so the entrance guard system is usuallyreferred to as electronic locks, which has not been widely applied. With the development of inductive card technology and the biological recognition technology in recent years, the entrance guard system has got a leap-style development and has entered into the mature period. they have their special strong points in various aspects like safety, convenience, manageability, etc. The application fields of entrance guard system is becoming more and more abroad.2 Function of Entrance Guard SystemBasic functions realized by mature entrance guard system:2.1 The management of the channel access permissions.·Access permissions are set to formulate who can pass in and out each channel and who can't.·The way to pass in and out the channel means to scope out the authorization of the way to pass in and out to people who can pass in and out the channel. The ways to pass in and out includes entering password, reading the card(biometric), reading the card(biometric) plus entering password.· Access time means to set the range of time during which people who have the permission can pass in and out.2.2 The function of real-time monitoringSystem administrators can keep a watchful eye on the situation of people passing in and out of each gate region(there are photos as well at the same time) and the situation of each gate region(including the door switch, warning in various kinds of abnormal conditions) through the microcomputer in real-time; they can also open and close all the door area in emergency conditions.2.3 Function of querying records of in and out:System can store all the in and out records, status. You can query the records and status according to different querying conditions. It is equippedwith corresponding attendance software so as to realize the purpose of checking-in and guarding with one piece of card.2.5 Function of abnormal alarming:It can realize microcomputer alarm or alarm with siren in exceptional cases, such as: illegal intrusion, not closing the door overtime, etc.It can also implement the following special features according to different entrance guard system:Fire alarm monitoring linkage function: The entrance guard system can automatically open all the locks to let the people inside to escape at any time in the event of a fire alarm.Automatic monitoring linkage commonly refers to the monitoring system which will record the situation at that time and the warning condition when someone charges (valid/invalid).Settings, managing and monitoring functions of the network : most of the entrance guard system can only use a microcomputer management, but advanced technology of the system can set, monitor, query and manage the whole system at any location which has been authorized in the network. It also can set, manage, query and monitor in a different place through the INTERNET.Function of open the door logically: Simply put is that several people have to swipe the cards through the same door at the same time(or in other way) so that the electronic door lock will open.3 Applications of Intelligent Entrance Guard System3.1 Application of Entrance Guard in The Work of The Companies inside The Intelligent Office Buildings:Doors installed with entrance guard on the door in the companies can effectively prevent the foreign salesman to disturb the order of office, and also can prevent foreign sundry to enter the company effectively , and then ens ure the safety of the company property and their employees. You can display and improve the company's management level and improve the corporate image. Itcan also track whether the employees leave the company without appropriate reasons. You can check on work attendance by using the attendance management software without buying time recorder. The results are more objective and fair and faster with higher accuracy rate. It can reduce the power and amount of work of personnel department. It can effectively solve the problem that the employees have to change the keys of the front gates due to fear. You can arrange the limites of authorities and door-open time flexibly. Workers just need to take one piece of card without adorning a large number of heavy keys and it is safer than keys.You can avoid the materials and documents in the leaders’ office been leaked by others and give the leaders a more secure and private environment by install entrance guard system on the door of the leaders’ office. you can guarantee the core technology and data not been stolen easily by outsiders and prevent the employees of other departments from entering this department to disturb the developing work by installing entrance guard system in the development of technical department. You can guarantee the security of the property and the safety of the company's financial information by installing entrance guard system in financial department. You can prevent the other person from entering into the production workshop effectively and avoid causing safety problems by installing entrance guard system in the production workshop gate.3.2 Applications of in and out Management Control in The Intelligent CommunityGenerally installed entrance guard system in the cell gates, electric gates, unit of steel fire doors, security doors can effectively stop other workers from entering into the community and conduct the closed-end management in the community effectively. It can also change the old inaccurate and less rigorous management style of community securities who distinguish whether he or she is an outsider just rely on their memory. If the new security guards stop the new residential, it will annoying them. Ifoutsiders wear very well, the security guards will consider them the residential and let them in without any question, which will bring potential safety hazard.The entrance guard system of safety science and technology can improve the level of property and it is better for developers to promote property. Owners will also benefit from the scientific and effective access of management. Networking entrance guard is advantageous to the security of monitoring all the situation of in and out of the door at any time. If there are accidents or cases, it can provide evidence when the police later query the records.You can combine it with intercom system with visual intercom system.You can combine it with internal consumption IC card and parking management implementation into one card.3.3 Applications of Entrance Guard in The Government Offices:It can effectively standardize the order of office and prevent illegal personnel shocks to government offices, protecting personal safety of leaders.3.4 The Application of Entrance Guard in Telecom Base Station and Substation Power Supply Bureau:Typical base station and substation power supply bureau has such characteristics: many base stations, big system capacity requirements, large distribution range or even hundreds of square kilometers. It has its own network connected to the Internet. In some places it is even unattended, which needs the central dispatching room scheduling staff flexibly at any time. Implementation scheme is to use the network entrance guard controller, to realize remote management through the LAN or the Internet.3.5 Application of Entrance Guard in intelligent elevator control:It is also known as access control elevator, elevator card, IC card elevator, which only authorized users can have the right to recall the elevator and choose hall according to the floor. More and more intelligent communities have been using relate equipments. The intelligent control system of science and technology of Shenzhen has developed specially elevator control entranceguard control system form designing a proprietary elevator entrance guard control system.中文译文:智能门禁系统智能门禁安全管理系统是新型现代化安全管理系统,它集微机自动识别技术和现代安全管理措施为一体,它涉及电子,机械,光学,计算机技术,通讯技术,生物技术等诸多新技术。