Home
Products
Haikou access control systems, face recognition Fingerprint Access Control, encrypted communication, tamper ..
Haikou access control systems, face recognition Fingerprint Access Control, encrypted communication, tamper ..
Haikou access control systems, face recognition Fingerprint Access Control, encrypted communication, tamper ..
Haikou access control systems, face recognition Fingerprint Access Control, encrypted communication, tamper alarm company specialized in access control systems wholesale, sale, installation, access control systems, access control and attendance system, fingerprint access control systems, locks, electronic locks, magnetic locks, Card, burglar alarm, monitoring equipment, building intercom, access control designed to provide on-site installation and maintenance of various access control systems. Welcome to inquire. Face recognition terminal with a new mold design, it is a completely offline Face Recognition Access Control product, it is located in the high-end Access Control market, to replace the current card, fingerprint access control attendance machine on the market. The product supports the owner's face photographed, job number recognition, face recognition, face recognition four kinds of card authentication, user-friendly and flexible, while supporting TCP / IP, U disk two means of communication, the user flexible options to achieve the user data and access records of upload and download configuration Professional Edition attendance management software. Face recognition system works face recognition technology is widely used in the regional characteristics of the analysis algorithm, which combines computer image processing technology and biometric principles in one, the use of computer image processing technology to extract feature points from the video portraits, the use of biological statistical theory to analyze a mathematical model, which face features template. Use has been built and tested face features template face people who like to characterize, according to the results of the analysis to give a similar value. This value can be determined by whether or not the same person. The main function modules face capture and face tracking function captures refers detected in a frame of an image or video stream portraits and portraits isolated from the background and automatically save it. Portrait of tracking is the use of portraits capture technology, within the range of the specified when moving the camera to shoot in portrait automatically be tracked. Face recognition than to verify the type and sub-type two kinds of matching search mode. Verification formula is obtained refers to capture portraits or portraits specified in the database registered a verification of the image for comparison to determine whether the same person. Search type alignment means all portraits from the database registered in the search to find out if there is the presence of the designated portrait. Face modeling can be registered storage and retrieval of data modeling portrait extract facial features, and the production of human face template (Face signature file) saved to the database. Face conducting search (search formula), the specified modeling portrait, and then compared with a database of all of template identification, the final lists of persons most similar values ??than the similarity of their list. Real authentication function system can recognize people come in front of the camera is a real person or a photo. In order to prevent users with photo fraud. This technique requires the user to make complex movements facial expressions. Image quality testing image quality directly affects the identification of effects, image quality detection function can compare the upcoming photo image quality assessment, and the corresponding recommendations to assist in identifying the value of accurate identification features: dark can also be identified, convenient: no press, only to see Intuitive is good: color display, voice reported the names applicability: as long as you have a face Security: photo tracing, no one falls through health products: non-contact, health compatible good: standard Wiegand interface to facilitate the switch output Input: Pinyin input Chinese Name powerful: four authentication, access control function flexible options: encrypted communication, tamper alarm management software: a powerful, completely eliminate automatic upgrade instead of each other between staff Punch phenomenon. Without contact, product durability. Tel: 18889798499 Miss Wen Contact: Meilan District, Haikou City, Hainan Province pretty good diligent Road Building, Room 707 Company Name: Haikou Liansheng Science and Technology Development Co., Ltd.
Contact Detail
Company Name: | Hainan Liansheng Science and Technology Development Co... |
---|---|
Employee Number: | |
Annual export: | |
Year Established: | |
Contact Person: | Mr. Ms. Wen(Logistics Sector Logistics) |
Telephone Number: | 0898-66102045 |
Company Address: | Longhua District, Haikou City, Hainan Province, China World Trade Center Plaza 3 Yusha Yusha Road 501 rooms, Haikou City, Hainan, China |
Zip/Postal Code: | 570101 |
Find More Related Products
- [] [Anhui Anhui retractable..
- Wholesale domestic producti..
- Kindergarten children micro..
- Qingdao facial recognition ..
- 4428 Fudan white card conta..
- Supply of residential prope..
- 42u standard rack size cabi..
- Jiaozhou metal detector / C..
- Chengyang Huangdao Patrol P..
- Qingzhou high density metal..
- Guangzhou fabrication plant..
- Guangzhou fabrication plant..
- Guangzhou fabrication plant..
- Guangzhou M1 card IC card a..
- Bao'an District of focus de..
- Patrol Patrol Qingdao Cheng..
- Weihai, Weifang metal detec..
- Qingdao metal detector, met..
- Qingdao fingerprint recogni..
- Shanghai Caobao professiona..
- Supplying ID access cards, ..