-
E-mail
249828795@qq.com
-
Phone
15291856570
-
Address
No. 11 Tangyan South Road, High tech Zone, Xi'an City, Yicui Garden, Metropolis 2-2-1708
Xi'an Chiyun Technology Co., Ltd
249828795@qq.com
15291856570
No. 11 Tangyan South Road, High tech Zone, Xi'an City, Yicui Garden, Metropolis 2-2-1708
Edge computing early warning linkage terminalIt is a highly integrated ARM architecture device. It has rich control interfaces and expansion interfaces, adopting ROCKCHIP RK3588CPU, eight core 64 bit size core architecture. Having powerful computing and processing capabilities, embedded with multiple algorithm applications, the powerful computing power can be connected to multiple cameras. The recognition algorithms include area intrusion, facial recognition, human body recognition, license plate recognition, smoke and flame recognition, safety helmets, phone calls, smoking, work clothes, off-duty, sleeping, electric scooters, area intrusion, falls, running, occupation of fire exits, static discharge, debris accumulation, oil tankers, fire extinguishers, and dozens more. It can be applied to gas stations, chemical plants, smart communities, environmental protection, construction sites, factory areas, campuses, parks, scenic spots and other scenarios.
◆ Reduce latency
Edge computing increases computing nodes, reduces the total amount of data traffic, and improves the performance of applications and services.
◆ Cost savings
The low power consumption and low bandwidth data processing and storage in edge devices reduce costs, thereby optimizing overall costs.
◆ Local computing power
Edge computing will deploy computing power in the nearest place to each operation logic in the network to improve the real-time processing capability of data. By combining edge devices and edge data centers, enterprises can effectively expand their capacity requirements at any time, with lower network bandwidth requirements for each additional device.
◆ Security guarantee
Compared with the centralized structure of cloud computing, the distributed structure of edge computing is less vulnerable to DDoS attacks and failures, which also makes it easier for attackers to penetrate the networkDifficulty and complexity. Edge computing can filter sensitive information at the edge side and select transmission data to meet security and compliance requirements.
◆Comprehensive compatibility and matching
Easy access to various networked command centers and independent control; We can provide SDK development packages to provide users with a secondary development foundation for deep applications.
◆ Device access
Edge computing early warning linkage terminalSupport multi-channel RTSP monitoring video stream access;
◆Intelligent recognition warning
branchHolding a human face, body, non motorized vehicle, motor vehicle, or license plate; Vehicle brand, color, model, license plate number; Falling, running, making phone calls, wearing a safety helmet, smoking, clothing color, clothing type; Cross border/regional invasion, gathering, wandering;
◆data reporting
Structured alarm images and alarm tracking video push notifications;
◆Offline work
Support offline system operation, network recovery alarm information feedback.