钻石集团

Campus Integrated Video Industry
Campus Integrated Video Surveillance Solution
[program background]
The current social security environment has become increasingly complex, and the requirements for modern teaching management have been further enhanced, and school and society activities have become more frequent. The traditional teaching era of "the ears never seen anything outside the window and one reads only the Sages" is far from meeting the teaching needs of modern schools. More and more social activities have also affected the calm life of teachers and students, bringing with it a variety of safety hazards and vicious events such as complicated personnel access, burglary on campus, violent robbery, fighting and fighting, etc. Learning life brings anxiety and fear. Strengthening the management of campus security and improving the modern management of schools has been put on an important agenda. “Safe campuses” and “digital campuses” have gradually become a trend.
In order to protect a normal learning and living environment, major campuses are actively implementing the campus security system. However, in the process of specific use, all campus security raises a question: how to integrate video surveillance systems, burglar alarms, access control, and security inspections. More system, through a system control platform for integrated control, linkage, etc., to speed up the police speed, the first time to check the police, video review, and other work that would otherwise require manual call, turned to the processing of settings through the plan to operate more intelligent It is quick and accurate to improve school management and teaching efficiency. At the same time, with the rapid development of network and audio and video technologies and the expansion of system functions and uses, ordinary campus monitoring systems no longer meet daily needs. The comprehensive system composed of comprehensive video monitoring system and digital teaching system, through technology integration and application of complementary technologies, is not only conducive to the prevention and timely handling of hidden dangers in the campus, but also conducive to the implementation of educational administration and examination management to meet the existing needs of the school. Applications such as distance learning, multimedia teaching, and electronic invigilation lay a solid foundation for hardware and platforms. In some schools, successful application systems are playing a huge role.
First, the status quo of campus security
Today, colleges and universities generally have the following characteristics: large area, scattered buildings, large numbers of people, fewer management personnel, many schools with branch schools, and another one is that many school buildings are in disrepair, coupled with poor self-protection consciousness of students, there are great potential safety hazards. . In recent years, the state clearly stipulates that the key areas of colleges and universities must take corresponding technical preventive measures, and some regions also put forward clear requirements for monitoring coverage. Moreover, with the continuous increase in the number of colleges and universities and the continuous increase in the size of students (see the table on the left), the difficulty of management has increased, and sudden incidents have become more frequent. The superiority of technical defense measures in improving the safety of universities has become more pronounced. According to surveys conducted by the Ministry of Education and the Ministry of Public Security in 10 provinces and cities including Beijing, Tianjin, and Shanghai, approximately 16,000 students have died abnormally each year, and an average of about 40 students die each day, which is equivalent to daily deaths. The students of a class disappeared! The main reasons included food and drink hygiene, school building safety, transportation inside and outside campus, fights and fights, unlawful infringements by students and staff, and normal cultural and sports activities.
Second, demand analysis
In view of the above, strengthening the security management of the campus, maintaining the normal public security environment of the campus, improving the teaching management of the school modernization, installing the network monitoring system on the campus, strengthening the monitoring system on key locations and linking with the alarm system is an effective and feasible precaution means. Campus security monitoring system should meet the following requirements:
There are many monitoring areas: school personnel are intensive and require monitoring to every corner of the campus. Therefore, there is a need for school entrances, school passages, outdoor plazas, playgrounds, event venues, campus green spaces, parking lots, building perimeters, building corridors, halls, ceilings, elevator rooms, laboratories, classrooms, libraries, finances Room, data room, computer room, warehouse, power distribution room, boiler room, etc. all need to install surveillance cameras.
Large monitoring area: The campus area of ​​the school is generally large, with many monitoring points, long network-laying lines, and complicated routing. The system is required to support a variety of cabling methods. It is advisable to use part of the reserved lines in the ready-made backbone line and distribute it to each monitoring area reasonably; or use the campus network to plan a relatively independent logical private network to spread network nodes within the area. For easy construction and maintenance.
Clear monitoring picture: Campus surveillance requires monitoring of video images with a resolution of at least D1 or megapixels or more. In particular, surveillance videos need to see the details of surveillance objects, improve the accuracy and efficiency of forensics, and extend the video through clear video. Other business applications and management applications.
The monitoring environment is different: Each site and area in the campus have different functions, indoor and outdoor, temperature and humidity, lighting conditions, location of monitoring points, monitoring range, monitoring density, power supply conditions, wiring conditions, etc., and therefore need to be based on different applications. The environment chooses different adaptability cameras.
System linkage alarm: The surveillance system must have motion detection function, can set a reasonable detection alarm strategy according to the special requirements of the area and time period, and upload the alarm information to the network monitoring center through the network, and automatically switch the image to the scene. At the same time, sound and light alarm signals are sent out, and automatic video recording, automatic mail transmission and uploading of real-time video files, etc., are convenient for promptly taking emergency measures.
Preventing Campus Violence: When campus violence occurs or human judgment is likely to occur, operators at all levels can initiate an alarm trigger signal to prompt security personnel to rush to the scene; at the same time, emergency alarm buttons can be installed in key surveillance areas and security rooms. Touch the emergency button to alarm the 110 alarm center, prompting the police to be in place to prevent or stop violence in the school.
Strengthen after-sale forensics: During the student's time in school, all monitoring points need to be recorded, and according to actual needs, different recording strategies such as all-weather recording and triggered recording shall be set up to facilitate accidental or personal injury when taking the initiative to produce evidence; during winter and summer vacations, Different areas of openness and security level requirements, set the appropriate video strategy.
Multi-system integration: Make full use of video surveillance information resources, network management platform, strengthen the integration of security monitoring and perimeter prevention, access control, electronic patrols, video conference emergency coordination, fire fighting, and other special application systems, and promote system information sharing and The combination creates an organic whole that is integrated with the day-to-day work of the school to enhance the overall functionality and efficiency of the system and maximize its effectiveness.
Extension of application scope: In view of the fact that many universities and colleges now have multiple campuses, the monitoring systems of each campus need to be networked and converged in multiple levels to strengthen the day-to-day management and flexibility of the entire school. At the same time, the use of video surveillance systems, especially high-definition, low-stream video sources, with audio capture, intelligent tracking and other special features, to achieve distance education, multimedia teaching, electronic proctory and other applications.
Implementation of simple operation and maintenance: System implementation should reflect the characteristics of networking, the device through the IP address for local and remote configuration and management; wiring using tree network routing, and as far as possible to achieve POE power supply technology, saving wire costs and the difficulty of implementation; The system adopts a distributed deployment and centralized management system architecture, sets up multi-level management authority, reasonably allocates system resources, and improves management efficiency and security.
[program structure]
The network video surveillance system design is an end-to-end digital system design. The network video surveillance system consists of five parts: video capture and encoding system, video transmission network system, network video storage system, network video display system, and network video management. system.
 
The front-end camera can use different types of network cameras according to customer requirements, installation environment, and monitoring scope, and the network camera can encode the video and access the network. The front-end network camera can pass the local area network or wide area network, wired network or wireless network. The encoded video data is transmitted to clients and monitoring centers. At the same time, some network cameras support network power (POE), and switches with POE power supply function can be selected to supply power to front-end network cameras. Video data is uniformly deployed by the monitoring center. Store network-distributed network DVRs in the network; all video images can be viewed and played back in real time in various combinations through the network matrix in the monitoring center's display; all levels of control centers or areas can be accessed via local network DVRs. Local management, monitoring center deployment of video surveillance management platform for all cameras, network hard disk recorders, network matrix unified management, and assign the appropriate permissions to different levels of clients to achieve remote monitoring, while the management platform to reserve the system , Seamless integration of other subsystems.


1, video acquisition and compression system
The network video acquisition and coding system uses an integrated network camera. The selected network camera directly encodes the video signal and then accesses the network, so that the video signal is collected, encoded, and compressed directly in the camera. In addition to the network high speed dome camera, In addition, the zoom integrated network gun needs a separate power supply. All other network camera's access is directly connected to the network through a single network cable. The video signal transmission also provides POE power supply. The back-end management system identifies each device through the built-in IP address of the camera. After finding the IP address of the corresponding device, each camera can be separately managed and controlled.
All monitoring points adopt compression methods such as M-JPEG, MPEG-4, and H.264, and the video quality reaches the FULLD1 and above high-definition effects; campus entrance and exit, installation of intelligent high-speed ball, automatic positioning, automatic cruising, setting preset positions , set the cruising trajectory and other functions, has a low illumination function, with the help of street lights, 24-hour monitoring, high-speed cruising; at the same time, in the vehicle entrance and exit channel installation of ultra-wide dynamic gun, in the light conditions of greater contrast, to achieve Monitoring and monitoring of vehicle access and vehicle salient features. The entrances and exits of various buildings are very different due to indoor and outdoor light, and are prone to backlighting. The ultra-wide dynamic network gun is installed, and the stairway has a near-monitoring distance, a relatively constant monitoring range, and a day/night type hemisphere where an integrated wide-angle lens can be installed. Web video camera. The indoor main corridors and passages are equipped with infrared integrated network guns to meet the indoor light changes, ultra-low illumination, and narrow and long-range monitoring needs. The halls in the building belong to the gathering place of personnel and are directly connected with the entrance and exit. We must consider the factors of larger monitoring scope, install high-speed network domes, and realize large-scale monitoring and moving-point monitoring.
The network camera itself provides a 100M network interface, which can directly access the dedicated network for video surveillance and transmit the digital video signal to each management end and browsing end of the network through the network. At the same time, since some network cameras have integrated POE power supply modules, they can follow the standard IEEE 802.3af protocol developed by the IEEE to realize the power supply over Ethernet. The original analog cameras and DVR equipment can be integrated through the addition of encoders and platforms to retain the original equipment investment and reuse.

2, video transmission system
In order to ensure the network camera image transmission, real-time storage of the bandwidth requirements, network video surveillance system should use a dedicated network, and the computer network subsystem physically or logically independent, but at the same time to meet the computer network users authorized to video surveillance The private network system operates. The dedicated network for the video surveillance system is based on Gigabit fiber, with 100 Mbit/s copper cable as the access point, and it is reserved for future expansion capacity of 10 Gigabit. The monitoring center sets up core switches and aggregates all video data of each area and sub-control center.
The transmission architecture is the “neural network” of the network monitoring system. It guarantees the stability of the system. At the same time, its scalability should also meet the expansion of the system in the next few years. According to the above requirements, the entire network system reserves at least 50% of the system redundancy. I. At the same time, in the network design, it can cooperate with the management authority's own rights management function, use network security technologies such as VLAN and ACCESS-LIST to logically classify network monitoring points in different regions, and apply access control policies to constrain or release the resource sharing process. In the network, there may be a broken state.
In addition, considering that there may be remote users or higher-level management unit users to browse or operate on the main area network, the related configurations of network exit and exit security are designed. It is recommended that after the outreach requirements are determined, the network connection will be implemented through the router settings and the firewall will be connected. Set up to ensure internal network security.
The core layer is located in the security center room and is responsible for the data traffic exchange of the entire network video surveillance service. And you can connect to remote networks through security policies. The core switching area mainly deals with data traffic exchanges at the aggregation points. The switch should be able to perform line-rate non-blocking forwarding of all IP datagrams and be able to work without failure for a long time. Supports 10Gbps Ethernet; supports third and fourth layer hardware switching; hardware supports IPv6 routing protocol, providing support for future network upgrades to IPv6.
Access layer switches are distributed in different buildings and in different functional areas. The access layer is the most marginal part of the network and must have relatively complete functions. It supports POE power supply, VLAN technology support, hardware stacking, and uncongested switch fabric and wire-speed forwarding performance. Due to the dedicated network of dedicated video surveillance systems, all front-end network cameras are connected to the weak wiring closet. If there are restrictions on the sharing of regional resources, logic division and management can be performed by software according to customer requirements.

3, video storage system
The video surveillance storage system is an important part of the surveillance system. In the security surveillance control system, when a situation occurs, it is still not enough to only analyze and deal with emergencies by browsing the real-time images. Therefore, we need to propose a design. The system records the process of the occurrence of the alert so that it can be analyzed, handled, and identified after the incident. The importance of video recording data is undoubted. At the same time, the surveillance systems are all 7*24 hours of service and require video data to be stored and recalled at any time. Therefore, the surveillance system puts forward new requirements on the reliability, performance and capacity of the storage. Also prompted some for security monitoring storage technology.
In the campus network video surveillance program, each video surveillance video storage time is generally 24 hours * 30 days; standard definition camera video image resolution is FULL D1 (720 * 576), stream 1.2Mbps, frame rate 25 frames / sec; Megapixel gun camera video image resolution of 1280 * 720 or more, stream 2.5Mbps, frame rate 30 frames / sec. In addition, the cost-effectiveness of high-capacity hard drives in the market has gradually increased. NVR network storage devices that are currently mainstream in the storage industry and 2Tbyte SATA industrial-grade hard disks can be selected as the storage medium.

4, video display system
The construction of the modern control center room should not only be practical but also be elegant. The design of the display system is an important part of the layout of the computer room. According to how much the display and considering the future expansion need to increase the number of displays, and then design the LCD wall and console according to the size and orientation of the room. The layout of the display wall and console in the general computer room can be seen from the door of the computer room. A group of beautiful display walls prevail. The visual energy is bright. A group of consoles are arranged in front of the TV wall. The structure, etc., must look harmonized with the display wall.
The construction principle of the monitoring center room is based on the actual area and shape of the monitoring center room, strives to be beautiful, generous, and ergonomic, while fully embodying the user's specific cultural atmosphere. The principle of system control is simple and easy to learn. The system configuration and control are separated to avoid misoperation. As far as possible, a central control system with simple operation and stable system is built. When designing and selecting a video display system, we should pay attention to the fact that the display device is a part that faces people directly for a long time, so the relationship with people is closer, not only aesthetic, visual impact, but also environmental protection, in particular, can not affect Human health.
Multiple high-performance network matrices are configured in the monitoring room, directly connected to the video surveillance private network, and receiving video signals from network cameras, NVRs, and client workstations. At the same time, through the management platform client to display the design and delivery of the strategy, and the network matrix together to achieve the video screen roving, switching, combination control. In order to get close to the usage habits of surveillance management and operating personnel, we also recommend configuring a three-dimensional or two-dimensional operation keyboard so that security personnel can quickly adapt to the new monitoring system and become proficient.

5, video surveillance management system
The requirements of the integrated management platform are an open and compatible platform system that can realize digital, voice, video and other mixed management. As the core part of the monitoring system, users can build an optimal monitoring system based on the integrated management platform and combined with project requirements. Program. The integrated management platform requires development based on the C/S architecture and is compatible with the B/S architecture, enabling unlimited capacity expansion. The integrated management platform system can centralize video, audio and various data management, and integrate with systems such as access control, fire protection, security, dispatch, conference, and building automation to realize the interconnection of network video surveillance systems with other systems and various data. Associated applications.
The integrated management platform requires the expansion of basic applications based on network video surveillance. In addition to the functions that traditional video surveillance systems can achieve, it also integrates devices and functions such as network storage management systems, streaming media forwarding systems, and digital matrix systems. Achieve a multi-integrity, modular management model; and in the software and hardware aspects of the management platform, compatibility and reservation of protocols and interfaces are performed so that different systems can be seamlessly integrated to form a multi- The organic whole of system collaboration can be managed in the form of clients, browsers, etc. In the case of a smooth network, authorized users can perform management and control anytime and anywhere to facilitate system operation and maintenance.

System functions:
Monitoring function
The system can simultaneously manage more than 15,000 channels of video, supports a variety of mainstream mass storage methods; the server can be stacked and used, the number of video channels can be extended to unlimited, to achieve large-scale monitoring and management. All cameras in the video surveillance network can be monitored, recorded, and displayed in real time. Through advanced coding, storage, and transmission technologies, remote images are connected to local display, control, and storage for true remote monitoring. The
Video management
Provides three recording mechanisms for planning, manual and alarm recording. All video signals are networked and stored in a digital area using a network hard disk recorder. The megapixel video storage format is supported. The video supports multiple inquiry functions, such as querying recordings by time and pressing videos. Time query, query by event. Video playback can superimpose video-related information on images. Video playback can achieve multi-channel video playback at the same time, and supports 16-segment synchronous playback of a single video file. At the same time, when there is an incident without prior video recording, the user can immediately look back at the event occurring within the first 10 minutes. Videos exported as universal media files can be played using popular players. The
Content-based video retrieval and analysis
The user can search and analyze the video files by randomly enclosing the area to be analyzed and the custom smart recognition rules within the video screen, including abnormal entry, abnormal departure, stay alarm, disappearance, and rapid running in the area. The definition of multiple recognition rules, even in a large number of video and video files, can quickly obtain analysis results.
Electronic map function
The management system electronic map supports users to import commonly used format image files into electronic maps. In accordance with the position of the surveillance cameras, the monitoring points are marked on the map by dragging and dropping. Click on the monitoring point image to view the real-time image of the monitoring point. The camera icon in the camera can correspond to the actual surveillance point camera number and monitoring perspective. A multi-level electronic map can be clicked to monitor a building on the map, and the camera distribution map within the building can be popped up. Easy to switch between the various regions, and electronic map support alarm camera "one-click positioning" function.
Digital Matrix Function
The monitoring points can be pre-grouped and screens combined to realize automatic switching of multi-screen groupings and round robin display; the multi-screen mode can be displayed on the client in real time, and the view mode can be freely selected and customized at any time. Through the video surveillance software users can control, switch, browse all camera screens. You can also zoom in on any image to full-screen display, and perform digital amplification and digital. At the same time, the monitoring software should be able to customize and display any screen of the TV wall, and support switching any video source to a specified screen.
control function
Implement hierarchical management of control permissions, all operations can only be completed in the case of authorization, that is to say only the user with the permission can operate on the corresponding device. View monitoring screen, video playback, device control, and software settings all need to have the appropriate permissions. The control authority of the video surveillance system is controlled by the regional sub-control. The sub-control center managers can only control the cameras in this area or functional area. Can not control the signal of the master control center. The master control center is responsible for the management of all regional security monitoring throughout the day.
Linkage function
The management platform and network DVR support access to multiple channels of alarms and motion detection to achieve alarm linkage, trigger recording, sound and light alarms, snapshots, logs, SMS, voice dialing, e-mail, FTP upload, hotspots, PTZ Auto-positioning, multi-point simultaneous response and other alarm strategies; supporting alarm linkage among multiple systems such as video surveillance systems, access control alarm systems, perimeter defense systems, fire alarm systems, building automation systems, and power environment monitoring systems.
Log function
Record user logs, system logs, and alarm logs. Log management regulates logs and provides convenient query mechanisms. Users can easily find the logs they wish to view. Users can also use the subscription method to manage the logs that they are interested in. If they subscribe to a certain kind of log, then at the moment when the log is generated, they will be set according to the user's subscription and notified to the subscribers. Wherever you know about system operation and alarms.
Compatible with multiple operating systems
The management platform is based on LINUX development and the client is compatible with the Windows operating system. It can provide secondary development API interface, support common protocol, facilitate third-party application integration, and easy to expand and upgrade. It realizes the customization of applications, meets rich linkage applications, and integrates with other business systems for interactive control; it is also compatible with video capture devices of various brands and multiple compression formats.
Inspection function
In order to keep abreast of the operating conditions of the monitoring front-end equipment and maintain and monitor the front-end equipment, the browsing terminal software supports the manual inspection of the monitoring front-end equipment and the query of the automatic inspection results. The inspection includes the monitoring of whether the front-end is online and monitoring the front-end image. Whether the loss, monitoring front end is normal, and the monitoring front end with video recording function is normal video recording. If there is a device drop, power failure, or image loss, an alarm message will be generated to alert the user.

6, electronic proctor examination application
With the changes of times and ideas, coupled with frequent social activities, college students are very active in their thinking, and their attitude towards learning has also undergone tremendous changes. Even modern electronic communication tools have become candidates' curricula. What is more, individual teachers are pursuing collective cheating and other frauds in order to pursue their personal interests, which makes the fairness of the examination the focus of attention. In the traditional human invigilation can not achieve the expected purpose of the invigilator, "electronic invigilation" was confirmed as the most effective means to achieve open, fair and fair college entrance examination. The modern network electronic proctoring method is compared with the traditional proctoring method, real-time video recording can be stored, and inquiries can be made at any time afterwards, eliminating interference from human factors.

Indoor installation of two monitoring points: Install a wide-angle camera at one of the corners of the classroom in the examination room, according to the actual test, determine the widest range, the largest coverage of the best installation point, select high-definition megapixel bolt or hemisphere The panoramic view of the user can be viewed in a panoramic view of the examination room, which facilitates browsing of the examination status of the examination room as a whole, and according to the abnormal behaviors and actions of individual candidates, quickly discriminates the possible abnormal behaviors and motivations of the candidates, and responds in a timely manner; in addition, they are facing the candidate’s position in the examination room. Selecting the best installation point and installing a megapixel high-definition high-speed network dome as a monitoring point at the time of emergencies, when the monitoring center operator finds that the candidates have misbehaved, and on-site invigilators are negligent and unable to When found, you can quickly adjust the direction of the dynamic point monitoring point, lens zoom and other operations, quickly locate the suspicious candidate near the scope, you can observe the details of the action, master the candidate's true behavior, to determine whether there is suspicion of cheating or behavior, In order to quickly make appropriate measures.
At the same time, in order to supervise on-site invigilators to quickly cooperate and increase voice intercom equipment, a client workstation is installed at the examination site, wireless headphones are installed as the medium for receiving sounds, and a front-end monitoring device is additionally installed to collect live sounds. The monitoring center operator can remind the on-site personnel through the microphone. The on-site invigilator receives voice prompts through the wireless headset and quickly clarifies and handles the candidates' cheating and irregularities.
In addition, electronic prosecutors should also set up a strict authority management mechanism. If there is no strict password verification service, then artificially arbitrarily controlling the surveillance cameras may directly lead to the loss of significance of the electronic probation, which will affect the effectiveness and rigor of the exam prosecution, and may cause infringement of privacy and other disputes. Therefore, it is necessary to provide the permission and name of the online patrol user through the central management platform, and strictly define the use rights of each user, as well as the affiliation and responsibilities. Whenever a user accesses the examination site image in real time, or when viewing previous video recording materials, he or she first accesses the central management platform to perform digital rights verification, and the next operation can be performed after verification by the central management platform. And the central management platform can cascade multiple regions. It is convenient for district, city, and province to carry out permission password cascade expansion.
At present, most colleges and universities have built a relatively mature and stable campus network, and can use some of the reserved fibers in the existing campus network as the trunk line to monitor the private network, according to different distribution and monitoring points of the examination room. Concentration, reasonable allocation of access switches. The monitoring center should configure highly efficient video storage devices and complete video recording of the entire electronic monitoring process. The real-time picture of the examination site is displayed on the splicing screen through the network matrix, and the video of the wide-angle monitoring point should always be displayed. The video of the moving-point monitoring point can be used for multi-screen patrol display, and the moving point monitoring point can be operated after the abnormality is found. Do a quick fix.
Electronic invigilation system diagram:


[Case characteristics]

Electronic invigilation system features:
Easy to install, plug and play
There is no need for the cumbersome cabling as in the conventional method, as long as the existing network resources are used and the identification of the IP address can be used for any operation, and the user interface is user-friendly and the installation is simple.
Unique video preview masking
In the beginning of the examination, the system provides video preview/video masking function, shielding some video images that need to be kept confidential, improving security performance, strengthening internal and external prevention, and avoiding leakage of exam questions.
Flexible character overlay feature
Three video character superposition methods: date and time superimposition, examination room name superimposition, and test subject superposition. The location of the scene and other information can be quickly resolved by superimposing characters on the video screen.
Image capture function
It can receive image capture from the test site through the management client and the central management platform, and provide static image evidence for the anomaly that occurs on the site, making it easier to find problems and improve the accuracy of judgment.
Convenient intercom function
Through the function of two-way voice, the leaders at all levels can provide intercom functions: examination center → leaders at all levels, examination center → examination center, examination center → command center, to increase the convenience of communication.
Examination process video file interception/merge function
You can separate the paragraphs of the examination process from the video files, or you can combine multiple small video files to play and carry them in a unified manner, which is conducive to rapid analysis and processing by the Board of Education and Admissions.
Offsite storage
The video recording data of the electronic invigilation can realize remote network automatic backup. At the same time when local storage is implemented, a backup storage strategy can be set through a central management platform, and a corresponding storage device can be configured for backup storage to realize double insurance for electronic invigilation recording.
Remote real-time monitoring
It can solve centralized management and remote monitoring at the same time, and can perform remote access through the network in any corner of the network to meet the multi-level monitoring of the leadership and supervision department in the school.
Remote real-time query
It can independently provide video inquiries for electronic proctored exams. It provides query functions for multiple combinations of test points, examination rooms, subjects, etc., and provides segmented playback of video files. It can quickly locate suspicious videos in videos.
digital map
The diagram of the distribution of the examination room can be drawn in advance, and the position and angle of the monitoring point in each examination room can be marked to visually display the distribution of the examination room so as to facilitate the user to query the situation of the examination room.
Full digital electronic proctoring function
Any authorized computer inside or outside the campus can browse the situation of any examination room on the campus, realize the electronic video archiving of the entire examination, perform on-site image capture of abnormal situations, and achieve no probation.
Invigilator equipment can be locally controlled or remotely controlled
The school's electronic invigilation equipment can independently realize the local control of the terminal. At the same time, the central management platform can also centrally control recording, cloud mirror control, etc. The monitoring center has higher control authority than the local one, and has strict and authoritative nature.
System security protection
The invigilator can be prevented from illegally operating the electronic proctor. The client can be set to read-only permission and lock the client operation. The monitoring of image files is not modified by third-party software to ensure the security, real-time, and authenticity of the monitoring system.