Xingshun An access gate includes: swing gates, wing gates, three-roll gates, speed gates, full gates and other pedestrian passage gates, with access control systems, fingerprint identification systems, face recognition systems and two-dimensional code scanning systems, etc. System integration to meet user requirements, specific performance:
First, the management of access rights
1. Permissions for access to the channel: Who can enter and exit for each channel, and who cannot access it?
2. Ways of entering and exiting the channel: Authorize the person who can enter or leave the channel to enter or leave the way. There are usually three methods: password, card reading (biometric identification) and card reading (biometric identification + password).
3. Time slot for entering and exiting the channel: Set the time zone within which people can access the channel.
Second, the access record function
1. The access control system should record the time and place of personnel access and abnormal conditions
2. The door is trespassed, the door is not closed, fire linkage, etc.). This record serves as historical data and can be used by management personnel for inquiries and references when necessary. The corresponding software can be used to implement attendance, online patrol, and access control card.
3. Real-time monitoring function The system administrator can view the entrance and exit conditions of each door area, the status of each door area (including the switch of the door, all kinds of abnormal state alarms, etc.) in real time through the computer; it can also open all in the emergency state. The door area.
4. Abnormal alarm function In case of abnormality, it can realize the alarm of the microcomputer or the alarm of the alarm, such as illegal intrusion, door overtime not being closed and so on.
5. Fire alarm monitoring linkage function In the event of a fire alarm, the access control system can automatically open all electronic locks to allow people inside to escape at any time. Linkage with surveillance usually refers to the fact that the monitoring system automatically records someone's credit card (valid/invalid) and records the situation at the time of the alarm in the access control system.
6. Network configuration management and monitoring functions Most access control systems can only be managed by one computer. Advanced technology systems can set up monitoring and management of the entire system at any authorized location on the network, and can also use the Internet to perform off-site operations. Set up management monitoring queries.
Kiln For Gold Extraction
The device has the following characteristics:
1.Wide application field: the device can regenate various types of activated carbonon by adjusting the angle and rotational speed of furnace pipe.
2.Regeneration activated carbon in the oven retention time 40 minutes, which is applicable to the regeneration levelofall kinds of grain particles, for coal activated carbon also has good regeneration effect.
3.High degree of automation:the device operation achieves automatic control,with man-machine interface+Intelligent instrument control,reduces the operating workers and the labor intensity is low.
4.High recovery rate of Iodine value:basically returned to a new carbon levels above 90%.
5.Low carbon loss:≤1-2%(Coal carbon)But slightly higher than the JHR-O series activated carbon fuel diesel reclamation equipment
6.Easy installation, covers an area slightly larger, but the small space height requirements, large installed power.
Long service life:The core components furnace tube using thick wall (10 mm thick) 1200 ℃ high temperature resistance, corrosion resistant special stainless steel pipe.