Ten years of craftsmanship, a hundred years of promise.
|Place of Origin:||Guangdong, China|
|Minimum Order Quantity:||1 set|
|Packaging Details:||Carton and wooden case. Wooden case is suggested with extra charge but safer.|
|Delivery Time:||7-10 work days|
|Payment Terms:||L/C, D/P, T/T, Western Union|
|Supply Ability:||6000 Piece/Pieces per Month|
|Special Features:||Thermal Image, Temperature Measurement||Customized Support:||Software Reengineering, OEM, ODM, Customized Logo, Online Technical Support|
|Security:||Heigh Leve||Storage:||Memory 1GB, Data Storage 8GB|
|WIFI:||Support (Selected)||Recognition Distance:||0.5-2M|
|Recognition Time:||<300ms||Privacy:||Appropriate Privacy Policies|
OEM Access Control Terminal,
ODM Access Control Terminal,
Customized access control facial recognition
|Installation site||Wall installation, gate installation|
|Working temperature and humidity||-15℃ to 55℃,<90℃RH|
|CPU||RV1109 2 core 1.5GHz|
|Storage||Memory 1GB, data storage 8GB|
|Display screen||7-inch high-definition IPS LCD screen, resolution 600*1024|
|Camera||200W binocular live camera|
Three-color fill lightInfrared fill light
|Speaker||1 way speaker|
|Watchdog||Support hardware watchdog|
|Recognition performance||Recognition distance||0.5-2M|
|Face library capacity||1:N,N<=20000|
|IC/ID card recognition||Support USB swiping module/serial swiping module (optional)|
|ID card recognition||
Supporting witness comparison(Support central control, Huashi USB interface universal protocol ID card reader)
|Connector||Power connector||DC12V x 1|
|USB connector||USB2.0 x 1|
|Relay output||Switch output x 1|
|RJ45 network cable interface||Ethernet port x 1|
|Wiegand output interface||Wiegand output x 1|
|Alarm input||Alarm input x 2|
|Working environment||Power supply||DC12V 2A|
|Temperature measurement performance||Temperature measurement distance||0.3-1.0M|
|Temperature measurement error||±0.3℃|
|Working environment||Indoor, semi-outdoor|
1. Adaptability: Face recognition technology is adaptable to different environments, lighting conditions, and camera angles, making it suitable for use in various settings.
2. Scalability: Face recognition technology can be easily scaled up to accommodate large user bases, making it suitable for use in enterprise and government applications.
3. Privacy concerns: Face recognition technology has raised concerns about privacy and potential misuse of personal data, as it involves capturing and processing biometric data. Appropriate privacy policies and regulations must be in place to ensure that the technology is used ethically and responsibly.
4. False positives and negatives: Like any biometric technology, face recognition is not infallible and can result in false positives (when an individual is incorrectly identified as authorized) or false negatives (when an authorized individual is not recognized).
5. Training and maintenance: Face recognition technology requires ongoing training and maintenance to ensure that it continues to perform accurately and reliably.
Contact Person: Betty