catalogue
Eye-catching commentary
Myths and legends
The Monkey King quotes comments.
Brief introduction of remote monitoring management system
Characteristics of the system
Authority management function
Main business functions of the system
Eye-catching commentary
Myths and legends
The Monkey King quotes comments.
Brief introduction of remote monitoring management system
Characteristics of the system
Authority management function
Main business functions of the system
Expand and edit this paragraph.
translate freely
(Hu ǒ y ǒ n j ǒ ng) Humorous eye patch with a "critical eye"
Explanation: eyes: eyes, eyes. Metaphor sharp-eyed, can distinguish between true and false. Source: Wu Ming Cheng En The Journey to the West's 40th time: "My old grandson is quick-sighted and knows good or bad." Use: combined; Become an object; An example of people's keen eyes and insight into everything: Xi Chun's "Jing Ge Lei Da Bing": "From the eyes of a pair of hunters, I recognized a wolf posing as a sheep."
Myths and legends
Golden eye is not a patent of the Monkey King. The earliest owner of golden eye was Wang Lingguan. According to the biography of immortals in Ming and Qing Dynasties, Wang Lingguan was originally named Wang Xie, the god of Fuliang Temple in Xiangyin. Because he swallowed boys and girls alive, he was a disciple of the thirtieth generation of real people in Xihe, and he burned the evil king into a golden eye. Wu Cheng'en, the author of The Journey to the West, created a pair of critical eyes for the Monkey King Lingguan, so he created the unexpected harvest of the Monkey King forging in the gossip furnace of Taishang Laojun. The Monkey King often said that his old grandson has a critical eye and can recognize monsters, but can the Monkey King really recognize monsters with a critical eye? Actually, I can, but I can't identify what kind of monster it is. Wukong's eye-catching way to identify monsters is to look at clouds. He can clearly see the auspicious clouds on the Tang Priest's head and the evil spirits on the monster's head. This is impossible for Tang Priest, Pig Bajie and Friar Sand. Therefore, Wukong can often see at a glance whether he is a monster, a fairy or an ordinary person standing in front of him. Only once did I miss my eyes, and that was when Niu Wangmo turned into a pig and cheated the banana fan away. Later, Wukong himself admitted that the reason for his failure was that he didn't plan ahead after his success and didn't notice the clouds, so he took the road of Niu Wangmo. So as long as Wukong pays attention, it is impossible for the monster to stand in front of him without being seen through. The disadvantage of eyes is that they can't see the real shape of monsters, and they have to run around every time to ask about the origin of monsters. The Monkey King can't be blamed. Tathagata Buddha works miracles. There are monsters who can't descend, such as the green ox essence that stole the old gentleman's diamond bracelet, and the Monkey King in the palm of Tathagata Buddha can't be turned out. He only spent 7749 days in the gossip furnace. So "golden eye" is a myth and legend, which is usually used as a metaphor now. It has a keen eye and can see the truth clearly.
Edit this paragraph and the comments quoted by the Monkey King.
Please see how many monsters the Monkey King recognized and how many mistakes he made in the whole journey to the West. Can see the change of the monster, that is to say, as long as it is not the monster's original body, as long as it is changed, the Monkey King should be able to identify it. 1. The 27th time, the monster: Bai took a critical look and was transformed by Bai for three times. You know Bai's contribution to change is so poor that he has to rely on other people's bodies. In principle, this is not called change, but "rebirthing", a trick that ordinary children can do. 2. The monster of the 39th time: Manjusri Bodhisattva mounted it, and the green lion didn't work. The monster turned into Tang Priest, and Wukong couldn't recognize it. It was Pig Bajie who suggested asking the master to recite a spell, and was later taken away by Manjusri Bodhisattva. 3. The forty-ninth time, the monster: the king of the senses, the goldfish raised by Guanyin Bodhisattva Lotus Pond is ineffective. Wukong couldn't recognize the monster. The psychic king must have changed. The original body can't be like this. 4. Back to the fifty-second time, the monster: the golden Pokemon, the old man's green cow, is ineffective, and the monster has changed into a human form. It's definitely not the original body of the green cow. Wukong can't know. Please look with your eyes in the future. If Wukong can see that it was transformed by a green cow and know himself, he will probably think of who its owner is. 5. Back to the fifty-seventh session, the monster: Monkey Liu, golden eye is invalid, and Wukong obviously can't see that the fake Wukong is Monkey Liu, otherwise the only one who can show his true colors is Tathagata, and I'm afraid Wukong would have shouted away. 6. Go back to 6 1. Monster: Niu Wangmo, golden eye is invalid. The old cow turned into a pig and cheated Wukong of his banana fan, but Wukong didn't see it. 7. The 74th time, Venus is too white and golden eye is invalid. Li Changgeng turned into an old man to deliver letters, but Wukong didn't recognize him. He also boasted that he was 10,000 seven or eight years old, and the immortal was still his junior. 8. Back to the 95th time, the monster: Jade Rabbit, the eyes of fire and gold are invalid. Wukong obviously didn't know that the fake princess was a rabbit. Throughout the journey to the west, the only change Wukong can see is probably the white "rebirth" solution. Others like spider essence, scorpion essence, rat essence, etc. I wonder if I can see it. Later generations often use golden eyes to describe sharp eyes.
Edit the remote monitoring management system in this section.
System introduction
"golden eye" remote video integrated application system is a remote video integrated application system independently developed by Xiamen Netscape Network Technology Co., Ltd. This system takes H.264 digital video coding technology as the standard, and combines multimedia video technology, computer network technology, industrial control technology and artificial intelligence technology to realize network and intelligent management of the system, so that users can remotely monitor the scene of monitoring points by logging in to the Internet wherever they are, and at the same time realize "one-to-one" and "multi-point" functions.
Characteristics of the system
(1) Windows operation interface is simple and powerful, and supports local and remote real-time video recording, picture capturing, remote playback video recording, pan/tilt control, camera zooming and HD switching. (2) The network has strong applicability and interoperability, and is suitable for various Internet access modes. The video server of the monitoring point can only access the Internet, and there is no need to have a fixed IP or install dynamic domain name resolution software. (3) The image is clear and the remote online video is smooth. Self-developed image compression algorithm and image transmission mode are adopted, and the frame rate of image transmission reaches 1-30 frames per second; The file size of hourly video recording is only 10-30M. (4) Unique automatic reconnection function of dropped line ensures smooth image transmission channel. (5) D, ID check code, password triple protection and data stream encryption technology are safe and reliable. (6) Multi-channel video input, supporting multi-card function for one machine. (7) The center can monitor multiple monitoring points at the same time, or multiple users can monitor one monitoring point at the same time. (8) It is compatible with most closed-circuit monitoring equipment such as pan/tilt, decoder and camera on the market, and can be upgraded remotely on the basis of the original security monitoring system without repeated investment. (9) Support mobile phone browsing. (10) provides the monitoring point user authorization function, and realizes the control of the monitoring point browsing authority (which can be customized according to the specific needs of users). (1 1) provides powerful secondary development (SDK) support, and the system can be embedded in other application systems. (12) The later maintenance is convenient and simple. People with basic computer knowledge can complete daily maintenance.
Authority management function
Golden eye remote video integrated application system is a networked monitoring software. While using the network for comprehensive management, users need to be classified for security reasons, so that they can enjoy different rights and assign different tasks. Unauthorized users are prohibited from accessing. According to the different rights and importance enjoyed by users, users of "eye-catching" remote video integrated application system can be divided into system administrators and ordinary users. ● System administrator, also known as super user: the administrator of the entire "eye-catching" remote video integrated application system. As a system administrator, in addition to all the rights enjoyed by ordinary users, they also enjoy the management rights that ordinary users do not have, that is, to manage and supervise ordinary users and monitor, control and maintain equipment. ● Ordinary users: users of "eye-catching" remote video integrated application system. Under the authority assigned by the system administrator, they use the equipment within the authority to monitor the designated sites within the authority. Users can only access within the specified range. Users with different levels of parent organizations have priority control, and users with the same level are controlled on a first-come-first-served basis.
Main business functions of the system
1) local/remote image parameter adjustment function: users can monitor the video image of the camera in real time through the local client/remote web page, and adjust the parameters of the video image such as brightness, contrast, saturation, hue, equipment, size, frame rate, quality, time superposition, and self-startup, so as to meet the different needs of users for video images. 2) Local/remote pan/tilt control function: The user controls the rotation of pan/tilt through the pan/tilt control button on the local client/remote webpage, so as to control the up/down/left/right rotation of the camera, gradually move the camera, continuously move the camera and stop moving the camera, and truly realize all-round monitoring. 3) Local/remote real-time video recording and image capturing function: users can record and capture video images at any time period in real time through the video recording and image capturing function menu of local client/remote webpage. 4) Video window lock/unlock function: This function mainly encrypts and locks the monitoring computer and screen to prevent other non-monitoring personnel from misoperation, and at the same time, it can also prevent others from using the monitoring computer to do other non-monitoring things. Only authorized users can enter the account password to unlock the monitoring computer and screen. 5) Remote video playing function: Users can remotely call current and past videos and play them through the "video playing function" on the remote webpage. 6) Remote server video backup function: (server side) In order to prevent the data on the user's local computer from being lost or stolen, this system backs up the data on the remote server for the user. If the video is backed up, the user can remotely call the backed-up video through this function. 7) User's personalized template setting and viewing function: Users can set their own video window templates according to their own actual conditions, without having to set them repeatedly every time they run the program. 8) Camera opening time limit function: users can set different opening times for different cameras. When the sub-account logs in, you can only see the video of the authorized camera during the specified opening hours. 9) High-definition image effect function: users can choose the display effect of high-definition images according to their personal needs, so that the presented video images are clearer, and users' needs for different video effects can be met by switching between high-definition and non-high-definition. 10) The main account of the monitoring point authorizes the sub-account to browse: the sub-account is based on the main account, and the main account is equivalent to the administrator. When the main account authorizes the corresponding node to the sub-account, the sub-account can log in to view the surveillance video on the corresponding authorized node, but the sub-account only has browsing permission and has no right to modify the video information on the authorized node. 1 1) Remote assistance function (remote support, desktop sharing and file transfer): This function mainly relies on the function of TeamViewer, which can penetrate the intranet and realize remote support, desktop sharing (demonstration), file transfer and VPN functions in the background of any firewall and NAT agent.