{"id":123,"date":"2023-11-08T01:45:53","date_gmt":"2023-11-08T01:45:53","guid":{"rendered":"https:\/\/demo2wpopal.b-cdn.net\/karpart\/?page_id=123"},"modified":"2025-06-05T05:58:43","modified_gmt":"2025-06-05T05:58:43","slug":"about-us","status":"publish","type":"page","link":"https:\/\/demo.sososothemes.com\/B2B\/061\/?page_id=123","title":{"rendered":"About Us"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"123\" class=\"elementor elementor-123\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d570f8e e-flex e-con-boxed e-con e-parent\" data-id=\"d570f8e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d437094 elementor-widget elementor-widget-woocommerce-breadcrumb\" data-id=\"d437094\" data-element_type=\"widget\" data-widget_type=\"woocommerce-breadcrumb.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<nav class=\"woocommerce-breadcrumb\" aria-label=\"Breadcrumb\">Home<\/nav>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-45c3a90 e-flex e-con-boxed e-con e-parent\" data-id=\"45c3a90\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a15f4e7 elementor-widget elementor-widget-text-editor\" data-id=\"a15f4e7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>About Us<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-821660e e-con-full e-flex e-con e-child\" data-id=\"821660e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-af3776d elementor-widget elementor-widget-heading\" data-id=\"af3776d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">About Us<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c83704c elementor-widget elementor-widget-heading\" data-id=\"c83704c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Catering to your requirements, handling your needs with care<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d187636 elementor-widget elementor-widget-text-editor\" data-id=\"d187636\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The intelligent security monitoring system refers to the use of image processing, pattern recognition and computer vision technology. \u00a0<br \/>By adding the intelligent video analysis module in the monitoring system, using the powerful data processing ability of the computer to filter out the useless or \u00a0<br \/>interference information of video images, automatically identify different objects, and analyze the key<br \/>of the extraction of video sources.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96b78b2 elementor-widget elementor-widget-image\" data-id=\"96b78b2\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"450\" height=\"300\" src=\"https:\/\/demo.sososothemes.com\/B2B\/061\/wp-content\/uploads\/2025\/06\/ded1e5a1c02e5ce576de2d1772812fc.png\" class=\"attachment-large size-large wp-image-13213\" alt=\"\" srcset=\"https:\/\/demo.sososothemes.com\/B2B\/061\/wp-content\/uploads\/2025\/06\/ded1e5a1c02e5ce576de2d1772812fc.png 450w, https:\/\/demo.sososothemes.com\/B2B\/061\/wp-content\/uploads\/2025\/06\/ded1e5a1c02e5ce576de2d1772812fc-300x200.png 300w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78be017 elementor-widget elementor-widget-text-editor\" data-id=\"78be017\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It uses information to quickly and accurately locate the scene of the accident, judge the abnormal situation in the monitoring<br \/>picture,and send out the alarm or other action with the fastest speed and the best way, so as to effectively carry out the automatic real-time intelligent monitoring system, which is pre warning, handling in the event, and taking evidence in time after the event. In a simple way, intelligent security monitoring is the work of computer instead of part of the human brain. It can analyze and judge the monitored images automatically, and send out early warning when abnormal, and change the monitoring system to get rid of artificial intervention and the &#8220;post Zhu Geliang&#8221; role that can only be<br \/>recorded as a scene.<\/p><p>When selecting the smart security monitoring system or products, security engineers should pay attention to the following key points:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d2c435 elementor-widget elementor-widget-heading\" data-id=\"7d2c435\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">See whether the product is certified by quality<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2234601 elementor-widget elementor-widget-text-editor\" data-id=\"2234601\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><br \/>The choice of products for security contractors depends on whether they are qualified products certified by quality and whether they meet the requirements of electromagnetic compatibility (EMC). We can not choose the product of non quality authentication because of the greed and cheap, otherwise not only the project can not pass the final acceptance, cause the meaningless waste, more importantly, delay the time and affect the safety.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4325a37 elementor-widget elementor-widget-heading\" data-id=\"4325a37\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">The domestic products are the same in the country, and the domestic products are.<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bac5a89 elementor-widget elementor-widget-text-editor\" data-id=\"bac5a89\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>When the security contractors are buying and buying products, we should first check whether domestic security enterprises have the corresponding<br \/>products to meet the needs. If the domestic products are not satisfied with the necessary intelligent products, they should choose to buy foreign products.<br \/>If domestic and foreign products are comparable in performance, they should choose products from domestic enterprises to support and promote the development of domestic ethnic enterprises.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>About Us About Us Catering to your requirements, handling your needs with care The intelligent security monitoring system refers to the use of image processing, pattern recognition and computer vision technology. \u00a0By adding the intelligent video analysis module in the monitoring system, using the powerful data processing ability of the computer to filter out the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-123","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/demo.sososothemes.com\/B2B\/061\/index.php?rest_route=\/wp\/v2\/pages\/123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/demo.sososothemes.com\/B2B\/061\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/demo.sososothemes.com\/B2B\/061\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/demo.sososothemes.com\/B2B\/061\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/demo.sososothemes.com\/B2B\/061\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=123"}],"version-history":[{"count":348,"href":"https:\/\/demo.sososothemes.com\/B2B\/061\/index.php?rest_route=\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":13225,"href":"https:\/\/demo.sososothemes.com\/B2B\/061\/index.php?rest_route=\/wp\/v2\/pages\/123\/revisions\/13225"}],"wp:attachment":[{"href":"https:\/\/demo.sososothemes.com\/B2B\/061\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}