LOGO Electronics security ING. El Kalamouni Samer.

Slides:



Advertisements
Similar presentations
RFID Access Control System March, 2003 Softrónica.
Advertisements

INTRUSION ALARM TECHNOLOGY
CLOSED CIRCUIT TELEVISION (CCTV) SURVEILLANCE SYSTEMS
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Chapter 5 p. 6 What Is Input? What is input? p. 230 and 232 Fig. 5-1 Next  Input device is any hardware component used to enter data.
EMI Systems Limited specializes in CCTV surveillance systems that ranges from stand-alone cameras to fully integrated security control centers and to the.
Biometrics U.S. Government Site Intro Layered vs. Multimodal Measurement Accuracy Voiceprints Iris Scanning Vein Geometry DNA Gait Facial.
BIOMETRICS The Issue of Privacy in an Increasingly Secure World By: Joanna Moser.
Contact Us | Free Phone | W: Ask Us About Our Wireless.
Digital Surveillance. Danish Software Company specialized in development of security solutions. Started in year 2000 with HQ in Copenhagen. All solutions.
Surveillance camera in terms of business. Index *surveillance systems * Types of control systems * Elements of control systems * Types of monitoring camera.
DUE Security and Fire Alarm Systems LEARNING OUTCOME 7B Describe design overview and location considerations.
Input devices, processing and output devices Hardware Senior I.
Adapted from CTAE Resources Network PROFITT Curriculum Basic Computer Skills Module 1 Hardware.
Brendan Cooney CSC 152. What is Input? Any data or instructions entered into the memory of a computer Data- unprocessed information Instructions- steps.
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Bus. Computer Applications Supervised by: t. Ahmed Abu msameh Prepared by Mohammed fathi al – amawi ID : CCTV systems.
1 CCTV SYSTEMS PAN, TILT AND ZOOM CAMERAS. 2 CCTV SYSTEMS A PTZ camera is a pan, tilt, and zoom camera that is different from a fixed dome camera in that.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Karthiknathan Srinivasan Sanchit Aggarwal
1 Alpha Emissions (How a Smoke Alarm Works). 2 Radioactive Emissions (Radiation) Penetrating Power SymbolEquivalentDescriptionType He Stopped by thick.
Input technologies All require some form of data acquisition –e.g. Image scanner, Microphone Once acquired, if the signal is not already digital, it will.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
SuperSleuth Wise. Marketing and Sales Presentation/Training.  Complete video surveillance system in the palm of your hand.  Proven video motion Detection.
Wired Home Security Technologies Wired alarm systems require basic electrical wiring that extends from the control panel and keypad to door and window.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
1 LOW CURRENT  FIRE & SAFETY………………………………. 1) Fire Alarm ( EDWARDS ) Smoke, Heat and GAS detectors connected to audible and visual devices to convey the.
AirGuard Know who you’re flying with. AirGuard Know who you’re flying with Click Here.
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Physical security By Ola Abd el-latif Abbass Hassan.
Physical Security By Nathan Conroy COSC Outline Purpose of physical security Two types of physical security Different types of security devices.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Automatic Data Capture  Process where many techniques are used to automatically collect data without need for manual entry. Manual entry has following.
An Introduction to Biometrics
CCTV - Security Cameras
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Introduction to Input Devices. Input Devices Units that gather information and transform that information into a series of electronic signals for the.
Edited by : Huda Al-Omair
enterprise Software Solutions Lab Pvt Ltd
Standard Input Devices
Fingerprint Sensor Market Demands
Nexbase Invites You To Our Special Products
Hearty Welcome!.
Lesson 4 Alternative Methods Of Input.
A device tat transfers data from the outside world into a computer
Input and Output Devices
2N® Access Unit Touch Keypad
2N® Access Unit Fingerprint reader
Introduction to Computing
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
The concept behind Smoke Detectors. DONE BY MAXINE LIVERAS.
Feature Benefit Feature Benefit Feature Benefit Feature Benefit
Chapter 5 - Input.
Lesson 4 Alternative Methods Of Input.
2N® Access Unit Touch Keypad
CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN (CPTED)
A SEMINAR REPORT ON BIOMETRICS
Computers Are Your Future
Presented by: k.ramya krishna
2N Access Unit 2.0 Multi-technology access control readers.
X7– Fingerprint Access Control terminal
Presentation transcript:

LOGO Electronics security ING. El Kalamouni Samer

LOGO Security Systems  Security is the condition of being protected against danger, loss, and criminals.

LOGO Difference Disjuncture Contents CCTV Access Control Intruder detector Alarm Security Systems

LOGO Difference Disjuncture GFCI The role of difference disjuncture: - Protection circuits against over-current due to overload or short circuit. -Protection of persons against indirect contact (current leakage to ground).

LOGO Difference Disjuncture GFCI The differential switch The differential relay The subscriber circuit

LOGO The differential switch  He created a monitoring circuit and does not cut it in case of leakage current to ground. Level of immunity: 200A peak following periodic wave 8 / 20 microseconds. Operating voltage 230 V. Mechanical life cycle (on-off):

LOGO  CCTV(Closed Circuit Television Cameras) camera systems give the user the ability to observe several areas of a home or workplace simultaneously. These images can also be recorded on a digital video recorder or a network video recorder; either being very useful in the instance of an unfortunate event or crime. CCTV

LOGO Choice of Camera ♦ Indoor or Outdoor? ♦ Lighting conditions (during day and night)? ♦ Mounting locations? Types des cameras :  Indoor Dome Camera  Outdoor Dome Cameras  Box Camera  Day/Night Camera  Infrared Camera  PTZ Camera (Pan-Tilt-Zoom camera)

LOGO

Biometric technology Access Control Vein Geometry Finger Print Reader FaceKey HandKey Iris scanning

LOGO Proxy Reader I

LOGO Fingerprint  Cards can be stolen, replicated or shared.  fingerprints identify the authorized person, which ensures the highest level of security.

LOGO FingerKey Biometric Fingerprint Reader Time Clock with Fingerprints Fingerprints& Facekey

LOGO Biometric Fingerprint Reader

LOGO

LOGO Time Clock with Fingerprints Benefits and Features:  Easy installation  Connects directly to the local area network  Red and green status indicators  Equipped with fingerprint reader and keypad  Utilizes optical fingerprint reader  Acknowledgment of acceptance: LED indicator, display indication and voice reply  Includes extensive configurable business rules  Many ways to identify: ◊ Fingerprint only ◊ Card + Fingerprint ◊ Password +Fingerprint ◊ Card only

LOGO biometric one door locked  There are three ways to unlock the door: o Pin + fingerprint, o Pin only o mechanically by using the special key which is supplied.  When ordering specify either a left or right handed door lock model.

LOGO Access Keypad With Fingerprint Reader

LOGO When networking readers you are only required to enroll on a single reader, your template is then passed to all other readers.

LOGO Facekey Biometric  Verifications time : Less than 1 sec

LOGO Face key & fingerprint reader  Obtain the highest levels of security by combining multiple biometric devices.  Comes complete with camera and fingerprint.  Connects directly to a local area network.

LOGO Hand Key biometric access Captures a three dimensional image of the hand using a 32,000 pixel image array. The 90 measurements including the lengths, widths, thickness and surface area of the fingers and hand are taken. hand geometry and finger fingerprint biometric technology.

LOGO Iris Scanning  Iris scanning measures patterns on the colored part of the eye - the iris.  your eye is 3 to 10 inches from the camera.  When the camera takes a picture, the computer locates:  The center of the pupil.  The edge of the pupil.  The edge of the iris.  The eyelids and eyelashes.  They also allow more than 200 points of reference for comparison, as opposed to 60 or 70 points in fingerprints.

LOGO Speaker recognition systems use Spectrograms to represent human voices Biometric voiceprints  the data used in a voiceprint is a sound spectrogram, not a wave form.  A spectrogram is basically a graph that shows a sound's frequency on the vertical axis and time on the horizontal axis.  Different speech sounds create different shapes within the graph.

LOGO Vein geometry Vein scanners use near-infrared Light to reveal the patterns in a person’s veins.  To use a vein recognition system, you simply place your finger, wrist, palm or the back of your hand on or near the scanner.  The hemoglobin in your blood absorbs the light, so veins appear black in the picture.

LOGO

Security Systems Intruder detector PHOTOELECTRIC DETECTOR LV-H62F Laser

LOGO LV-H62F Detecting the Transfer of Two Copper Plate With its powerful laser, the LV Series can reliably detect thin targets at long distances.

LOGO PHOTOELECTRIC DETECTOR

LOGO Alarm security systems security CO detector Fire alarm Smoke detector Heat detector Gas detector Wireless security systems

LOGO Alarm Security Systems

LOGO Alarm Security Systems 2- types of smoke detectors (smoke alarm): the optical detector ion detector

LOGO Alarm Security Systems  An optical sensor uses a straight line of light from the transmitter to receiver.  In the presence of smoke the amount of light received by the receiver and decreases the electronic alarm is initiated.  the optical detector:

LOGO Ion Detector - Americium: radioactive element - source of alpha particles ionize the atoms of oxygen and nitrogen in the air in the room. -Free electrons (charge -) to + plate Positive ions (+ charge) to the plate – -Appearance of a weak electric current and constant between 2 plates detected by the sensor electronics. -The presence of smoke in the room break the current (smoke particles absorb alpha particles and thus reduce the ionisation). -The smoke detector point deficit in current between the 2 plates and spear the alarm Electronics.

LOGO Detector temperature : Responds to changes in ambient temperature. -Appeals manual: A handful down the electrical circuit is closed which activates the alarm handle is locked in position for activation.

LOGO Alarm Security Systems  Gas Alarm Largely used in various industries, we manufacture and offer area gas alarms. These alarms come with audio and visual alarm indicators. These alarms have LED displays that are bright and hence easy to read. 4 Gas Detector 6 Gas Detector

LOGO Wireless alarm systems wireless alarm systems are designed for homes where traditional cabling is difficult. The wireless system also would eliminate many false fire alarms, because telephone line problems cause half the false alarms in some communities.Wireless alarm systems are available where it may not be possible to install the electrical wires required for the other types of systems.

LOGO Edit your company slogan