1 SITRONICS KASU, 2013 Comprehensive security system for strategic facilities (1/2) Border protection Checkpoint control Personal identification and access.

Slides:



Advertisements
Similar presentations
SensMax People Counting Solutions Visitors counting makes the most efficient use of resources - people, time and money, which leads to higher profits in.
Advertisements

Johan de Clerk 14 June 2012 Smart Cities from a Civil Security Perspective.
A new Network Concept for transporting and storing digital video…………
Mark Heggli Consultant to the World Bank Expert Real-time Hydrology Information Systems Workshop Module 4: Data Management Solutions for a Modernized HIS.
Tel: Unique Home Security Systems Security Supplies Captures Boards Digital Video Recorders Power Line Communication Wireless Solutions.
EMI Systems Limited specializes in CCTV surveillance systems that ranges from stand-alone cameras to fully integrated security control centers and to the.
Tsunamis Detection The Mission  Tsunamis Detection can help to minimize loss of life and property from future tsunamis. Mission Introduction Mechanism.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Axis Intelligent Video Intelligence where you need it.
A Guide to major network components
References. Moscow SafeCity Over 175,000 CCTV cameras in Moscow, controlling over doorways and mass circulation areas in ten districts. Vandal-resistant.
Eagle Vision 24/7 security system Day - Night - Dark.
Technical solution presentation AVL System for Fire Brigades.
Tel: Unique Home Security Systems Security Supplies Captures Boards Digital Video Recorders Power Line Communication Wireless Solutions.
Motion detector ​ Bikesh Shrestha ​ Ari Rajamäki.
Overview Presentation MKT-CODE-P-001E. Introduction Single Channel Codec designed to increase the flexibility of NetVu Connected analogue/IP CCTV networks.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Case Study Portable Wireless Network for Emergency Response.
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
Smart Cities & Smart Utility
EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.
Video Management Control-Bit Technologies video system manages various types of video inputs; analog or digital, originated in both analog & IP cameras,
How to Integrate a WiFi Network for Mobile Devices
Management Information Systems Lection 04 Networks CLARK UNIVERSITY College of Professional and Continuing Education (COPACE)
1 Virtual Police Security System & Management Control May 2003.
SCADA FOR WATER DISTRIBUTION IC DEPT. GECGn SEC28.
VIKING Workshop – Hamburg, DE, March 2007 Best Practices in Monitoring Deployment, Hamburg, Germany Innovation in Monitoring VIKING Workshop “Best.
Presented by Amira Ahmed El-Sharkawy Ibrahim.  There are six of eight turtle species in Ontario are listed as endangered, threatened or of special concern.
The Utilization of GIS Technology at Northeastern REMC Presented By: Steven Weber, GISP Northeastern REMC (260)
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
Modern Software Engineering for Distributed Embedded Systems Joseph Voelmle, Carlos Daboin, Joanne Sirois, Josh Gallegos Mentor: Dr. Janusz Zalewski.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
Computational Mechanics and Robotics The University of New South Wales
Introduction + irastah proposes a cost effective method of tracking a human's mobility using two technologies.
Radar Video Surveillance
Omsk Manufacturing Association named after A.S. Popov Connecting Generations.
© ABB PP&PS FES Italia October 20, 2015 | Slide 1 Advanced solutions for solar plants Sergio Asenjo, Head of Solar Center of Competence, June 10th 2010.
Topics of presentation
TELEPHONE NETWORK Telephone networks use circuit switching. The telephone network had its beginnings in the late 1800s. The entire network, which is referred.
SENSOR NETWORKS BY Umesh Shah Mayuresh Patil G P Reddy GUIDES Prof U.B.Desai Prof S.N.Merchant.
Broadband Access Solutions via Satellite Sergey Eleferov Russian Satellite Communications Company Satellite Communications Centre “DUBNA”
Remote control of locks. WagnerT/MilbradtT S2S2  In the past: lock control on site  Now: Lock control via remote control  Usually four locks.
Chapter2 Networking Fundamentals
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Advanced solutions for solar plants Milan Infracon, Head of Solar Center of Competence, June 10th 2012 © MIPL SOLAR PLANT December 14, 2015 | Slide  Sergio.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
August 2003 At A Glance The IRC is a platform independent, extensible, and adaptive framework that provides robust, interactive, and distributed control.
LBS Division INDOOR POSITIONING SYSTEM Indoors Independent infrastructure that communicates via wireless connection standards: RFID Technology: Continuous.
Name Of The College & Dept
BORDER SECURITY USING WIRELESS INTEGRATED NETWORK SENSORS (WINS) By B.S.Indrani (07841A0406) Aurora’s Technological and Research Institute.
Example source Internet EyeDent Car/100 ‘’On The Go’’ Project Example source Internet The Unique Mobility Surveillance and Reconnaissance Solution for.
ARM and GPS Based Transformer monitoring system with area Identification Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Overview Presentation MKT-DSRV-P- 001E. Product Overview Network based video transmission product with on-board digital recording Allows analogue fixed/PTZ.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
SCADA Supervisory Control And Data Acquisition Pantech Solutions Here is the key to learn more.
Engineered Security Systems, Inc. Access Control Systems CCTV Systems Asset Protection Systems Fire Alarm Systems Laptop Protection Systems Burglar Alarm.
Presentation of equipment.
Fundamentals of Information Systems, Sixth Edition
R&S®ARDRONIS Automatic Radio-controlled Drone Identification Solution
PARKING AUTOMATION SYSTEM
Communications in Railway Centralized Traffic Control Systems
How SCADA Systems Work?.
Data Management Solutions for a Modernized HIS
CORPORATE PROFILE JUNE 2016
Wavestore Integrates… OptaSense Acoustic Fibre & PIDS
Student’s Name with USN No.
2nd Floor AMWSLAI Building Bayani Road, AFPOVAI Bonifacio Global City, Taguig 1634 phone: (+632) – 65 | Mobile Nos. (smart) | (globe)
Presentation transcript:

1 SITRONICS KASU, 2013 Comprehensive security system for strategic facilities (1/2) Border protection Checkpoint control Personal identification and access control Identifying sick and infected people Detecting forbidden substances Defence of sea borders and other borders Crime prevention Situation Centre All subsystems would operate in a single information field. Events occurring in one subsystem can cause a response from another one. For example, a video surveillance camera acquiring a target may cause another subsystem to switch on the projector, lock a door or broadcast a message from the emergency response services. The system can be controlled from any point of the system, using operator console or local control panels anywhere in the world.

2 SITRONICS KASU, 2013 Comprehensive security system for strategic facilities (2/2) The software allows for some flexibility in setting the imperatives (the rules automatically followed by the system). Flow charts and diagrams let the operators monitor the condition of the security system and control it using interactive icons. Distributed network architecture provides for creation of flexible and efficient systems of any scale, while the entire system could be configured from one point. All elements of the system, including autonomous controllers and servers, have extensive back-up functions, making it possible to build a system with any level of reliability. A comprehensive security system can provide for truly large security systems comprising thousands of video surveillance cameras and access points and tens of thousands of security sensors. All this equipment would operate in a single information field that could be controlled and monitored from any of dozens of operator workplaces. Since the equipment and the software for all subsystems would be integrated by one company, it ensures high reliability, productivity and functionality of the system. This completely eliminates issues that may arise from integration of systems from various suppliers.

3 SITRONICS KASU, 2013 Prerequisites for implementation of the system Objectives of protecting the state border State borders need to be defended in order to protect the state from potentially dangerous adjacent states, to counter potential aggression (armed assault), protect the population, natural resources, cultural values, sovereignty and territorial integrity of the state. is a line and a vertical plane going along the line determining the limits of the state territory (land, water, mineral resources and airspace) of a country, i.e., the spacial limit of the effect of state sovereignty. State border Potential aggression Terrorism Smuggling Illegal migration Types of threats Safe Border system provides for collection and analysis of data from various sources, including integrated detectors, customer databases and specialised resources from the Internet to prevent illegal crossing of the border and a broad range of other threats, while guaranteeing safe and legitimate two-way traffic across all types of borders. The Safe Border solutions could be used both for control of state borders and for perimeter protection of special facilities and territories.

4 SITRONICS KASU, 2013 Example of a stationary solution for control over vast territories A perimeter protection system is a system of autonomous security detectors of various types, communicating via a radio-channel and combined with subsystems for collection and processing of information. The purpose of the system is to block extended sections of the perimeter when the alarm is triggered. It is used in conditions where installation of power supply and data cables from the detectors to data processing system is complicated, impossible or unfeasible. The system is designed to detect a trespasser with its intrusion detectors and send an alarm to the Data Collection and Processing System (DCPS). A laptop integrated into the system circuit could serve as DCPS. Detectors are autonomous and do not require connection to power supply or data cables. Detectors and repeaters work on solar energy or on high- capacity non-chargeable batteries. The terminal unit is stationary and requires permanent power supply. Maximum distance for signal transmission from the detectors is 8,000 meters, subject to direct radiovisibility and no obstructions. Protection of long spans of borders can be organised by using the function of two-way retransmission of signals with the maximum number of retransmissions equaling 32. One unit of the system can protect a maximum length of 32 km. The system supports operation of up to 40 units on different frequencies.

5 SITRONICS KASU, 2013 Basic components and general scheme of security system A combination of mechanical barriers with electronic intrusion detectors Automated video and infrared camera units Aerostatic balloons, drones and air reconnaissance control centres Mobile surveillance crews with video / infrared / radiolocation equipment

6 SITRONICS KASU, 2013 Example of an autonomous solution for control over vast territories An autonomous stationary video- and thermal-vision CCTV station is designed to organise protection and intelligent video surveillance over vast open spaces and state borders. Functions: live video surveillance of vast open spaces videolocation: automatic location and tracking of targets with the use of a pivoting video camera or a thermal camera intelligent processing of signals from all types of detectors installed along the protected perimeter or along the state border protection of the system itself autonomous power supply from wind and solar energy setting up a communication channel with a remote monitoring station An autonomous stationary complex for control over vast and scattered territories with CCTV.

7 SITRONICS KASU, 2013 Example of a mobile solution for control over vast territories This complex is designed for video and thermal-vision CCTV and protection of the perimeter and access to important facilities located at a big distance from stationary complexes. Design of this complex allows for quick deployment and provides for extended autonomous operation. Mobility of the complex is achieved thanks to a collapsible design of its components. It can be transported in a car like UAZ Patriot and deployed at the location within less than 1 hour by a crew of 2 people. A mobile autonomous station for control over vast territories with a night-time CCTV system The functional characteristics of this complex are identical to those of stationary complexes, with one exception: autonomous power supply based on solar energy or a gasoline generator

8 SITRONICS KASU, 2013 Example of a drone-based solution for control over vast territories The use of drones (unmanned aerial vehicles) as an instrument for remote monitoring would improve the promptness of data collection and the efficiency of security by selecting the type of drone and useful load taking into account task specifics.

9 SITRONICS KASU, 2013 A drone can be controlled from a tablet computer. The stabilisation system is based on the principle of artificial horizon that is corrected with the help of an original patented algorithm. The operator controls the drone by sending the following commands from the tablet: "take off", "land", "go 5m up", "go 5m right", "proceed to a point with coordinates X:Y:Z", etc. The route can be determined on the map and changed during the flight, if necessary. One of the key features of a drone is to take off and fly automatically to the point where an alarm was triggered, broadcasting video from the location of such detector. After a detailed inspection of the disturbed section of the protected perimeter the drone would return automatically to its initial position and land in a fully automatic mode. The radio channel for control and telemetry was designed to meet the noise immunity and data protection requirements. Integrated software provides multi-level protection from operator's errors and improves the reliability of drone operations. A mobile complex for control over vast and scattered territories with CCTV Example of a drone-based solution for control over vast territories

10 SITRONICS KASU, 2013 Examples of useful load and control station for a drone Examples of useful load that could be carried by drones A land-based drone control station (stationary), a car-based station (mobile) A land-based drone control station (stationary), a car-based station (mobile)

11 SITRONICS KASU, 2013 Situation Centre Receiving information from various sensors and sources of information Processing and showing the necessary information to an operator Transmission of information to remote users Supporting coordination between patrol groups Providing data based on a single geoinformation platform