A Study on Integrated Security Service Control Solution Development about CRETA Security
|
|
- Irma Pearson
- 8 years ago
- Views:
Transcription
1 A Study on Integrated Security Service Control Solution Development about CRETA Security Yongwon (Conrad) Cho 1, Jinwon (Frank) Choi 2 1 Director Research Engineer, Virtual Builders Co., Ltd. 2 CEO & Co-Founder, Virtual Builders Co., Ltd. Abstract CRETA Security is an integrated platform detecting security problems in real time for more active control on the situation. In the platform, physical and information security systems are integrated into a smart 3D control environment, which is based on automated management system of buildings and facilities. CRETA Platform is an innovative spatial information based platform, which can be used in various industries. Through CRETA Platform, which provides the OSMU(One Source Multi Use) services, Virtual Builders applies the unique expertise to both conventional and IT convergence area of construction industry. Intuitive and easy location check/monitoring for IT infrastructural devices in 3D. Location check for IT infrastructural devices, and mobile service for immediate response. 3D monitoring system for indoor IT infrastructures (e.g. [1]). Display the general information of IT infrastructural devices. Intuitively indicate location and performance of IT infrastructural devices and report problems. On-site mobile service. Display information of a specific disabled IT device. Locate IT infrastructural device show direction and report business history and on site activities. Keywords CRETA Security, 3D NMS, Integrated Platform, Spatial Information, Real-time. I. INTRODUCTION Recently, 3D visualization of spatial information and spatial information is a key technology ranging. 3D information is currently active field of research is being performed as a problem for deriving a 3D information from the measured information. This paper aims to develop authoring tools and services platform that can be immediate response through supervisor's intuitive understanding based 3d-Building Information mode about overall security situation of building by mapping many CCTV images on 3D space information from traditional observation way that make simply visualize CCTV images on the Situation Board. A. What is 3D NMS? II. DEVELOPMENT TO 3D NMS 3D NMS is 3D spatial information based IT infrastructure monitoring system. Visualizing the status of conditions and problems of IT infrastructures (servers and network devices). Figure 1 CRETA 3D NMS viewer 3D NMS is smart 3D based integrated security, early risk analysis system. So, smart Big Data processing is centralized traffic collection for indoor IT infrastructural devices. Provide integrated real-time monitoring environment and configuration / failure / performance / event / statistics / report for various IT infrastructures (server, network, DBMS, etc.). 28
2 Construction of traffic collection servers for indoor IT infrastructures Reinforcing online/offline detection and analysis Monitoring internal attacks against terminals for business use Provide 3D monitoring system for quick response TABLE I SMART Big Data PROCESSING Construction of qualified system for communication problems and malicious code detection Anticipative detection for external hacking(apt) attempts Communication history collecting sensors for verification Analysis of network communication in accordance with failure/malware detection Analysis of network traffic flow and L7 protocols Risk factors monitoring in physical space Analysis of internal users based on the source IP C&C Geo-map tracking Analysis of communication history and identification of network asset for malware infected computers Monitoring/analysis of malware and network communication history in real-time Search/analysis of a Past history/audit data through BIG Data management solution Operator to centered 3D integrated control scenario. Recognition of events using visualized 3D model (Immediate and accurate respond using Mash-up method). Figure 2 is a variety of event view. Integrated management of most IT infrastructures resources and security information. Network communication failure monitoring. Real-time problem monitoring. Problem levels display. Occurrence time and duration. Remote management of system. Security inspection for internal/external work history. Remote power control of systems. Problem recovery. Network traffic monitoring. Inflow / outflow of information of network device with SNMP. Monitoring of real-time In / Out traffic information. Access / security control for access control by authorization. Detection and protection for various wired / wireless threats. Position tracking for AP station. Failure notification setting of problems. Alarm type setting. Video security system management for 3D based CCTV / sensors monitoring. CCTV image notification / alarm connected with sensor data. Automated 3D intelligence patrol. B. What is CRETA Security? Through development of wireless technology (web, mobile and etc.). The Internet of Things can be applied to buildings. From each story of a building to a section of a city, cities and spaces require various security related services. Virtual Builders realizes integration of various systems related to security and safety in 3D space (e.g. [2]). CRETA Security have to 4 main functions. CCTV preview for optimization (e.g. [3]). First, prior to place actual cameras, position and screen of the cameras can be virtually shown to find appropriate place for install. Second, 3D intelligence automated patrol. Monitoring through moving patterns and location of objects in accordance with pre-identified rule-set. Third, access detection sensor monitoring. Connected to access detection sensors, CCTV screen will be automatically highlighted. When intrusion is detected. And last, 3D space based security monitoring. By freely moving and rotating in 3D space, spatial situation could be intuitively recognized for better decision making. Figure 2 3D NMS view of event Figure 3 Automatic Sensors Detection Procedure 29
3 CRETA Security is manager platform. Space based CCTV / sensors management and link service (PC / Web application). Check location of installed CCTV /sensor through field investigation and document (e.g. [4]). Link status information database collected from other systems to POI with attribute data. Placement of sensor icons in 3D space. Arrange POI such as fire detector and CCTV cameras in 3D. Place major information with symbols for efficient management of various information. CCTV/sensors alarm notification Emergency notification Evacuation(blockage) guidance Result reporting TABLE II SYSTEM SAMPLE Problem-detected location is highlighted in red on the main dash board Detailed information is shown on the right section Move into 3D drawing of the location The sensors are highlighted in red Zoom in to the location of fire/unauthorized access The nearby CCTV screen pops up Emergency broadcast through IP broadcasting system Emergency staircases/exits shown Automated guidance for evacuation/blocking All the information from the beginning is recorded and stored in the database (video, voice, sensor detection history) III. TEST RESULT CRETA Security is 3D spatial information based security visualization system. Easy to find the spatial positions of numerous CCTV cameras. Be able to understand the status of how congested and expected moving path of people. Virtual placement simulation for CCTV cameras. In case of emergency, the place or space are quickly and easily recognizable. Figure 4 CRETA Security Manager (Korea Ver.) CRETA Security viewer is CCTV monitoring, intrusion monitoring and detection sensor monitoring (e.g. [5]). First, CCTV monitoring is capable of monitoring positions and screens of CCTV installed in 3D. Second, intrusion monitoring is attaching individual sensors to visitors / workers. Alarm goes off when unauthorized access is detected by motion sensors. Third, detection sensor monitoring is capable of monitoring positions and present status of tire detectors in 3D. We have to system operating samples. Table II is explanation about system samples. Figure 5 Example of alarm notification 30
4 Figure 6 Example of guidance Existing CCTV security system is simple split-screen feature. Unidentifiable spatial position of a screen. Monitoring functions only and screen layout cannot be changed. Sensor network information can t be visualized. Extensibility to various integrated and converged construction IT services. First, facility management. Management of ground/underground facilities through GIS. Capable of 3D simulation for construction of new facilities, extension of existing facilities, etc. Analysis relations between among facilities (sunshine, view, ventilation, etc.). Second, architectural space management. Space management of structures and facilities through 3D visualization. 3D simulation for modification of space and status management. 3D simulated management for placement of facilities, furniture, human resources, etc. Third, space analysis. Analysis for space per area/person. Analysis for spatial topology. Analysis for energy consumption by space. Distance to emergency exit. Simulation for emergency. Fourth, work management. Work management by facilities and equipment. Accumulation and utilization of work simulation data. Interference and redundancy check for work. Work history management/search by space/equipment. Fifth, equipment control. Equipment control by USN (Ubiquitous Sensor Network). Status detection and remote control. Sixth, material management. Location and inventory management for materials. Visualization for material inventory management. Seventh, security / access control. Check visitors by space linked with access control system. Tracking position of workers. Eighth, connected CCTV. CCTV monitoring by spatial position and real-time site management. Warning broadcast in case of unauthorized access is detected. Work status check and real-time monitoring. Ninth, mobile management. Facility inspection: Facility inspection and information management by PDA and RFID reader. Work management: Standard work check (PM, A/S, etc.), work instruction, work results management, and energy reading. Material management and material inventory management. Tenth, emergency response. Evacuation in case of emergency (fire, explosion, etc.). Simulation for evacuation using 3D avatar models. Establish emergency response and suppression strategy using 3D spatial information. Centralized process management, site management, to remote work order management through real-time communication. Eleventh, management information. Provide visualized statistics in 3D space for better decision making. Twelves, customer service & work request management. Customer service through internet and on-site kiosk. Capable of locate offices/officers on duty. 31
5 IV. CONCLUSIONS Using spatial information has been being expanded. This study has both technical knowledge and professional technique to respond to the trend. We offer many kinds of products to help people to use and manage spaces more easily. 3D Spatial information-based intuitive monitoring system. Combining wireless networks, web and mobilebased application with cities will result in real-time building interconnections. From floor scale to block scale in city, buildings and cities may follow different types of services and functions for security. As following this, CRETA Security provides a unified security system integrated security system with the technologies of Virtual Builders based on spatial information in 3D. CRETA Security helps to convert physical spaces into 3D modeling data and is interlocked with a variety of different types of VMS (Video Management System) and DVR (Digital Video Recorder) providing real-time events. Moreover, different types of sensors related to security such as for access control, RTLS (Real Time Location System) and fire alarming would be enabled in it. Acknowledgement This research was supported by a grant (11 High-tech G11) from Architecture & Urban Development Research Program funded by Ministry of Land, Infrastructure and Transport of Korean government. Figure 7 CRETA Security Application Figure 7 is pre-analysis of spaces and equipment management issue and 3D spatial information based intuitive integrated management solution. Construction of customized integrated spatial information management service taking into account expansion of management area and future needs. REFERENCES [1] I.S. Kim, and H.S. Shin, A Study on Development of Intelligent CCTV Security System based on BIM, The Journal Of Korean Institute Of Communications And Information Sciences, pp , No. 6, Vol. 5, [2] Y.W. Cho, and J.W. Choi, A Study on User Participation based Outdoor & Indoor Spatial Information Building, International Journal of Computer and Communication Engineering, ISSN , [3] Y.W. Cho, and J.W. Choi, A Study on LBS Technique Make for CRETA LBS Platform Service, International Journal of Signal Processing Systems, ISSN , [4] Y.W. Cho, J.W. Choi, and S.Y. Cho, A Study on User Participation based Outdoor & Indoor Spatial Information Building, International Journal of Information and Electronics Engineering, pp , ISSN , [5] J.H. Park, Y.D. Shin, G.R. Jang, and M.H. Baek, A Study on Mapping of 3D Spatial Information for Modeling of Indoor Space, The Journal of Korean Institute Of Spatial Information, pp ,
Smart Integrated Multiple Tracking System Development for IOT based Target-oriented Logistics Location and Resource Service
, pp. 195-204 http://dx.doi.org/10.14257/ijsh.2015.9.5.19 Smart Integrated Multiple Tracking System Development for IOT based Target-oriented Logistics Location and Resource Service Ju-Su Kim, Hak-Jun
More informationDesigning and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System
, pp.97-108 http://dx.doi.org/10.14257/ijseia.2014.8.6.08 Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System Suk Hwan Moon and Cheol sick Lee Department
More informationIntroduction. Industry Changes
Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise
More informationURBAN. Security Solution. Urban Security Solution Military Security Solution SOC Security Solution
URBAN Security Solution Urban Security Solution Military Security Solution SOC Security Solution Samsung Security Solution Peace of mind at all times with Samsung Techwin's innovative security solutions...
More informationParkingManagementSystems. Videobased Parking Management System INDOOR and OUTDOOR Description
ParkingManagementSystems Videobased Parking Management System INDOOR and OUTDOOR Description Mai 2011 Video-based Parking Management System INSIDE and OUTSIDE Control The video-based individual parking
More informationThe Development of an Intellectual Tracking App System based on IoT and RTLS
, pp.9-13 http://dx.doi.org/10.14257/astl.2015.85.03 The Development of an Intellectual Tracking App System based on IoT and RTLS Hak-Jun Lee 1, Ju-Su Kim 1, Umarov Jamshid 1, Man-Kyo Han 2, Ryum-Duck
More informationA Digital Door Lock System for the Internet of Things with Improved Security and Usability
, pp.33-38 http://dx.doi.org/10.14257/astl.2015.109.08 A Digital Door Lock System for the Internet of Things with Improved Security and Usability Ohsung Doh 1, Ilkyu Ha 1 1 Kyungil University, Gyeongsan,
More informationComprehensive Solutions for Data Centers. Rely on Siemens for maximum uptime, reliability, and efficiency. www.usa.siemens.
Comprehensive Solutions for Data Centers Rely on Siemens for maximum uptime, reliability, and efficiency. www.usa.siemens.com/datacenters Siemens can meet the demands of your mission critical facility.
More informationCisco Wireless Control System (WCS)
Data Sheet Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform for wireless LAN planning, configuration,
More informationHuawei One Net Campus Network Solution
Huawei One Net Campus Network Solution 2 引 言 3 园 区 网 面 临 的 挑 战 4 华 为 园 区 网 解 决 方 案 介 绍 6 华 为 园 区 网 解 决 方 案 对 应 产 品 组 合 6 结 束 语 Introduction campus network is an internal network of an enterprise or organization,
More informationMajor Risks and Recommended Solutions
Major Risks and Recommended Solutions www.icdsecurity.com OVERVIEW Are you familiar with the main security risks that threaten data centers? This paper provides an overview of the most common and major
More informationCisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
More informationHUAWEI Enterprise AP Series 802.11ac Brochure
Enterprise AP Series 802.11ac Brochure 01 Enterprise AP Series 802.11ac Brochure 1 Overview Release of 802.11ac standards has driven wireless technologies to the era of GE Wi-Fi. Enterprise Wi-Fi networks
More informationRemote Guarding. The traditional guarding functions that you depend on can now be performed remotely.
Remote Guarding Remote Guarding The traditional guarding functions that you depend on can now be performed remotely. When you have Remote Guarding managed by Securitas USA, we act on incidents in real-time
More informationCommunication Infrastructure Convergence & The need of IS Audit Compliance. Ninad M. Desai
Communication Infrastructure Convergence & The need of IS Audit Compliance. Ninad M. Desai RCDD CISA CFOT Consulting Specialist Communication Cabling. Auditor Information Systems & Technology. Convergence
More informationGMS GRAPHICAL MANAGEMENT SYSTEM
GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS The integrated security management system for multi-site organizations. Pacom s Graphical Management System (GMS) is the modular client-server application that integrates
More informationConducting Security System Site Surveys
Conducting Security System Site Surveys Written By: Harold C. Gillens, PSP, CFC, CHS-III Quintech Security Consultants, Inc. 102 Sangaree Park Court Suite 4 Summerville, SC 29483 CONDUCTING SECURITY SYSTEM
More informationSystem off. Easy Series Intrusion Control Panel Making security easy now featuring wlsn* * wireless Local SecurityNetwork
System off Easy Series Intrusion Control Panel Making security easy now featuring wlsn* * wireless Local SecurityNetwork Security comes first You naturally want to provide the best possible protection
More informationCrime Hotspots Analysis in South Korea: A User-Oriented Approach
, pp.81-85 http://dx.doi.org/10.14257/astl.2014.52.14 Crime Hotspots Analysis in South Korea: A User-Oriented Approach Aziz Nasridinov 1 and Young-Ho Park 2 * 1 School of Computer Engineering, Dongguk
More informationSystem off. Easy Series Intrusion Control Panel Making security easy featuring wlsn* * wireless Local SecurityNetwork
System off Easy Series Intrusion Control Panel Making security easy featuring wlsn* * wireless Local SecurityNetwork 2 Security comes first You naturally want to provide the best possible protection for
More informationDevelopment of a Service Robot System for a Remote Child Monitoring Platform
, pp.153-162 http://dx.doi.org/10.14257/ijsh.2014.8.5.14 Development of a Service Robot System for a Remote Child Monitoring Platform Taewoo Han 1 and Yong-Ho Seo 2, * 1 Department of Game and Multimedia,
More informationIMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry
IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry Needs analysis Reduce disputes over payouts Eliminate theft Detect misconduct and record it for use as evidence in
More informationThe Design and Implementation of the Integrated Model of the Advertisement and Remote Control System for an Elevator
Vol.8, No.3 (2014), pp.107-118 http://dx.doi.org/10.14257/ijsh.2014.8.3.10 The Design and Implementation of the Integrated Model of the Advertisement and Remote Control System for an Elevator Woon-Yong
More informationCISCO WIRELESS CONTROL SYSTEM (WCS)
CISCO WIRELESS CONTROL SYSTEM (WCS) Figure 1. Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform
More informationGuarded community solutions Easy Series for villa and apartment projects
Guarded community solutions Easy Series for villa and apartment projects 2 Easy Series Control Panel Making security easy and reliable Add value to your innovative real-estate projects Ambitious apartment
More informationSECURITY SOLUTIONS BANKING AND FINANCE
SECURITY SOLUTIONS BANKING AND FINANCE Pacom has developed a distinguished reputation as a global leader in the field of remote security management for the banking and financial market. Over 25 years of
More informationMM8000 safety and security with smart danger management. A scalable and flexible management station for any requirement. Answers for infrastructure.
MM8000 safety and security with smart danger management A scalable and flexible management station for any requirement Answers for infrastructure. Sophisticated technology for comprehensive safety Safety
More informationVISTA Operations Management Systems COMPLETE SECURITY SOLUTIONS FOR ANY RETAIL BUSINESS. Value Beyond Security
VISTA Operations Management Systems COMPLETE SECURITY SOLUTIONS FOR ANY RETAIL BUSINESS Value Beyond Security S Help ensure a significant return on investment by reducing operating costs and increasing
More informationW H I T E P A P E R. Security & Defense Solutions Intelligent Convergence with EdgeFrontier
W H I T E P A P E R Security & Defense Solutions Intelligent Convergence with EdgeFrontier Contents 1. Introduction... 2 2. The Need for Intelligent Convergence... 3 2.1 Security Convergence with EdgeFrontier...
More informationRedefining Security for the Modern Facility
Redefining Security for the Modern Facility TM Make the most of your energy 02 Protecting your people, property and data 03 Trust your facilities to a leader in security systems The world is changing rapidly.
More informationBusiness Owner s. Security Buyers. Guide. Everything you need to know before purchasing a security system. Safer. Smarter. Tyco.
Business Owner s Security Buyers Guide Everything you need to know before purchasing a security system Business Owners Security Buyer s Guide You re a business owner. That means you wear a lot of hats
More informationEXPERIMENTAL INVESTIGATION OF THE INTEGRATION OF VIRTUAL MODELS AND THE PHYSICAL CONSTRUCTION
EXPERIMENTAL INVESTIGATION OF THE INTEGRATION OF VIRTUAL MODELS AND THE PHYSICAL CONSTRUCTION Abiola A. Akanmu 1, Chimay J. Anumba 2, John I. Messner 2, Sanghoon Lee 2, and Deepa Kundur 3 abiola.akanmu@wmich.edu,
More informationIntegrated Building Management and Security System. Building Automation & Security. www.coba-group.com
Integrated Building Management and Security System Building Automation & Security www.coba-group.com INTEGRATED BUILDING MANAGEMENT AND SECURITY SYSTEM INDEX 1 GENERAL... 3 1.1 SYSTEM INTEGRATION... 3
More informationTAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility
TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility Trust your facilities to a leader in security systems The world is changing rapidly. Companies and government agencies
More informationTk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
More informationWrite up on PSIM PHYSICAL SECURITY INFORMATION MANAGEMENT
Write up on PSIM PHYSICAL SECURITY INFORMATION MANAGEMENT Physical security information management (PSIM) is a technology solution that provides a platform and applications created to integrate multiple
More informationIntelligent Home Automation and Security System
Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology
More informationApplication of Tracking Technology to Access-control System
Hitachi Review Vol. 53 (2004),. 2 83 Application of Tracking Technology to Access-control System OVERVIEW: An access-control system that applies tracking technology to control the movement of people and
More informationSupervision software for Intrusion detection, Fire detection and CCTV systems
Supervision software for Intrusion detection, Fire detection and CCTV systems elmospa.com Global security solutions Globalpro GLOBALPRO is the new supervision software that allows to obtain a powerful
More informationEnvera Security Solution for Via Sol CDD Community. www.enverasystems.com
Envera Security Solution for Via Sol CDD Community www.enverasystems.com Presenter Bill Ford 36 plus years in the security industry Owned and operated his own security company in Orlando Currently a Security
More informationA Study on Web-Based Viewer Development CRETA Vue Considering the City GML Characteristics
A Study on Web-Based Viewer Development CRETA Vue Considering the City GML Characteristics Yongwon (Conrad) Cho 1, Jinwon (Frank) Choi 2 1 Director Research Engineer, Virtual Builders Co., Ltd. 2 CEO &
More informationOptimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features
Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing
More informationSmile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you
Smile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you Building Management System Total Security & Surveillance Solutions for Building Complexes Intelligent Building Management System Solution
More informationProtexial io WIRELESS AL ARM SYSTEM. O f fe r yo ur exp e r ti s e in h om e se c uri ty.
Protexial io WIRELESS AL ARM SYSTEM O f fe r yo ur exp e r ti s e in h om e se c uri ty. Protexial io The Somfy W ireless somfy: A major AlArm BrAnd as a player on the alarm market for the past ten years,
More informationivms-4200 Client Software Quick Start Guide V1.02
ivms-4200 Client Software Quick Start Guide V1.02 Contents 1 Description... 2 1.1 Running Environment... 2 1.2 Surveillance System Architecture with an Performance of ivms-4200... 3 2 Starting ivms-4200...
More informationImplementation of the E-Catalog Mobile E-commerce Platform using 3D GIS Information
Implementation of the E-Catalog Mobile E-commerce Platform using 3D GIS Information ChangSoo Moon, HaengSuk Lee, HyunKI Ryu, SeIl Oh R&D Team GIVET(GyeongBuk Research Institute of Vehicle Embedded Technology)
More informationidvr-pro Viewer Software for Mac User Manual ver 0.1
idvr-pro Viewer Software for Mac User Manual ver 0.1 1 Contents 1. Introduction... Error! Bookmark not defined. 1.1 Summary... Error! Bookmark not defined. 2. Install... Error! Bookmark not defined. 2.1
More informationWhite paper. Axis Video Analytics. Enhancing video surveillance efficiency
White paper Axis Video Analytics Enhancing video surveillance efficiency Table of contents 1. What is video analytics? 3 2. Why use video analytics? 3 2.1 Efficient use of manpower 3 2.2 Reduced network
More informationMotorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost
Motorola AirDefense Network Assurance Solution Improve WLAN reliability and reduce management cost The challenge: Ensuring wireless network performance and availability Wireless LANs help organizations
More informationTECHNOLOGY RESEARCH AND DEVELOPMENT More Than Alarm Anna Kołodziej-Saramak
TECHNOLOGY RESEARCH AND DEVELOPMENT More Than Alarm Anna Kołodziej-Saramak The purpose of the voice alarm systems (VAS) is to inform people about hazards in a possibly efficient way (which, unfortunately,
More informationHow To Create An Intelligent Infrastructure Solution
SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure
More informationAccess CONTROL. MANAGEMENT Software
Software Guide Access CONTROL MANAGEMENT Software 21 Personnel Fields Users are provided twenty one fields to record various personnel data such as first name, last name, department, parking spot, and
More informationForum Internacional de Data & Telecomunicaciones
Forum Internacional de Data & Telecomunicaciones TAC Data Center & Telecommunications Eduardo Espinosa Agenda Company Products Data Center & Telecomm Concerns TAC Integrated Cooling, Power & Security TAC
More informationCompany & Solution Profile
Company & Solution Profile About Us NMSWorks Software Limited is an information technology company specializing in developing Carrier grade Integrated Network Management Solutions for the emerging convergent
More informationThe Digital Signage System Supporting Multi-Resources Schedule on an Elevator
, pp. 219-228 http://dx.doi.org/10.14257/ijsh.2015.9.8.23 The Digital Signage System Supporting Multi-Resources Schedule on an Elevator Woon-Yong Kim and SoonGohn Kim (Corresponding Author) Department
More informationIn the pursuit of becoming smart
WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution
More informationCentral Management System (CMS) USER MANUAL
Central Management System (CMS) USER MANUAL LEGAL INFORMATION Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the prior written permission
More informationSmart City Solutions
Smart Green Platform powered by Smart Solutions 2012.03 Smart Solutions solution to enhance the quality of life and to build an environment-friendly Smart Green by LG CNS LG CNS Add. Prime Tower 10-1 Hoehyeon
More informationA Study on Design of Virtual Desktop Infrastructure (VDI) System Model for Cloud Computing BIM Service
A Study on Design of Virtual Desktop Infrastructure (VDI) System Model for Cloud Computing BIM Service K.H. Lee a and S.W. Kwon b and J.H. Shin c and G.S. Choi d a Department of Convergence Engineering
More informationA Study on Integrated Operation of Monitoring Systems using a Water Management Scenario
, pp. 55-64 http://dx.doi.org/10.14257/ijseia.2015.9.9.06 A Study on Integrated Operation of Monitoring Systems using a Water Management Scenario Yong-Hyeon Gwon 1, Seung-Kwon Jung 2, Su-Won Lee 2 and
More informationThe Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security
The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution
More informationLeveraging the Industrial Internet of Things (IOT) to Optimize Renewable Energy
Leveraging the Industrial Internet of Things (IOT) to Optimize Renewable Energy Creating More Efficient and Connected Wind Turbines By: Brian Roth, Product Marketing Engineer February 1, 2016 Leveraging
More informationOpen Access Research and Design for Mobile Terminal-Based on Smart Home System
Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2015, 7, 479-484 479 Open Access Research and Design for Mobile Terminal-Based on Smart Home System
More informationALCATEL-LUCENT ENTERPRISE OPENTOUCH NOTIFICATION SERVICE IMPROVE REAL-TIME SITUATIONAL AWARENESS
ALCATEL-LUCENT ENTERPRISE OPENTOUCH NOTIFICATION SERVICE IMPROVE REAL-TIME SITUATIONAL AWARENESS In healthcare, education, high-risk industries and the hospitality sector, you must know immediately if
More informationSECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES
SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES by the American Chemical Society, Committee on Chemical Safety, Safe Practices Subcommittee Introduction Terrorism
More informationCMS Pro. User`s Manual. Professional Central Monitoring Software. Full-featured Enterprise Class Surveillance Solution MADE IN KOREA
Professional Central Monitoring Software CMS Pro Full-featured Enterprise Class Surveillance Solution User`s Manual MADE IN KOREA M11131CMSProDR This document contains preliminary information and is subject
More information>>IP. VIDEO INTERCOM & SMART HOME TCP/IP video intercom solution expert
Enjoy value-added service Seamlessly connected with IP camera Embedded SIP protocol Support App function >>IP VIDEO INTERCOM & SMART HOME TCP/IP video intercom solution expert Solution SIP Intercom Security
More informationProgress in Recording Entrance/Exit Imaging Visual Surveillance Systems Flapper Gate
Realizing the Safe Society / Products and Services Progress in Recording Entrance/Exit Imaging Visual Surveillance Systems Flapper Gate TAKIZAWA Masafumi, SATO Masahiro Abstract Enforcement of the Personal
More informationAutomated Security System using ZigBee
IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 01 June 2015 ISSN (online): 2349-6010 Automated Security System using ZigBee Sneha Susan Abraham Saveetha School
More informationDeveloping Safety Management Systems for Track Workers Using Smart Phone GPS
, pp.137-148 http://dx.doi.org/10.14257/ijca.2013.6.5.13 Developing Safety Management Systems for Track Workers Using Smart Phone GPS Jin-Hee Ku 1 and Duk-Kyu Park 2 1 Dept of Liberal Education and 2 Dept
More informationComprehensive Data Center Energy Management Solutions
FROM INSIGHT TO EFFICIENCY: Comprehensive Data Center Energy Management Solutions Since 1995, facility managers and BAS professionals have relied on the Niagara framework to provide full convergence of
More informationWBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 755-760 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4686 WBAN Beaconing for Efficient Resource Sharing in Wireless Wearable
More informationSecurity Level: HUAWEI TECHNOLOGIES CO., LTD.
Security Level: www.huawei.com Pedro Gomez Miranda Enterprise Chief Technology Officer Huawei Enterprise Northern Latin America Region pedro.gomez@huawei.com HUAWEI TECHNOLOGIES CO., LTD. Understanding
More informationA Research Using Private Cloud with IP Camera and Smartphone Video Retrieval
, pp.175-186 http://dx.doi.org/10.14257/ijsh.2014.8.1.19 A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval Kil-sung Park and Sun-Hyung Kim Department of Information & Communication
More informationMonitoring of Natural Hazards With the ImpactSentinel Alarming System An Intelligent Solution
Monitoring of Natural Hazards With the ImpactSentinel Alarming System An Intelligent Solution ImpactSentinel Natural Hazard Sensors und Systems hazard signalization in protection fences overstress, shock
More informationIntegrated Physical Security and Incident Management
IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting
More informationETERE SNMP CONSOLE: A centralized, automatic and real-time monitoring of broadcast system networks
of broadcast system networks TABLE OF CONTENTS 1. INTRODUCTION... 3 2. ETERE SNMP CONSOLE... 4 3. DETAILED FEATURES... 5 3.1 GRAPHICAL INTERFACE... 6 3.2 MULTIPLE VIEWS... 7 3.3 FILTERING RULES... 8 3.4
More informationParking. Management System: Our Strengths are: Advanced Technology Excellent Versatility Great Simplicity Wide Range Local Maintenance
Parking Management Systems For more than 20 years Somfy SACS has car park automation. We design and produce advanced systems for automatic management of all types of car parks offering end to end services.
More informationIntelligent Video Technology
WHITE PAPER Intelligent Video Technology Panasonic Video surveillance systems Table of contents 1. Introduction 3 2. How Intelligent Video works 3 3. System configuration 4 4. Panasonic s intelligent video
More informationVideo Analytics and Security
Video Analytics and Security Video Analytics and Security Using video data to improve both safety and ROI TABLE OF CONTENTS I. Executive Summary... 1 II. Captured on Video. Now What?... 2 III. Start Where
More informationConsiderations on Audience Measurement Procedures for Digital Signage Service
Considerations on Audience Measurement Procedures for Digital Signage Service Wook Hyun, MiYoung Huh, SeungHei Kim and ShinGak Kang Electronics and Telecommunications Research Institute Daejeon, Republic
More informationIP Video Surveillance
IP Video Surveillance Solutions and Services Wireless IP PDA Administration Wireless Access Point Viewer Remote Control IP Video Server IP Network Alarm Management Video Recording Analog Video Server Access
More informationIntelligent. Buildings: Understanding and managing the security risks
Version 2 IET Sector Insights Intelligent Buildings: Understanding and managing the security risks More efficient and cost-effective use of the built environment is increasingly being driven by economic
More informationSensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao
Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities Dr. William Kao Agenda Introduction - Sensors, Actuators, Transducers Sensor Types, Classification Wireless Sensor Networks
More informationSuccess factors for the implementation of ERP to the Agricultural Products Processing Center
, pp.61-66 http://dx.doi.org/10.14257/astl.2015.95.12 Success factors for the implementation of ERP to the Agricultural Products Processing Center Jung Rock Do 1, Jin Hyeung Kim 2, Young Chan Choe 3 1
More informationAlert Technology Group 46 Empey St, Brantford ON Office 519.750.1516 Toll Free 1.888.750.1516 www.alerttechnologygroup.ca
Alert Technology Group 46 Empey St, Brantford ON Office 519.750.1516 Toll Free 1.888.750.1516 www.alerttechnologygroup.ca Alert Technology Group is the leader in providing technologically advanced security
More informationSystem off. Easy Series Intrusion Control Panel Making security easy featuring RADION wireless peripherals
System off Easy Series Intrusion Control Panel Making security easy featuring RADION wireless peripherals 2 Security comes first You naturally want to provide the best possible protection for your home
More informationSecurity systems URBAN SECURITY. Information systems protecting major cities with a main goal: to guarantee citizen s well being. indracompany.
Security systems URBAN SECURITY Information systems protecting major cities with a main goal: to guarantee citizen s well being indracompany.com isafety Urban Security Supports and strengthens coordination
More informationAn Intelligent Middleware Platform and Framework for RFID Reverse Logistics
International Journal of Future Generation Communication and Networking 75 An Intelligent Middleware Platform and Framework for RFID Reverse Logistics Jihyun Yoo, and Yongjin Park Department of Electronics
More informationData Transfer Technology to Enable Communication between Displays and Smart Devices
Data Transfer Technology to Enable Communication between Displays and Smart Devices Kensuke Kuraki Shohei Nakagata Ryuta Tanaka Taizo Anan Recently, the chance to see videos in various places has increased
More informationWhite paper. Axis Video Analytics. Enhancing video surveillance efficiency
White paper Axis Video Analytics Enhancing video surveillance efficiency Table of contents 1. What is video analytics? 3 2. Why use video analytics? 3 2.1 Efficient use of manpower 3 2.2 Reduced network
More informationReliable Security Solutions
Reliable Security Solutions Challenger10 The proven solution for access control, intrusion detection and video integration. An integrated security solution for your most challenging environments The Tecom
More informationSQUIZ SOLUTIONS. Disaster Recovery and Security October 13. Zetland House 109-23 Clifton Street London EC2A 4LD www.squiz.net/uk 020 7101 6800
SQUIZ SOLUTIONS. Disaster Recovery and Security October 13 Zetland House 109-23 Clifton Street London EC2A 4LD www.squiz.net/uk 020 7101 6800 Squiz UK Ltd 2013. All Rights Reserved. No part of this publication
More informationIntegrated Building Management and Security System. Building Automation & Security. www.lonix.com
Integrated Building Management and Security System Building Automation & Security www.lonix.com INTEGRATED BUILDING MANAGEMENT AND SECURITY SYSTEM INDEX 1 GENERAL... 3 1.1 GREEN BUILDING REQUIREMENTS...
More informationBS5839 Part 1:2002 Overview
BS5839 Part 1:2002 Overview 1 Contents Introduction So why is the current standard being revised? The brief for the new standard Changes to structure of current Standard Enhanced certification of Fire
More informationOPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,
More informationVidi NMs Network Management
VIDI NMS Network Management The VIDI Network Management System VIDI NMS is a comprehensive tool for a centralised network management with graphical frontend. As it is working in real time the user gets
More informationDEVELOPMENT OF CAMPUS SPACE NAVIGATION AND GUIDE SYSTEM
DEVELOPMENT OF CAMPUS SPACE NAVIGATION AND GUIDE SYSTEM Yan-Chyuan Shiau Chung Hua University, Hsin-Chu, Taiwan ycshiau@ms22.hinet.net Tsung-Pin Tsai Chung Hua University, Hsin-Chu, Taiwan winnie.bear@msa.hinet.net
More informationHUS-XPRO Servers (v.4.2)
The HUS-XPRO is an all-inclusive enterprise IP solution management server developed by Honeywell. IP Surveillance System is an essential component for enterprises to perform professional security monitoring
More informationSecurity Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
More information