Академический Документы
Профессиональный Документы
Культура Документы
Presentation Outline:
Back Ground / Introduction Areas of mutual interest a. Perimeter Solar Fencing (Basic, Mid Range, High security ) b. IP CCTV Surveillance system c. RFID based Access Control system for student monitoring d. Central Monitoring Station Equipment
Crime and disruption protection through deterrence. Reduction of damages through the use of delaying mechanisms such as fences.
Safety Durable Convenience to operate Weather resistant Durable Low maintenance Spot Alarming Multi Sector Monitoring Open ended for Expansion Flood Lighting control Intrusion Detection and Alerting through PC application Software.
animals or people from crossing a boundary. The voltage of the shock may have effects ranging from uncomfortable to painfulbut not lethal. The charge of pulse 0.3 milli sec is sent through the fence in 1Advantages of Solar Power Fencing to 2-second intervals and gets energized to 4000 to 9000 volts.
n n n
n n n
Advanced Perimeter protection device Non-lethal system Does not require any approval from any Government Department. System meets ISI and IEC standards of safety. Creates a Psychological fear in the mind of intruder. System shall not only detect but also deny the intrusion.
and Flood Light Control Advanced Perimeter Security System with CCTV integration
Conclusion
No source Detection No Flood Light Control Requires Lot of manual Intervention User need to monitor the health on daily basis No much intelligence is incorporated
Easy to install Absolutely low cost Provides same level of security when compared to other
Mid range Security Fencing with CMS facility and Flood Light Control
the central unit through CMS software Identification of the alarm Zone is possible in this. Provides the real time health status of the Fence Flood Light Control through CMS software Provides Reports of Communication and intrusion
Perimeter Length : 6.0 KM (Approximately) Difficulties in operating Perimeter Equipment Fencing, Lighting etc What if a security alarm is Triggered ?
Z Z o o n n e e 1 1 2 1 Z o n e
1 Z 0 o n e 9
Zon e3
Z o n e 4
Z o n e
Zone 1
Zone 8
Zone 7
Zone 6
call the stored number automatically, upon intrusion. Access to the System shall be through Password only. The System parameters (Fence Voltage, Battery status, Communication status, Alarm status etc..) can be monitored and changed with the help of a communication Link with the Monitoring Node kept at each Energizer by Authorized Administrator
Conclusion
Easy to install Absolutely low cost Provides same level of security when compared to other
models Requires very less manual intervention Provides efficient Flood Light controlling based on intrusion. Manual control is also possible. User can monitor the Health of the Fence in Real Time. User can Control the ON and OFF of the System in Real Time through CMS software.
the central unit through CMS software Identification of the alarm Zone is possible in this. Provides the real time health status of the Fence Flood Light Control through CMS software Provides Reports of Communication and intrusion PTZ enabled CCTV camera can help in monitoring the intrusion areas in less than 5 sec. Ethernet equipment at each Node can help for further extension of the system.
Typical Equipment at Each Zone: PTZ high Resolution camera Solar Fencing When Alarm Triggers: Equipment CMS software Central unit will get
intimation about the Intrusion zone and the same will be indicated in the MIMIC Panel PTZ cameras will be directed towards the Zone and user can
Zon Z Z 12 Zones Identified by BLAZE with CCTV e 3 o o n integration n 2 ne e e Zo Z 1 1 Zone 1 2 o 1 n Z e o n 4 e Z 1 o Z 0 n o e n e 5 Zone Zone 7 Zone 6 9 8
Per KM : 5.20 Lakh Total Cost: 33 ~ 36 Lakh including installation Mid Range System with CMS and Lighting control: Per Zone: 4.9 Lakh approx Total Cost: 58.8 ~ 62 Lakh with installation Advanced system with CCTV surveillance: Per Zone: 11.2 Lakh approx Total Cost : 134 ~ 140 Lakh with installation
m of power cables. Fence earthing systems should be positioned at least 10 m away from any electricity supply earth pit. Where the general public has access to the fenced area, warning notices should be attached to the fence at intervals no greater than 100 m. If a fence is in the vicinity of over head power lines, no fence wire should be higher than 6'6" above the ground. An electric fence ground system should not be connected to any plumbing system, including disused water pipes or old bore casings, nor should it be connected to any other grounding device. Each energizer should be connected to its own ground system and this should not be connected to any other ground system.
IP Video Surveillance for Campus activity Click to edit Master subtitle style monitoring
Coax Cat 5e
Cat 5e DVR
Network Switch
IP Video System
IP Cameras
Analog Cameras
Coax
Storage
NVR
Client Workstation
IP Cameras
Connect directly to Ethernet network Wide variety of models available for all
applications
Fixed
Bullet
Mini-Dome
Pan/Tilt/Zoo m
Most cameras have high resolution available 640 X 480 (4 CIF) 720 X 480 (D1 ) MegaPixel IP Cameras are available Up to 5 MegaPixels
IP cameras with megapixel resolution allow for highly effective digital zoom capability and virtual pan and tilt functionality
Less cabling Can be added using injectors (mid-spans) Use existing IP switches
available
compression available
wireless Ethernet adaptors or local storage Many options are available for wireless connection to cameras
Most models have built-in motion detection Some have built-in video analytics Intelligent motion detection Abandoned object
NVR
Software Solution Installed on a non-proprietary server Advantages:
Customers can source their own servers, workstations, and storage devices Can be less expensive in cases where there are a large number of cameras being recorded at a low frame rate Virtually all IP cameras are supported Virtual matrix switch software is available
Disadvantages of software NVR Can be more difficult to install and service Higher total cost in most cases Limited integration with access control Customers can buy their own servers and storage
NVR on proprietary hardware Software is pre-installed on hardware provided by the CCTV manufacturer Internal or external storage is also usually provided by the CCTV manufacturer Advantages
Easy to design the system Easy to install and service Many of these types of NVRs can be integrated with access control systems User interface may be similar or identical to DVRs Well developed suite of features inherited from DVR technology
Disadvantages of proprietary NVR Usually support a very limited variety of cameras Customers that desire IP surveillance systems may not want to be locked into proprietary server and storage hardware
Server pulls video over network backbone Long distance home-run cabling is not
required.
More Applications
Customer needs high resolution images Most surveillance grade IP cameras can provide higher resolution images than DVR MegaPixel cameras can provide very high quality images
Remember that they will require at least 20 times more storage space than a standard camera
Budget for CCTV surveillance along with Recording hardware Excluding network infrastructure
Long Range RFID access control system for Student activity tracking at the main gate
System Requirements:
Long Range RFID readers 2 in number RFID tags: As per the requirement Application software Customized as per the requirements
Budget requirements:
Long Range Reader 65.0 K *2 = 130.0 K Cards : 50 ~ 60 rupee per tag Software cost : around 100.0 K Estimated total cost for 1000 students : 3.0 Lakh rupee
Commanding Control of the same. For Perimeter Lighting control and Perimeter camera monitoring For CCTV surveillance of the campus For Student activity monitoring Estimate of the Budget can be prepared if the above three system configurations are finalized.
Thank you