Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 SITRONICS KASU, 2013 Comprehensive security system for strategic facilities (1/2) Border protection Checkpoint control Personal identification and access.

Similar presentations


Presentation on theme: "1 SITRONICS KASU, 2013 Comprehensive security system for strategic facilities (1/2) Border protection Checkpoint control Personal identification and access."— Presentation transcript:

1 1 SITRONICS KASU, 2013 Comprehensive security system for strategic facilities (1/2) Border protection Checkpoint control Personal identification and access control Identifying sick and infected people Detecting forbidden substances Defence of sea borders and other borders Crime prevention Situation Centre All subsystems would operate in a single information field. Events occurring in one subsystem can cause a response from another one. For example, a video surveillance camera acquiring a target may cause another subsystem to switch on the projector, lock a door or broadcast a message from the emergency response services. The system can be controlled from any point of the system, using operator console or local control panels anywhere in the world.

2 2 SITRONICS KASU, 2013 Comprehensive security system for strategic facilities (2/2) The software allows for some flexibility in setting the imperatives (the rules automatically followed by the system). Flow charts and diagrams let the operators monitor the condition of the security system and control it using interactive icons. Distributed network architecture provides for creation of flexible and efficient systems of any scale, while the entire system could be configured from one point. All elements of the system, including autonomous controllers and servers, have extensive back-up functions, making it possible to build a system with any level of reliability. A comprehensive security system can provide for truly large security systems comprising thousands of video surveillance cameras and access points and tens of thousands of security sensors. All this equipment would operate in a single information field that could be controlled and monitored from any of dozens of operator workplaces. Since the equipment and the software for all subsystems would be integrated by one company, it ensures high reliability, productivity and functionality of the system. This completely eliminates issues that may arise from integration of systems from various suppliers.

3 3 SITRONICS KASU, 2013 Prerequisites for implementation of the system Objectives of protecting the state border State borders need to be defended in order to protect the state from potentially dangerous adjacent states, to counter potential aggression (armed assault), protect the population, natural resources, cultural values, sovereignty and territorial integrity of the state. is a line and a vertical plane going along the line determining the limits of the state territory (land, water, mineral resources and airspace) of a country, i.e., the spacial limit of the effect of state sovereignty. State border Potential aggression Terrorism Smuggling Illegal migration Types of threats Safe Border system provides for collection and analysis of data from various sources, including integrated detectors, customer databases and specialised resources from the Internet to prevent illegal crossing of the border and a broad range of other threats, while guaranteeing safe and legitimate two-way traffic across all types of borders. The Safe Border solutions could be used both for control of state borders and for perimeter protection of special facilities and territories.

4 4 SITRONICS KASU, 2013 Example of a stationary solution for control over vast territories A perimeter protection system is a system of autonomous security detectors of various types, communicating via a radio-channel and combined with subsystems for collection and processing of information. The purpose of the system is to block extended sections of the perimeter when the alarm is triggered. It is used in conditions where installation of power supply and data cables from the detectors to data processing system is complicated, impossible or unfeasible. The system is designed to detect a trespasser with its intrusion detectors and send an alarm to the Data Collection and Processing System (DCPS). A laptop integrated into the system circuit could serve as DCPS. Detectors are autonomous and do not require connection to power supply or data cables. Detectors and repeaters work on solar energy or on high- capacity non-chargeable batteries. The terminal unit is stationary and requires permanent power supply. Maximum distance for signal transmission from the detectors is 8,000 meters, subject to direct radiovisibility and no obstructions. Protection of long spans of borders can be organised by using the function of two-way retransmission of signals with the maximum number of retransmissions equaling 32. One unit of the system can protect a maximum length of 32 km. The system supports operation of up to 40 units on different frequencies.

5 5 SITRONICS KASU, 2013 Basic components and general scheme of security system A combination of mechanical barriers with electronic intrusion detectors Automated video and infrared camera units Aerostatic balloons, drones and air reconnaissance control centres Mobile surveillance crews with video / infrared / radiolocation equipment

6 6 SITRONICS KASU, 2013 Example of an autonomous solution for control over vast territories An autonomous stationary video- and thermal-vision CCTV station is designed to organise protection and intelligent video surveillance over vast open spaces and state borders. Functions: live video surveillance of vast open spaces videolocation: automatic location and tracking of targets with the use of a pivoting video camera or a thermal camera intelligent processing of signals from all types of detectors installed along the protected perimeter or along the state border protection of the system itself autonomous power supply from wind and solar energy setting up a communication channel with a remote monitoring station An autonomous stationary complex for control over vast and scattered territories with CCTV.

7 7 SITRONICS KASU, 2013 Example of a mobile solution for control over vast territories This complex is designed for video and thermal-vision CCTV and protection of the perimeter and access to important facilities located at a big distance from stationary complexes. Design of this complex allows for quick deployment and provides for extended autonomous operation. Mobility of the complex is achieved thanks to a collapsible design of its components. It can be transported in a car like UAZ Patriot and deployed at the location within less than 1 hour by a crew of 2 people. A mobile autonomous station for control over vast territories with a night-time CCTV system The functional characteristics of this complex are identical to those of stationary complexes, with one exception: autonomous power supply based on solar energy or a gasoline generator

8 8 SITRONICS KASU, 2013 Example of a drone-based solution for control over vast territories The use of drones (unmanned aerial vehicles) as an instrument for remote monitoring would improve the promptness of data collection and the efficiency of security by selecting the type of drone and useful load taking into account task specifics.

9 9 SITRONICS KASU, 2013 A drone can be controlled from a tablet computer. The stabilisation system is based on the principle of artificial horizon that is corrected with the help of an original patented algorithm. The operator controls the drone by sending the following commands from the tablet: "take off", "land", "go 5m up", "go 5m right", "proceed to a point with coordinates X:Y:Z", etc. The route can be determined on the map and changed during the flight, if necessary. One of the key features of a drone is to take off and fly automatically to the point where an alarm was triggered, broadcasting video from the location of such detector. After a detailed inspection of the disturbed section of the protected perimeter the drone would return automatically to its initial position and land in a fully automatic mode. The radio channel for control and telemetry was designed to meet the noise immunity and data protection requirements. Integrated software provides multi-level protection from operator's errors and improves the reliability of drone operations. A mobile complex for control over vast and scattered territories with CCTV Example of a drone-based solution for control over vast territories

10 10 SITRONICS KASU, 2013 Examples of useful load and control station for a drone Examples of useful load that could be carried by drones A land-based drone control station (stationary), a car-based station (mobile) A land-based drone control station (stationary), a car-based station (mobile)

11 11 SITRONICS KASU, 2013 Situation Centre Receiving information from various sensors and sources of information Processing and showing the necessary information to an operator Transmission of information to remote users Supporting coordination between patrol groups Providing data based on a single geoinformation platform


Download ppt "1 SITRONICS KASU, 2013 Comprehensive security system for strategic facilities (1/2) Border protection Checkpoint control Personal identification and access."

Similar presentations


Ads by Google