Intrusion detection systems are the simplest and most common form of property and personnel protection from theft and attack. Be it private or business object, employed elements are similar, although their proper setup, type and reliability are key in their functioning under various environmental circumstances.
The core functional logic for most manufacturers is virtually identical and consists of an intrusion detection central unit representing the intrusion detection centre, a series of detectors whose function is recognition of unauthorized behavior, as well as alerting and signalization units. The choice of an appropriate solution depends on a series of factors such as degree of risk, type of activity at the protected site, the potential damage which may be incurred, the shape and position of the space and other circumstances which must be taken into account. Depending on the unique properties or the user, multiple solutions may be projected starting from solution founded on basic magnetic contacts and motion sensors for simple objects, all the way to microwave barriers and buried seismic cables for more complex objects where a high degree of security is required for an open space.
The most common solutions in establishing communications in office and residential objects are door phones. There are many possibilities from simple systems connected by one door unit at the object entrance with a receiving unit capable of opening the door equipped with an electric lock, to more complex systems where multiple calling units are connected with a series of receiving units.
As for method of communication, devices may either be voice or video based. A system will often be expanded with a contactless card reader, a keypad or fingerprint reader with the goal of ensuring unhindered entrance to persons with restricted space access. Video verification is becoming a more common element of door phone systems, which may be further integrated into access control systems and video surveillance with the purpose of automatization and greater surveillance of the entrance of a secured object.
When considering access automation, automatically opening barriers with licence plate recognition most often come to mind, although they may may be used as a self-sufficient system or integrated as part of a larger system encompassing other elements of access control, video surveillance, fire detection or other systems. In essence, it is about mechanical disabling of passage to persons without the power to pass and automatic enabling passage of others, ie automatically enabling passage in case of planned or emergency situations.
A simple example of a self-sufficient system is a parking lot barrier, raised and lowered by a remote control. In addition, there are barriers and sliding doors at courtyard entrances, mechanical barriers at stadiums which open by card reading, as well as lavatory entrance barriers which open only after coins are deposited into a payment device.
More complex systems may inter-connect various systems with a wide variety of integration options. Some common examples are:
- automatic barrier opening upon optical licence plate recognition or RF (radiofrequency) recognition of a contactless chip
- automatic opening of all doors and barriers in the event of fire
- opening doors by way of smartphones
- automatic parking payment systems enabling parking exit
- real time tracking of persons and automatic door opening when the person is proximity to the doors
Access control systems are the foundation of every object and their design and projection are given special emphasis. The majority of access control systems are expandable and network oriented, offering integration possibilities through connectivity with other security systems: video surveillance, fire detection, anti-theft and sound systems. Today’s access control systems function in large part with contactless cards which, in case greater security, may be accompanied by an access code or a unique biometric identification element , such as a a fingerprint or retina scan.
There are a wide array of readers suitable to the required degree of security, reader distance, passage speed and other object specific traits. The rules of system functioning and assigning of access rights to users (cards) are defined through the given program package.
A common additional functionality to access control systems is a working hours control system, which ties in seamlessly. Depending upon the complexity of business operations and user wishes, special readers/terminals may be used, on which the purpose of the card reading may be marked (entrance, exit, official entrance/exit, break and so forth).
Video surveillance systems are a prevention system whose task is to deter any potential perpetrator of a criminal act. However, in the event of a misdeed or other undesirable event, the circumstances necessary to establish the perpetrator or cause of the event can be established through usage of a video surveillance system.
In today’s world of IP based communication, video surveillance cameras are an everyday sight. Therefore, one of the first considerations before planning such a system is related to the system’s main function – does the system have as its goal prevention, detection, recognition or identification of persons/events? Depending on this, an appropriate image resolution, system scalability and the evermore present intelligent video analysis is selected.
Thanks to powerful processors and computers, intelligent video analysis is undertaking more processes and is making users’ lives easier. Although far from its trivialised depiction on television crime and action series, its functionality and added value are unquestionable. Some examples of the most common usage of video surveillance include:
- automobile licence plate recognition with automatic opening or closure of barriers
- automatic alarm activation upon detection of movement in a non-designated direction (e.g. highway rest stop exit)
- unusually large flow of movement in one direction in a defined area
- movement in a protected/restricted space
- people and vehicle counting
- object disappearance detection (e.g. art in a museum) or unpredicted situations (e.g.. luggage left behind at an airport)
Early fire detection systems are crucial in saving lives and property from immense potential fire damage. A fire, whiles much more easily extinguished in its initial stages, often leads to the complete destruction of an object once fully spread. This makes investing in a fire detection system that detects smoke or fire as early as possible extremely important.
Tehnozavod’s fire detection systems secure objects of various types and purposes, including banks, museums, sports venues, religious sites, hotels, hospitals and commercial buildings. Their use in industry, great halls and explosive environments is crucial, with increased usage in open space flame detection using video cameras, an ideal solution for national parks. Such systems may consist from several dozen to several thousand detectors, be independent or networked, locally or remote controlled and integrated with other technical security systems.
Announcement-evacuation systems hold a key function in sites with a high fluctuation of the number of people, including shopping malls, concert halls and airports. They hold an important role in creating a comfortable environment under normal working conditions, as well as timely alerting without creating a panic situation in cases of emergency. Choosing such a system increases the degree of safety, as background music volume will be lowered and important messages will be conveyed to either all persons located on site, or only the sections in danger.
Essential functions of such systems include:
- background music, which may be played individually for each zone
- announcement of voice messages, be they of a service, informative or commercial nature to persons located on site
- when required, informing and alerting with playback of pre-recorded messages
- in case of peril, evacuation management through generation of alarm signals
For mixed residential of industrial objects, detecting evidence of toxic gases hazardous to humans is crucial. Explosive or flammable gases coming in contact with air may have fatal consequences to persons and the environment.
Gas detection is among the most crucial security systems due to most gases being undetectable by smell, sound or vision, thus making planning of a highly reliable gas detection system essential in order to avoid tragic consequences. For this reason, gases are often referred to as “silent killers”.
Several types of gas detectors are available, depending on technology, the type of gas in question and intended environment. Tehnozavod holds extensive experience with such systems through its sheer number of installations performed, ranging from basic boiler room detection to high risk systems such as those found in the oil and gas industry.
Gases requiring special attention include:
- POISONOUS: carbon monoxide (CO), carbon dioxide (CO2), sulphuric acid (H2S), sulphur IV oxide(SO2), nitric oxide (NO), nitrogen dioxide (NO2), hydrochloric acid (HCI), oxygen (O2), chloriner (Cl2), ammonia (NH3)
- EXPLOSIVE/FLAMMABLE: hydrogen gas (H2), natural gas/methane (CH4), propane-butane, isopropyl alcohol, hexane (C6H14), octane, acetylene (C2H2), ethylene (C2H4), ammonia (NH3), butane, ethanol (C2H5OH), methanol (CH3OH), toulene, pentane (C5H12), ethylene oxide (C2H4O)
Conference systems are used in situations where communicating to a large number of participants simultaneously is required. Under such conditions, simple video communications equipment no longer suffices – professional microphones and speakers capable of focusing on a single active individual, as well as ignoring all other sources of sound and noise are required. The complexity of the equipment used for this purpose grows depending on space size, number of participants, type and number of devices used during the presentation, translation requirements, along with a series of other factors. These systems may be used in any meeting room, large conference room, university study hall and similar spaces.
Conference systems comprise of the following:
- core equipment – serves to interconnect all units into a whole, while simultaneously encompassing algorithms for information processing and logistical settings for control over the entire system.
- delegational and presiding countertops with microphones and auxiliary elements – complete devices for receiving, as well as sending audio information into the conference system. The stations function on a “master/slave” principle where a presiding station has precedence over all others. In practice, this means that delegates request “the floor” while the presiding body can at any given moment grant or withdraw speaking rights.
- music and speech reproduction system – depending on requirements, consists of amplifiers and speakers, or only headphones. Depending on room size and other specific details, simpler analog or more complex digital systems may be used.
Simultaneous interpretation is closely tied with conference systems. As conference participants are rarely from the same language speaking region, translating individual participant speech is necessary for the other participants. The role of a simultaneous interpretation system is the seamless delivery of information to every participant in their language, while ensuring that information does not reach anyone who does not require it. Such systems may be designed in many possible layouts depending upon the intended use of the area, with the possibility of wireless speech transmission using a pocket receiver and headphones. Such a system typically consists of 3 basic units:
- translation unit – an acoustically isolated cabin, separating the translator and delegates, a microphone with selection of language and either headphones or a speaker relaying information to be translated
- voice and transmission system – transmits audio information to every individual delegate using one connection
- receiver of voice and background music – delivers information to the end user, in most cases using headphones which are used to receive audio channels with minimal disruption to other participants
Video presentation systems are utilised in a great number of everyday business processes, from internal to external lectures, presentations or meetings, conferences, congresses and similar events. Irregardless of needs and areas requirements, Tehnozavod assists in the selection of technologies and products through vast experience and knowledge. From projection screens using front or rear projection, various screens, video walls of regular and irregular shape, and other equipment.
Solutions may vary by durability, characteristics, images, resistance to weather elements, dimensions, price and image quality under various lighting conditions. Our company offers complete video presentation solutions with all the necessary components included, including installation into the required spot.
A quality audio system is founded on quality planning which takes into account space characteristics and the intent of the system in order to ensure voice clarity and high music fidelity at all points in the location. This serves as the foundation for other elements: sound source (CD, MP3, radio), audio signal processing components, amplifiers and speakers. A system built in this manner may be considered complete.
Depending on the purpose of the space in question, one system may send different messages and music to different parts of the object, ensuring automatic music volume lowering in case of an event, locally adjusting music volume in individual spaces as well as a range of other activities.
Evacuation audio is highly effective coupled with fire or gas detection systems in commercial buildings having a high fluctuation of the number of people. Under normal conditions, music is played through the system, but in the event of a fire serves to announce fire routes and other information crucial to saving lives and property without creating a panic situation.
RFID is an automatic identification method based on remote storage and data transmission over a radio frequency. Using special readers and antennae, along with labels or inserts, it is possible to identify each individual object or person. For this reason, the use of this system is quite widespread. Access control via contactless tabs is a frequent use of system, but today a more common use is RTLS (Real Time Location System) which tracks objects in real-time and space.
By using this technology, it is possible to automatically detect movement of items and create series of alarm and information scenarios that are of primary importance in tracking (archives, warehouses, storages, inventories, borrowing or moving equipment, etc.).
Thanks to RFID technology, staff perform tasks free from interruption and changes, and the system automatically records item movement. By placing RFID passages on key inputs / outputs, tracking of product traffic is ensured, and the use of handheld readers makes carrying out inventory of the entire system possible in only several minutes. RFID may also be used for registering items, tracking location changes, equipment search, etc.
In addition to item identification, other key data may also be recorded and then repeatedly deleted and reused (eg last service date, employee in charge for the equipment, inventory number etc.). There are also special tags with alarm buttons that can be programmed as desired.
Whether utilised for an archive, a warehouse, a store, an inventory, staff tracking or tracking sick and immobile persons, there are a wide variety of possible solutions to meet each of these needs.
The task of central surveillance is reception of alarm events from guarded objects at the moment of undesirable or dangerous events, and to initiate sequential protection actions as well as to monitor the status of these facilities. Surveillance is centralized through the client application Supervisor. It automates and simplifies the operations of the monitoring center, as well as carrying out the integration and chained reactions of various safety and technical protection modules. Via central surveillance, it is simple to control the alarms that trigger other modules such as video surveillance (video pop-up), GIS maps and floor plans (blinking icons on the geographical map and floor plan) and video wall (raising an alarm scenario on a video wall).
A working hours tracking system is a way of managing and tracking company employee working hours. It consists of a hardware and software component. The hardware portion consists of devices (readers, controllers, terminals, etc.) that allow employees to record their presence (card reading, fingerprint …), while the software part is embedded as a web module in the Supervisor application. The working hours tracking module features an administrative part, such as defining employees parameters, their schedules, and shifts, but it also monitors the behavior of the same employees in accordance with predefined parameters. The employee’s behavior results during working hours can be viewed in the form of reports (periodic, monthly and official) and stored on a computer in a variety of formats.