Duration: 120 Days
To the Safety of Public members and Anti terrorism measures, anti drone system is being introduce to prevent fly away drones from penetrating prohibited areas. We work with our partners from Israel to provide consultancy and solution to end customers.
Our AntiDrone system composed of several layers of defence, starting from detection layer using different type of sensors, followed by mitigation solutions as jammers (remote control, gps etc.), and some unique approaches for hijacking and safe landing. Contact us to find out more...
Duration: 99 Days
etectors of cell phones, weapons and other contraband.
Cellsense is built for the job
Duration: 100 Days
VOIP means Voice over Internet Protocol, and is an Internet protocol that has been optimised for the transmission of voice through the Internet or through other packet switched networks. VOIP Intercom is often used abstractly to refer to the actual transmission of voice between two or more workstations, rather than the protocol. Using VOIP you can connect by voice for free with anyone anywhere in the world that has the same protocol. It is also possible to use the system to connect to a dial up telephone – sometimes for free and sometimes for a small charge. All that you need to have VOIP Intercom is a fast Internet connection, in other words a broadband facility.
VOIP Intercom has been slow to take off in South Africa but is set to replace the old-fashioned telephone systems entirely in the future. Just when fibre optic cables were replacing the old copper wire cables, something comes along to replace the fibre optic itself. The deregulation of the telecommunications industry was announced in September 2004 legalising the use of VOIP for all telephone communications. VOIP Intercom is set to rejuvenate the world’s telecommunications by taking a further step into the future.
A "PA system" (commonly referred to as a public address or paging system ) is an amplification system used to dependably distribute sound (recorded and/or live messages) to overhead speakers, a call box, throughout an office, warehouse, campus, etc, in both business and emergency situations. "PA Over IP" refers to PA paging and intercom systems that use an ethernet network instead of a traditional analog wiring. The benefits of PA Over IP include centralized administration and control, bridging remote sites together via a LAN or WAN, and integration with VoIP business phone systems.
We offer a fully digital networked reliable and high quality voice communication systems like PA and security intercom systems. The leading edge data communications over Ethernet networks allowing the systems to be very expandable with virtually an unlimited number of configuration options. Using existing Ethernet networks and one Ethernet cable for connection of each system component, provides a simple cost effective installation solution.
Duration: 200 Days
Perimeter fencing is an effective initial deterrent to intruders, with metal fences being the most common form of physical barrier. However, the determined intruder can breach any type of fence structure, often by cutting through or climbing over. Many electronic security systems focus on detecting intruders after entry to property. This often alerts police or security too late to be able to prevent an intruder from achieving his objective. Intruders make the most of the time delay between entering the property and response by security staff or police support following subsequent alarm activation.
A well-designed perimeter fence will delay an invader, providing an early opportunity for electronic detection. Special system is designed to pick up vibrations as soon as any contact is made with the fence. A security system which incorporates alarm as soon as an attack starts. During the time taken to breach the fence, the area of attack can be located, security staff mobilised and CCTV, lights and sirens activated. This means that the control of the situation stays with the security service and the attack can often be prevented. A further advantage of early detection is the potential for saving the fence from repairs, which are costly, represent a security risk while awaiting repair, and weaken the defenses in further attacks.By detecting the first contact made by an intruder, our system is a ‘primary’ detection system. Overall security can be enhanced by secondary detection systems, such as Infra Red and Microwave beams, which can track intruders inside the perimeter.
There are two types of bollards; Traffic regulating Bollard which is used to control or direct road traffic and a High Security Crash Rated Bollard which is used in high security areas to keep vehicles out of the secured area. Their main function is to reduce the severity of the impact from errant vehicles. They also alert drivers to the presence of bus stops, especially during nighttime, and thus protect the commuters at the bus stops. Safety bollards are generally installed at bus stops along high speed roads, residential, parking, industrial and high security areas or sites. We design and build physical perimeter protection barriers like perimeter fence and bollards. We also offer the perimeter intrusion detection system range from small to large area perimeter up to 40km per controller.
Road blocker provides a high level of security against unauthorized vehicle access where excavation depth is limited. Designed to withstand substantial direct impact forces, the Blocker can protect sites from extreme aggressive attack.
Car Park System
Automated car parking management system is basically an architecture, designed in such a way so as to manage many car-park areas in which each car-park area is equipped with an automatic till. This system is enabled with an entry gate and an exit gate with closed circuit television cameras for capturing the image of the number plate of a vehicle on its way in and out respectively. Automated Car Parking Management communicates by the medium of internet with a remote control center.
Automated Car Parking Management System offers state-of-the-art parking management system that lives up to the requirements of professional and innovative management of modern car parking. In this automated system, we can provide car-parking systems for both ground level parking and multi-storey car parking with several features. These features include: • Access to the area • Control of vehicle flows • Manual and automatic mode of payments • Can supply account and administrative statements to the authorised person • Access control 24x7 with registration plate recognition • Automatic operation of gates and retractable posts • Schedule control • Time and client account management • Public and private car park management Automated car parking is fully automatic, centralized solution for your multi-site, multi-zone car parks, which is available 24x7 throughout the week. As we know, it is based on number plate recognition hence very easy to use.
• Security for public car parks,company car parks, banks, stations, administrations, etc.
• Access control for hotels, clubs, camp-sites, etc
• Access control for industrial suppliers and logistics
• Automatic invoicing Automated Car Park Management system can also be integrated with car park management software that can handle:
• Site layout • Up-to-date users file
• Schedule per control point / user
• Number of available parking spaces per zone • In & out flow report
• Parking time / cost management
• Quotas in shared car parks In this system, large parking sites can be managed by interconnecting several individual sites.
All access points are then centrally managed from a centralised server. An automated car parking system comprised of a parking rack and at least one car-lifting feeder. The parking rack is divided into a plurality of parking spaces. This car-lifting feeder has a pair of comb-like wings for carrying a car into a pair of comb-like platforms, which are made on each parking space in the parking rack. Automated Car parking management allows for an error-free, fast read, non-duplicatable alternative to the traditional means of site security. With a variety of transponder form factors that can be mounted on or within the vehicle, people can enter a secured area without opening a door or a window to obtain authorization. By automated car parking management system, we can accommodate more cars in less space. This formula can be applied to almost any city in the world. This is probably the prime reasons why automated car park systems are a very attractive alternative to conventional car parking systems by making use of available space in more efficient manner.
Duration: 278 Days
There was a time when the term "data" referred exclusively to computer text information. But today, the definition of data has expanded to include any piece of communication that can be expressed in the bits and bytes of the digital world. This can range from text to graphics; from voice to music; from simple emails to sophisticated web content.
The rapid growth of the Internet has enhanced the role of data communications in modern life. Computer networks are the conduits and the floodgates for this ocean of information, which is now being used to spur technologies such as mobile computing, wireless communications, high-speed broadband, instant messaging, personal digital assistants and other innovations. An entire generation of hardware-including hubs, bridges, switches and routers-was developed to support this modernization. At the same time, protocols and standards are in constant development and refinement to assure that these new information appliances share a common "language" in order to work effectively together.
We design and build the data transmission medium like structured cabling, fibre optical cabling and wireless technology.
Duration: 78 Days
We offer Wiser Home Automation system from Schneider Electric.
Home Automation is all about flexibility, functionality & luxury brought to your home. It’s about adding convenience and security to your lifestyle. For example, being able to press one a button on Touch-screen and create a complete mood in your home by closing curtains, dimming groups of lights to defined levels, and arming the exterior security zones of your home. If you’ve forgotten to arm the security system, the system allows you to do so from the comfort of your office using access through MicroSoft Media Centre. If you want to turn the air-conditioning on before you get home, you can do so from the convenience of your car. Also, imagine… when you come home and push the button on your remote to open the garage door, the security system disarms, “welcome home” lighting comes on if it is at night, your favourite CD starts playing softly throughout the home, the air-conditioning system starts cooling or heating to your desired temperature etc. Wiser can be tailored to do exactly what you want it to do.
Duration: 30 Days
Solar powered electrical generation relies on heat engines and photovoltaics. Solar energy's uses are limited only by human ingenuity. A partial list of solar applications includes space heating and cooling through solar architecture, potable water via distillation and disinfection, daylighting, solar hot water, solar cooking, and high temperature process heat for industrial purposes.To harvest the solar energy, the most common way is to use solar panels.
Solar technologies are broadly characterized as either passive solar or active solar depending on the way they capture, convert and distribute solar energy. Active solar techniques include the use of photovoltaic panels and solar thermal collectors to harness the energy. Passive solar techniques include orienting a building to the Sun, selecting materials with favorable thermal mass or light dispersing properties, and designing spaces that naturally circulate air.
An uninterruptible power supply, also uninterruptible power source, UPS or battery/flywheel backup, is an electrical apparatus that provides emergency power to a load when the input power source, typically the utility mains, fails. A UPS differs from an auxiliary or emergency power system or standby generator in that it will provide instantaneous or near-instantaneous protection from input power interruptions by means of one or more attached batteries and associated electronic circuitry for low power users, and or by means of diesel generators and flywheels for high power users. The on-battery runtime of most uninterruptible power sources is relatively short—5–15 minutes being typical for smaller units—but sufficient to allow time to bring an auxiliary power source on line, or to properly shut down the protected equipment.
While not limited to protecting any particular type of equipment, a UPS is typically used to protect computers, data centers, telecommunication equipment or other electrical equipment where an unexpected power disruption could cause injuries, fatalities, serious business disruption or data loss. UPS units range in size from units designed to protect a single computer without a video monitor (around 200 VA rating) to large units powering entire data centers, buildings, or even cities.
We offer solutions to reliable, efficient and green energy requirements with wide range of solar power products and UPS systems.
Duration: 30 Days
RFID (Radio Frequency Identification) is a technology that uses radio wave to send/receive data between a reader and an electronics tag attached to an object for identification, monitoring and tracking purpose. We offer a comprehensive RFID solution by providing a wide range of products and technologies from industry leading manufacturers.
Duration: 29 Days
Duration: 23 Days