InvisiFence User Manual
|
|
- Buddy Underwood
- 5 years ago
- Views:
Transcription
1 InvisiFence User Manual Version 1.2 Date May 2016
2 Table of Contents 1. Introduction General System Components Hierarchy of system components Processing unit Connections Detection Pattern System Installation Sensitivity Test SensoGuard Command and Control software Specifications... 13
3 1. Introduction SensoGuard Develop advanced intrusion detection systems for a broad range of applications. SensoGuard Team composed of engineers with more than 10 years of experience in development of intrusion detection systems based on seismic technology for both civil and military use. Contact information: Website: sales@sensoguard.com Phone number: General InvisiFence Security System provides a comprehensive solution for perimeter protection. InvisiFence operates with seismic sensors which are installed below ground, creating an invisible perimeter fence around the secured area. The system recognizes threats whenever fluctuations are sensed in its vicinity and sends an early warning before the intrusion actually occurs. The InvisiFence is designed to provide the optimal solution for protection of perimeters, borders, prisons and large infrastructure sites.
4 3. System Components Seismic sensors- the seismic sensors sense very small ground vibrations. They transform vibration to electrical outputs. We analyze those vibration signals to detect intruders Communication cables - the communication cables connects all of the processing units of the system to the hub. All of the units get the power supply and the RS485 data through this cable Processing units the processing unit can analyze a signal from 3 seismic sensors. The processing unit analyzes the data on real time and outputs the processing result to the RS485 line
5 Hub units a hub unit can manage a line of 600m of InvisiFence processing units. The hub outputs the alerts to the user via C&C program (contact SensoGuard to get more info about our C&C program) or through dry contacts or serial communication in SensoGuard protocol (if required, we can adjust our messages to a client request).
6 4. Hierarchy of system components Every 3 seismic sensors are connected to a processing unit. Every processing unit analyzes the signals of those sensors and decides whether the signal is environmental noise or an event (footsteps, vehicle, digging). The hub collects the processing units outputs and sends the alerts to C&C computer or GSM modem. A hub is required every 600m approx. Data Flow of InvisiFence
7 5. Processing unit Connections 6. Connector 1-3 Marked Ch1-Ch3 : Connection of the seismic sensors channels 7. Connector 4 Marked COM : Configuration connection to PC using RS232 protocol 8. Connector 5-6 Marked Network In, Network Out: network connection using RS485 and power input Connect the cable connector to the panel connector (red dots face each other), you should hear a click when the connector is properly connected to the unit panel. Connect all the connectors only after deployed all the sensors it is crucial to keep the rubber cover on the connectors at all time remove them only when you connect the connectors to the processing unit (put them back on when you open the connector) Make sure you connect the sensors to the correct processing unit the first unit in the line is unit 1, the second unit is unit 2 and so on. It is important to the HUB unit that the processing units will be in the right order
8 6. Detection Pattern The seismic sensor has ball shaped detection pattern. Each sensor creates a ball shaped detection area around itself and detects every operation in this ball shaped zone. Sensor detection area InvisiFence system detection area
9 7. System Installation In terms of maintenance it is recommended to use inspection chambers for the processing units (those chambers can be with open bottom, as for the processing units are water sealed IP67 rating Preparing a trench: Dig a trench at the location of the InvisiFence system. Trench dimensions: Width=10-30cm Depth= 40cm Dig to 50cm at the locations of the sensors to be placed. (If possible, it is best to dig the whole trench to 50 cm depth)
10 Seismic sensor placement Fix the sensor at the bottom of the trench (at the proper location default distance is 6 meters between sensors)). Make sure that the sensor is straight as shown below Make sure that the sensor stuck well in the ground and doesn t move Cover the sensor gently with soil without stones and tighten lightly - so that the sensor will not move or change his angle
11 Cover the communication cables with soil without stones so that the cables will not move, and be protected from big stones or rocks 8. Sensitivity Test After finishing deploying all the sensors and connecting them in the right order to the processing units and connect all the processing units to the HUB unit you can start the sensitivity test 1. Set the sensitivity to level 1 Move 20 meters from the sensors line Wait for 30 sec Make sure there is no movement in the area Walk across the sensors line between sensors 1.1 and 1.2 Check the C&C software for an event + hear the beeping sound from the processing unit If you got an event in the C&C repeat those steps between sensors every two sensors along the sensors line. In case you don't see an event in the C&C software set the sensitivity level to 2 and repeat the test between the 2 sensors. In case you don't see an event in the C&C software set the sensitivity level one level up and check again until you receive an event in the C&C software After finishing checking the intruder event along the whole sensors line, repeat those steps for Car event (only if necessary) It is possible to set different sensitivity for each event on each processing unit
12 9. SensoGuard Command and Control software The InvisiFence system outputs alert data in the following options: Dry contacts connection Serial communication (RS232 or RS485) RF transmission GSM- via SMS messages SensoGuard command and control software The SensoGuard command and control software provides graphical user interface which includes a map view of the system installation area, and enable the operator a more convenient, user friendly way to respond to system alerts. The software includes a list of the installed processing units and hub on the field, a map view of the installed units. When the system detects an intruder, a siren sound can be played (configurable setting) and the operator can see immediately an icon in the relevant location in the map and also the alarm data in the event log.
13 10. Specifications Invisible alert system based on seismic detectors Can operate independently or integrated with existing systems Working Temperature : -40 to 70 degrees (Celsius) Relative humidity = 95% Maintenance free, easy operation (plug & play) Recommended installation depth below ground level: 4m Underground detection depth: up to 20m RoHS compliant Operating Radius per sensor(depending on the area's terrain): o Walking- up to 12m radius o Digging- up to 20m radius Outputs : RS232,RS485,Relay outputs Case Enclosure: IP67, Polycarbonate System indications Intruder Detected Sensor failure Low battery System OK message- Built in Test
SensoGuard. Seismic Security Solutions
SensoGuard Seismic Security Solutions About Founded on January 2012 Founders have extensive experience in seismic security systems Develop security solutions based on seismic technology Field proven systems
More informationG-MAX IVS R123 Vibration Sensors Perimeter Intrusion Detection System
PS-4001-48461-A G-MAX IVS R123 Sensors Perimeter Intrusion Detection System Product Specifications G-Max Security Tech Ltd a l d o r e c o t e c L td. I n t e g r a t e d S e c u r i t y s y s t e m s
More informationOperation Manual Fighter ProVision Software. Version: 0.0 Revision: 1
Operation Manual Fighter ProVision Software Version: 0.0 Revision: 1 TABLE OF CONTENTS 1. Introduction 5 2. Software Installation 5 3. PC Users 6 3.1 Introduction 6 3.2 Default Code 6 3.3 Edit PC User
More informationSECURITY SYSTEMS. ipatrol. Unattended ground sensors. indracompany.com
SECURITY SYSTEMS ipatrol Unattended ground sensors indracompany.com SECURITY SYSTEMS ipatrol The ipatrol System provides intrusion detection with image verification in wide areas with no civil works or
More informationPresented By. BEI Security
Presented By BEI Security Fiber Optic Perimeter Intrusion Detection Systems BEI Security 30 years of experience in security and surveillance Fiber optic perimeter detection Video motion detection Covert
More informationTW-8000 TAUT WIRE FENCE
TW-8000 TAUT WIRE FENCE www. rbtec. com Email: info@rbtecom GENERAL TW-8000 Product information INTRUDALERT is a powerful electronic system specifically designed for total perimeter protection of critical
More informationThe system is expanded via the RCC network with each RCC capable of passing information to and from up to 31 detection or output devices.
FireCell Radio Hub Fully addressable Wireless activation Third party approved (EN54) 2-way radio communication Loop powered Diagnostics port Range in excess of 150 metres Overview The model FCX-500-001
More informationwith internal sensor (channel 1) with an external sensor (channel 2) A-Editor software, Professional AK20 version (not for version AK4)
Examples of use Example Creating an SMS-based alarm with confirmation A project file must first be created using the A-Editor software. This project file is then stored in the alarm modem. The alarm modem
More informationSecurity made in Germany
Security made in Germany systems guard exhibits and pieces of art in collections and museums value of an object is usually only appreciated once the The object has been lost. Arthur Schopenhauer Small
More informationOctalarm-T: the latest in future-proof industrial alarm diallers
Octalarm-T: the latest in future-proof industrial alarm diallers Companies are becoming increasingly reliant on computers and technical equipment. Meaning you have to take steps to guarantee continuous
More informationCONTENT version Piccolo Object protection
CONTENT version 1.14 1: PICCOLO - WIRELESS PROTECTION... 4 HOW THE PICCOLO SYSTEM WORKS... 4 SYSTEM DESCRIPTION... 4 DETECTORS... 4 ALARM RECEIVERS... 4 CENTRAL UNIT & PC... 4 FORWARDING ALARMS (INTERFACES)...
More informationIntroducing the innovative ipids Indoor Outdoor Detection System MANUFACTURING SECURITY SOLUTIONS
Introducing the innovative ipids Indoor Outdoor Detection System 1 SENSITIVE Electronic Sensors installed on the perimeter fence, and communicating to a central computer. Can adapt to any type of fence.
More informationTYDOM 315. * _Rev.2* GSM domotics transmitter. 1. Presentation
TYDOM 5 GSM domotics transmitter ) Présentation. Presentation Delta Dore hereby declares that the equipment complies with the essential requirements and other relevant provisions of the R&TTE Directive
More informationPRODUCT CATALOGUE. Cape Town 18 Darter Road Blue Water Estate Kommetjie. Gauteng 245 Louis Botha Avenue Orchards Johannesburg
PRODUCT CATALOGUE Cape Town 18 Darter Road Blue Water Estate Kommetjie Luke Fowles - 076 161 8124 luke@providenttech.co.za Frank Fowles - 082 445 1541 frank@providenttech.co.za www.providenttech.co.za
More informationSALES SUPPORT DOCUMENT
SALES SUPPORT DOCUMENT ML-1632 MAXLOGIC SUPERVISOR GRAPHIC MONITORING AND CONTROL SOFTWARE INTEGRATED WITH ENVIRONMENTAL SYSTEMS AND MANAGING ML-1632 supervisor software is a specially developed and easy
More information>WIRELESS> ALARM SYSTEM CR200
intrusion >WIRELESS> ALARM SYSTEM CR200 INTRUSION HOME SECURITY CR200 is a Modern, Effective and Versatile 20-zone Household Security System. It is packed with simple Plug & Play functionality, designed
More informationProfessional perimeter intrusion detection system
PROTECTS YOUR PERIMETER MORE EFFECTIVELY + Detects an intruder directly on the boundary of the protected area + Suitable for various types of fences + Gains sufficient time for the security operator for
More informationV1.0. Smart Home Alarm System. User Manual. APP download via QR Code scanning. Please read the manual carefully before using.
V1.0 Smart Home Alarm System User Manual APP download via QR Code scanning Please read the manual carefully before using. Content FUNCTION PROFILE 2 THE SCHEMATIC GRAPH OF HOST 3 PROCESS OF BOOTING 6 OPERATION
More informationD3D Wi-Fi GSM Smart Alarm System -User Manual
D3D Wi-Fi GSM Smart Alarm System -User Manual D3D Wi-Fi / GSM Smart Alarm system (Model : D10). Please read all instructions carefully & follow steps for easy home installation. 1 P a g e D3D Wi-Fi / GSM
More informationWG Buried Fibre Cable Long Perimeter Detection System
WI CODE : 11954 Telephone : +44 (01295 756300 Fax : +44 (0)1295 756302 E-Mail : info@wi-ltd.com Website : www.wi-ltd.com WG Buried Fibre Cable Long Perimeter Detection System The WG Buried Cable Long Perimeter
More informationAdded password for IP setup page : Password must be in IP format!
NETWORK POWER MONITOR Release : 21 August 2014 Hardware Version : Version 7 Firmware version 1.00 PC Application Software : Version (latest)...2 Added password for IP setup page : Password must be in IP
More informationPreface. Thank you for purchasing our GSM Security Alarm System ( The System )! The System will keep your home and property safe around the clock.
Preface Thank you for purchasing our GSM Security Alarm System ( The System )! The System will keep your home and property safe around the clock. The GSM Security Alarm ( The Alarm ) adopts the most advanced
More informationLaboratory Refrigerator/Deep Freezer TC 802
External Dimension: B = 600 mm D = 615 mm H = 2000 mm Inside Dimension: Useful space on top Useful space at the bottom B = 440 mm B = 431 mm D = 435 mm D = 435 mm H = 1105 mm H = 597 mm Capacity: 254 l
More informationWith Magictrl, you can control MatiGard anytime & anywhere via your smartphone, even without data network.
MatiGard User Guide 02 Menu Feature-------------------------------------------------------------- 05 Overviews---------------------------------------------------------- 07 Read Before Using-----------------------------------------------
More informationOperation Manual For model CM706E
Operation Manual For model CM706E www.temperatureguard.com The CM706E is an environmental monitor with built in Ethernet and Cellular alarming and reporting capabilities. This unit can monitor up to ten
More information600 Range Dialer Installation Manual. Version 1.0
600 Range Dialer Installation Manual Version 1.0 The information contained is supplied without liability for any errors or omissions. No part may be reproduced or used except as authorised by contract
More informationDDS. Intruder Detection System for Surveillance and UNDERWATER Protection of Critical Infrastructures and Ships
DDS Intruder Detection System for Surveillance and UNDERWATER Protection of Critical Infrastructures and Ships DDS 03 INTRUDER DETECTION SONAR Can be integrated into Surveillance Networks Easy manual 'over-the-side'
More informationidware Idware Remote Site Monitoring Solution
idware Idware Remote Site Monitoring Solution 2 TOPIC 1. Why a Remote Site Monitoring solution is mandatory for a TELCO? 2. Remote Site Monitoring features a) Power monitoring b) Security Monitoring c)
More informationThe. Long Beach, California August 14-17, Solutions Network. Physical Security PERIMETER SECURITY TECHNOLOGIES. Leon Snyman GVI Security, Inc.
Long Beach, California August 14-17, 2005 The Solutions Network Physical Security PERIMETER SECURITY TECHNOLOGIES Leon Snyman GVI Security, Inc. Why Secure the Perimeter? Your Perimeter is Your FIRST line
More informationSMS GSM Alarm Messenger
SMS GSM Alarm Messenger Data Logging Alarm Input Relay Output Voice Temperature Humidity Analog Input Capture and Send Data via SMS Report triggered alarm via SMS Output triggered via SMS Auto pick up
More informationC&K Software What s New. Commander II Version 3.0 Monitor II Version 3.0 Satellite II Version 1.0
C&K Software What s New Commander II Version 3.0 Monitor II Version 3.0 Satellite II Version 1.0 C&K Software PC-based receiver with monitoring features Windows-based Remote programming software (Commander
More informationTURN OFF ALARM AUTO ALARM RESET WRITE A COMMENT DISPLAY THE GUARDS GUARD FUNCTION RELAY INTERFACE:...
CONTENT version 2.03 1: PICCOLO - WIRELESS PROTECTION... 3 HOW THE PICCOLO SYSTEM WORKS... 3 SYSTEM DESCRIPTION... 3 DETECTORS... 3 ALARM RECEIVERS... 3 PICCOLO SERVER UNIT... 3 FORWARDING ALARMS (INTERFACES)...
More informationPWM. Solar Charge controller with Ethernet. Solar Smart PWM 20Amp. Hardware Description : Release : 19 June 2014
Solar Charge controller with Ethernet Release : 19 June 2014 Hardware Version : Version 1 Firmware version 1 PC Application Software : Version 1.0.0.0 Hardware Description : The Solar Smart regulator was
More informationPerimeter Intrusion Detection System
System System Features & Advantages 1. Hardware Zone In hardware zone application, a perimeter is segregated into different detection zones deployed with several sets of sensing fibers. On the other hand,
More informationFiber Optic Cable Fence Disturbance Sensor
Architectural & Engineering Specification for Fiber Optic Cable Fence Disturbance Sensor Purpose of document This document is intended to provide performance specifications and operational requirements
More informationINTREPID Perimeter Intrusion Detection System
TM INTREPID Perimeter Intrusion Detection System Next Generation Perimeter Protection icropoint Cable combines patented Southwest Microwave technology with microprocessor power and laptop computer convenience.
More informationATSTORM v2. The sensor with FCES technology is connected to the interface with a communication cable.
ATSTORM v2 ATSTORM v2 is a storm detector that measures the environmental electric field. It is fully automatic, without mobile parts, robust and highly reliable The storm detector ATSTORM v2 basic configuration
More informationPIDS Sensor Installation & Maintenance. 15/03/13/Rev1/PIDS Sensor Installation & Maintenance 1
PIDS Sensor Installation & Maintenance 15/03/13/Rev1/PIDS Sensor Installation & Maintenance 1 The information contained herein contains proprietary information of ST Electronics (Satcom& Sensor Systems)
More informationThe WAVE Plus Instant Notification System for Schools and Colleges
Instant Notification System for Schools and Colleges Duress alarm has been activated in the School of Engineering! Schools strive to provide a safe environment for students and teachers. In an emergency,
More informationMobeye CM2410 GSM fire alarm communicator
PORTAL USER MANUAL Mobeye CM2410 GSM fire alarm communicator Accessory for Ei Electronics fire detector SW version 5.n Incl. CM2400 Attention! Very important This user manual contains important guidelines
More informationCombined CAN Sensor Unit Temperature, Humidity and Smoke
Combined CAN Sensor Unit Temperature, Humidity and Smoke Didactum`s IP-based monitoring devices have many uses: Monitoring of wiring closets and server room environments Remote monitoring of technical
More informationPROVEN PERIMETER PROTECTION NEW SINGLE-PLATFORM SIMPLICITY.
SMARTER PERIMETER DETECTION SYSTEMS MicroPoint II Fence Detection System MicroTrack II Buried Cable Detection System MicroWave 330 Digital Microwave Link PROVEN PERIMETER PROTECTION NEW SINGLE-PLATFORM
More informationInner Range FE3000S. Serial GSM Modem. P/No: INSTALLATION MANUAL
Revision 1.0 October. 2014 1 Inner Range FE3000S Serial GSM Modem. P/No: 998306 INSTALLATION MANUAL IMPORTANT NOTE: This Installation Manual is only relevant to Serial GSM Modems utilizing the G-Link PCB.
More informationPROJECT PROPOSAL FOR INTRUDER DETECTION SYSTEM
Middle East Technical University Department of Computer Engineering Fall 2011 PROJECT PROPOSAL FOR INTRUDER DETECTION SYSTEM BEE - TECH Çağlar Seylan _1631126 Fatih Semiz _1752476 Güner Orhan _1631050
More informationKELTRON LS 7000 ALARM MANAGEMENT SYSTEM Keltron Alarm Monitoring, Dispatch, and Reporting Software
KELTRON LS 7000 ALARM MANAGEMENT SYSTEM Keltron Alarm Monitoring, Dispatch, and Reporting Software OVERVIEW The Keltron LS 7000 Alarm Management System software and computers make up the dispatch portion
More informationNX-10 wireless keypad. To wire or not to wire?
NX-10 wireless keypad To wire or not to wire? Now your security goes where you go Our NX-10 system is fully wireless with a keypad in a designer housing. The NX-10 series goes where no security system
More informationPSM CONTROL & MANAGEMENT PRODUCT CATALOGUE. GAMATRONIC, A SolarEdge Division. 17 Hartom Street, Jerusalem , Israel
PSM CONTROL & MANAGEMENT PRODUCT CATALOGUE GAMATRONIC, A SolarEdge Division 17 Hartom Street, Jerusalem 9777517, Israel 1-800-20-70-90 Tel: +972-2-5888277 Fax: +972-2-5710663 SalesIL.Gama@solaredge.com
More informationRemote switching machines with a SMS text from your mobile phone! Remote Monitoring your assets in the worldwide by your mobile Phone!
Remote switching machines with a SMS text from your mobile phone! Remote Monitoring your assets in the worldwide by your mobile Phone! GSM SMS Controller DCS-130 User Manual Ver 1.20 Date Issued: 14-9-2010
More informationSection 9 System Operation
Section 9 System Operation Operation of the control panel is simple. Menus guide you step-by-step through operations. This section of the manual is an overview of the operation menus. Please read this
More informationSentient. Downloader Manual D4854
Sentient Downloader Manual D4854 Dycon Ltd Tel: +44 (0)1443 471 060 Fax: +44 (0)1443 479 374 Cwm Cynon Business Park Mountain Ash CF45 4ER - UK www.dyconsecurity.com sales@dyconsecurity.com TABLE OF CONTENTS
More informationMOBILE CALL GSM Alarm System User s Manual
MOBILE CALL GSM Alarm System User s Manual Profile For a better understanding of this product, please read this user manual thoroughly before using it. Contents Function Introduction (3) Alarm Host Diagram
More informationINTREPID Buried Cable Perimeter Intrusion Detection System
INTREPID Buried Cable Perimeter Intrusion Detection System TM M icrotrack, the latest addition to Southwest Microwave s INTREPID TM family of intrusion detection products, is a new buried cable intrusion
More informationproducts and services
products and services Welcome Energizers Keypads Monitors Communications Monitoring Electrical Accessories Fencing Hardware Agricultural Range 2 4 8 9 12 14 16 17 18 JVA ELECTRIC FENCING 1 Welcome to JVA
More informationCentaur TM II Cube Slave Alarm Signalling Equipment INSTALLATION GUIDE
Centaur TM II Cube Slave Alarm Signalling Equipment INSTALLATION GUIDE General Description This guide provides a summary for installing and configuring the Centaur TM Cube Slave Alarm Signalling Equipment
More informationSection 8 System Operation
Section 8 System Operation Operation of the control panel is simple. Menus guide you step-by-step through operations. This section of the manual is an overview of the operation menus. Please read this
More informationIntesisBox BACnet/IP Server - Notifier ID3000 series
IntesisBox Server - Notifier ID3000 series Gateway for integration of Notifier ID3000, ID3002, ID50 and ID60 fire panels into enabled control systems. Integrate your Notifier fire panels into your BACnet
More informationViewMatrix. Software for Online Monitoring & Control of Matrix2000 Conventional Fire Alarm Panels. Version: 2.0 Revision: 0.1
ViewMatrix Software for Online Monitoring & Control of Matrix2000 Conventional Fire Alarm Panels Version: 2.0 Revision: 0.1 CONTENTS 1. Introduction...3 2. Keyboard...5 2.1 POWER indication - Normal Operation...5
More informationLaptop / PC Programming Manual
Laptop / PC Programming Manual Doc. # Fire PC Program rev B 01.07 This Document is property of Evax Systems, Inc. The Evax Fire Solutions Programmer Components 2 1.0 System Setup 4 1.1 Interface Setup
More informationSmoke Detector and Siren. Manual
Smoke Detector and Siren Manual 004001 Smoke Detector and Siren Manual Quick Start... 2 Product Description... 2 Installation Guidelines... 3 Behavior within the Z-Wave Network... 3 Operating the Device...
More informationTechnologies Hazard management system. Inveron Hazard management system
Technologies Hazard management system Inveron Hazard management system OVERVIEW Inveron safety at a glance INTERFACES Flexibility via system independence The Inveron hazard management system from Minimax
More informationThey ll never know... LEADERS IN WIRELESS SECURITY SURVEILLANCE EQUIPMENT
They ll never know... LEADERS IN WIRELESS SECURITY C O V E R T & R E M O T E SURVEILLANCE EQUIPMENT ...but you will FM2000 is a monitored portable alarm system that has been specifically designed for use
More informationFALCON EYE Land Based Surveillance System
Land Based Surveillance System SpecOps Group is a global technology innovation leader in security systems and autonomous border protection platforms. SpecOps Group provides a unique autonomous situational
More informationPlease use authentic SATA hard drive, USB device and battery.
Note The device should be set in the room with good ventilation, far from water, hot reservoir or dust. Network Video Recorder is not designed to be used outdoor. Please use authentic SATA hard drive,
More informationINTREPID Buried Cable Perimeter Intrusion Detection System
TM INTREPID Buried Cable Perimeter Intrusion Detection System icrotrack, the latest addition to Southwest Microwave s INTREPID family of intrusion detection products, is a new buried cable intrusion detection
More informationINC. DESIGN AND INTEGRATION OF ADVANCED SYSTEMS. Multipli Cité REMOTE WATER TREATMENT MANAGEMENT SYSTEM
AUTOMATISATION INC. DESIGN AND INTEGRATION OF ADVANCED SYSTEMS Multipli Cité REMOTE WATER TREATMENT MANAGEMENT SYSTEM Multipli Cité REMOTE WATER TREATMENT MANAGEMENT SYSTEM Multipli Soft Automatisation
More informationPREVENTIVE PROTECTION PROTECCIÓN PREVENTIVA
PREVENTIVE PROTECTION PROTECCIÓN PREVENTIVA R PREVENTIVE PROTECTION ATSTORM v2 is a storm detector that measures the environmental electric field. It is fully automatic, without mobile parts, robust and
More informationIMS Operation Manual. Version 1.1. Phonetics, Inc.
IMS 4000 Operation Manual Version 1.1 Phonetics, Inc. IMS-4000 Operation Manual Every effort has been made to ensure that the information in this document is complete, accurate and up-to-date. Phonetics,
More informationACTIVE INFRARED BARRIER
Although PROTECH provides high security indoor intrusion sensors for the military and government markets, our specialty is outdoor protection. Since we first introduced our PIRAMID outdoor dual technology
More informationCold chain monitoring technologies. Facility monitoring
Cold chain monitoring technologies Facility monitoring Advanced wireless data logging system - Cobalt For various controlled environment facilities, equipments and transport conditions, real time monitoring
More informationArchitectural and Engineering Specification for a Fence-Mounted Perimeter Intrusion Detection System. FlexZone
Architectural and Engineering Specification for a Fence-Mounted Perimeter Intrusion Detection System FlexZone April 15, 2014 Page 1 of 14 G6DA0115-001 This document is intended to provide performance specifications
More informationGSM House Alarm System. User Manual. Ver 1.20 Date Issued:
GSM House Alarm System User Manual Ver 1.20 Date Issued: 2010-05-14 Table of Contents 1. Brief introduction -----------------------------------2 2. Safety Directions -----------------------------------2
More informationAll tested. Easy Series Intrusion Control Panel Making security easy featuring wlsn* * wireless Local SecurityNetwork
All tested Easy Series Intrusion Control Panel Making security easy featuring wlsn* * wireless Local SecurityNetwork 2 A powerful yet straightforward intrusion control panel A powerful intrusion control
More informationThe Genesis. Wireless PIR System. Se t t i n g n e w s t a n d a r d s f o r P I R d e t e c t i o n. BS8418 Compliant
Se t t i n g n e w s t a n d a r d s f o r P I R d e t e c t i o n The Genesis Wireless PIR System BS8418 Compliant S e t t i n g n e w s t a n The Genesis Wireless PIR System BS8418 compliant The GENESIS
More informationEthernet General Purpose
Ethernet General Purpose Technical Manual Revision 1.03 8 November 2013 Pakton Technologies IO PAE224 Ethernet GPIO Manual.docx Page 1 of 22 Revision 1.03 Last updated 8/11/2013 Table of Contents INTRODUCTION...3
More informationThe Kentec driver connects to the Kentec Syncro range of fire detection panels. Available for Commander and ObSys.
The Kentec Driver The Kentec driver connects to the Kentec Syncro range of fire detection panels. Available for Commander and ObSys. This document relates to Kentec driver version 1.1 to 1.3 Please read
More informationRevision November 2013 JVA Technologies. Ethernet General Purpose IO Technical Manual
Revision 1.03 8 November 2013 JVA Technologies Ethernet General Purpose IO Technical Manual www.jva-fence.com.au Table of Contents INTRODUCTION...3 Scope and Purpose...3 Glossary...3 SPECIFICATIONS...4
More informationBURGLAR ALARM PANEL BS-468
BURGLAR ALARM PANEL BS-468 Contents 1. Description... 3 2. Instructions for the user... 4 2.1Basic operations... 4 Complete system.... 4 Split system.... 4 2.2 Armed system indication... 5 2.3 Advanced
More informationProtecting Station Platform & Rail Perimeters. TransitVUE IDS The Latest in Fiber Optic Station Platform & Rail Perimeter Security Sensor Systems
TransitVUE IDS The Latest in Fiber Optic Station Platform & Rail Perimeter Security Sensor Systems Transit Applications Station Platforms and Security Gates Train Track & Highway-Rail Intersections Fenced
More informationCAN unit for Analog Sensors
CAN unit for Analog Sensors Didactum`s Monitoring Systems have many uses: Monitoring of wring closets and server room environments Remote monitoring of technical rooms in branch offices Monitoring of power
More informationHERCULES 6 GRAPHICS SYSTEM
HERCULES 6 GRAPHICS SYSTEM USER MANUAL Protec Fire Detection PLC, Protec House, Churchill Way, Nelson, Lancashire, BB9 6RT. Telephone: +44 (0) 1282 717171 Fax: +44 (0) 1282 717273 Web: www.protec.co.uk
More informationTS400. Operating Manual. Test Station for Microtector II Series (G450/G460)
Operating Manual TS400 Test Station for Microtector II Series (G450/G460) GfG GESELLSCHAFT FÜR GERÄTEBAU MBH KLÖNNESTRASSE 99 44143 DORTMUND, Germany TEL. +49 / (0)2 31 / 5 64 00 0 FAX +49 / (0)2 31 /
More informationGSM POWER ALARM SYSTEM
GSM POWER ALARM SYSTEM Design Scheme GSM Alarm Receiver PH-008 Centre Monitoring Software PH-BC110 Summarize The stolen of the power facilities such as transformer, cable line and so on are serious both
More informationIP & SMS Alarm Communicator
Models: WGSMSC You deserve to feel safe, secure & protected IP & SMS Alarm Communicator Quick Start Guide Thank you for purchasing a Watchguard IP & SMS Alarm Communicator This Quick Start Guide covers
More information- Basic information of Laser Scan detector
Laser Scan detector RLS-3060 - Basic information of Laser Scan detector OPTEX CO., LTD. Product overview Laser Scan detector RLS-3060 utilises Time of Flight technology. RLS-3060 does not require any PC
More informationFlexPS. Architectural & Engineering. Specification for FlexPS. Architectural/Engineering Specification for a
Architectural/Engineering Specification for a Fence-Mounted Perimeter Intrusion Detection System FlexPS Disclaimer Senstar, and the Senstar logo are registered trademarks, and FlexPS, Silver Network and
More informationWG Buried Cable Perimeter Detection System
Telephone : +44 (01295 756300 Fax : +44 (0)1295 756302 E-Mail : info@wi-ltd.com Website : www.wi-ltd.com WG Buried Cable Perimeter Detection System The WG Cable Detection Sensor is a covert outdoor perimeter
More informationTOTAL PERIMETER SOLUTION
TOTAL PERIMETER SOLUTION INTRODUCTION Since 1986 RBtec has been recognized as a leading technology company specializing in the design, development, and manufacturing of quality Outdoor Perimeter Detection
More informationGSM RFID VOICE Alarm System
GSM RFID VOICE Alarm System User s Manual For a better understanding of this product, please read this user manual thoroughly before using it. CONTENTS [Function Instruction] [Control Panel] Control Panel
More informationControl panel «Contact GSM-5-2»
Control panel «Contact GSM-5-2» Operating Manual Rev. 1.1 Saint Petersburg, 2017 Table of Contents Introduction 4 Panel Overview 5 Designation 5 Capabilities 6 Specifications 9 Design 11 Delivery Package
More informationSection PERIMETER SECURITY SYSTEMS
Section 28 16 43 PERIMETER SECURITY SYSTEMS PART 1 GENERAL 1.1 SUMMARY A. Provide and install a perimeter security system as herein specified for the purpose of detecting entry into a designated security
More informationFlexibility. adjusted to specific needs of a client.
IFTER EQU IFTER is a well known manufacturer of the building management systems software, which includes: Fire Alarm Systems (FAS), Access Control Systems (ACS), Intruder & Hold Up Alarm Systems (I&HAS),
More informationOntech GSM 9040/50. Reference Manual English -1 -
Ontech GSM 9040/50 Reference Manual English -1 - Content Welcome... 5 This manual... 5 Text styles... 5 Support... 5 Disclaimer... 5 Overview... 6 Accessories... 6 External temperature sensor 9901... 7
More informationPowerMaxComplete. All-in-one Professional Grade Wireless Security
PowerMaxComplete All-in-one Professional Grade Wireless Security PowerMaxComplete Visonic's PowerMax Complete is an innovative all-in-one professional grade wireless security system for homes and small
More informationCO SENSOR CARBON MONOXIDE DETECTOR
CO SENSOR CARBON MONOXIDE DETECTOR One device, many features The FIBARO is an ultra-light, compact, battery-powered carbon monoxide detector, designed to be placed on a wall. Its high sensitivity allows
More informationMessenger Wireless Lock Access Network
Messenger Wireless Lock Access Network SAFLOK TM introduces the next era of online communication with Messenger TM operating on a ZigBee-compliant platform. The ZigBee Prostack protocol is an internationally
More informationСontrol panel Contact GSM-9N
Сontrol panel Contact GSM-9N Data sheet Device identification number 2 1. General Information The Contact GSM-9N control panel (hereinafter referred to as the device) is designed for setting up security
More informationDI220 Using the Optional Docking Station The maintenance and operating functions of the Micro IV can be automated with the Micro IV Docking Station.
DI220 Using the Optional Docking Station The maintenance and operating functions of the Micro IV can be automated with the Micro IV Docking Station. The following steps outline the correct sequence to
More informationFitting instructions
Fitting instructions Ver. 02_English 02. 11. 2017 CONTENT 1 INTRODUCTION... 3 2 FITTING THE PATRIOT EU... 3 2.1 Electronic diagram... 3 2.2 Fitting instructions... 4 2.3 Final placement... 4 2.4 Alarm
More information1. User features of the GSM dialer
1. User features of the GSM dialer The JA60GSM dialer offers many useful features described in detail below. The installer should properly demonstrate the use of the system to the user after installation
More informationGSM Alarm System. S120 User Manual. Ver 1.00 Date Issued:
GSM Alarm System S120 User Manual Ver 1.00 Date Issued: 2010-09-01 Website: Http://www.thebest-plus.com Table of Contents 1. Brief introduction -----------------------------------2 2. Safety Directions
More information