The document summarizes security services provided by Al-Hadaf Services Co. Ltd (HASCO). HASCO is a member of international security organizations and provides a range of security services including guarding, cleaning, pest control, and safety systems. It uses advanced technology from international companies for services like CCTV, access control, and intruder detection systems. HASCO aims to ensure safety using modern security systems and specialized technical services.
A perfect range IP-based Video Solutions for key industries. With KEDACOM technologies, comprehensive video surveillance / video solutions can be developed that are analytics-enabled and robustly customised with KEDACOM SDK. We reserve the right to modify the brochure's contents with enhancements in technology without prior notice.
Kedacom has release an Intelligent Tracking System to facilitate smart city and safe city initiatives for governments and corporations to enhance their security programs. The system has built-in artificial intelligence algorithms and performs some human cognitive functions. This leads to an increase in Return on Investment and also reduces dependence on manpower and human-related operational errors. Kedacom also ensures that the system is always up to date with timely software releases and technical support.
KEDACOM - Recognitive Tracking System (v4.2) BFKEDACOM
An intelligent video solution system that recognises people and objects using their key characteristics and generates big data analytics for further internal research. We reserve the right to modify the brochure's contents with enhancements in technology without prior notice.
Kedacom - video surveillance product catalog 2016 6.2 bfKEDACOM
This is the latest video surveillance product catalog from KEDACOM featuring the best of breed products and solutions for 2016. We reserve the right to update our catalog with new products or modifying existing ones without prior notice.
Digital Watchdog DW-VF960H161T User ManualJMAC Supply
Buy the Digital Watchdog DW-VF960H161T at JMAC Supply.
https://www.jmac.com/Digital_Watchdog_DW_VF960H161T_p/digital-watchdog-dw-vf960h161t.htm?=slideshare
An Access Control System can be used for nearly any door that you want to monitor access, Interior and Exterior door can easily be supervised with readers, contacts, and array of locking devices to suit your needs. Vraj are easily integrates to make access control as easy as possible to implement in your facility
A perfect range IP-based Video Solutions for key industries. With KEDACOM technologies, comprehensive video surveillance / video solutions can be developed that are analytics-enabled and robustly customised with KEDACOM SDK. We reserve the right to modify the brochure's contents with enhancements in technology without prior notice.
Kedacom has release an Intelligent Tracking System to facilitate smart city and safe city initiatives for governments and corporations to enhance their security programs. The system has built-in artificial intelligence algorithms and performs some human cognitive functions. This leads to an increase in Return on Investment and also reduces dependence on manpower and human-related operational errors. Kedacom also ensures that the system is always up to date with timely software releases and technical support.
KEDACOM - Recognitive Tracking System (v4.2) BFKEDACOM
An intelligent video solution system that recognises people and objects using their key characteristics and generates big data analytics for further internal research. We reserve the right to modify the brochure's contents with enhancements in technology without prior notice.
Kedacom - video surveillance product catalog 2016 6.2 bfKEDACOM
This is the latest video surveillance product catalog from KEDACOM featuring the best of breed products and solutions for 2016. We reserve the right to update our catalog with new products or modifying existing ones without prior notice.
Digital Watchdog DW-VF960H161T User ManualJMAC Supply
Buy the Digital Watchdog DW-VF960H161T at JMAC Supply.
https://www.jmac.com/Digital_Watchdog_DW_VF960H161T_p/digital-watchdog-dw-vf960h161t.htm?=slideshare
An Access Control System can be used for nearly any door that you want to monitor access, Interior and Exterior door can easily be supervised with readers, contacts, and array of locking devices to suit your needs. Vraj are easily integrates to make access control as easy as possible to implement in your facility
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Security system with face recognition, sms alert and embedded network video m...ijsptm
Even though there are various security systems consuming large power are available in market nowadays,
robbery rate is very high. We are proposing a novel system to prevent robbery in highly secure areas with
lesser power consumption. This system has face-recognition technology which grants access to only
authorized people to enter that area. If others enter the place without access using some other means, then
the system alerts the security personnel and streams the video captured by the security camera. The facerecognition
is done using PCA algorithm. The video transmitted is compressed and transmitted by ENVMT.
By using this ENVMT, the video can play with lesser bandwidth consumption, latency and jitter.
Why do you need a voice evacuation system? This presentation explains the benefits of installing a VA system over the standard 'bells & sounders' option of a fire alarm.
Bio Lynx is another masterpiece from Star Link that serve its purpose of attendance perfectly. It helps to manage the work force properly and allows you to have a look on the exact working time of employees. It features capacity storage of 5,00,000 records while 9560 finger templates can be stored in it.
Critical Facilities have a continued need for efficient security, especially pertaining to protecting their perimeters. Facilities must actively monitor and respond to theft, unauthorized intrusions, safety events and potential terrorist activities. The ability to monitor a wide range of events over a vast amount of area in varied weather conditions, while accurately identifying potential threats and reacting is a complicated scenario. The solution calls for knowledgeable personnel and accurate sensors that work together to quickly assess a situation and react to it. This slide share looks at how video analytics can be used to address the needs encountered when protecting a critical facility’s perimeter.
[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...CODE BLUE
Air-gapped networks are isolated, separated both logically and physically from public networks. For example, military, industrial, and financial networks. Although the feasibility of invading such systems has been demonstrated in recent years, communication of data to/from air-gapped networks is a challenging task to attackers to perpetrate, an even more difficult threat to defend against.
New methods of communicating with air gapped networks are currently being exposed, some advanced and difficult to mitigate. These new found vulnerabilities have wide reaching implications on what we considered to be a foolproof solution to network security –the placement of a physical air gap.
But it doesn’t stop there – new techniques of covertly getting information in and out of air gapped networks are being exposed. Thus it is important not only to publicize these vectors of attack, but their countermeasures and feasibility as well.
In this talk, we will outline the steps an attacker must take in order to bridge an air gapped network. We will review the state-of-the-art techniques over thermal, radio, and acoustic channels, and discuss each one’s countermeasures and feasibility. Most of techniques in this talk were discovered in our labs by researcher Mordichai Guri under the supervision of Prof. Yuval Elovici.
--- Mordechai Guri
Mordechai Guri is an accomplished computer scientist and security expert with over 20 years of practical research experience. He earned his Bsc and Msc Suma Cum Laude, from the computer science department at the Hebrew University of Jerusalem.
--- Yisroel Mirsky
Yisroel Mirsky is a Ph.D. candidate supervised by Prof. Bracha Shapira and Prof. Yuval Elovici, in the department of Information Systems Engineering in Ben-Gurion University.
--- Yuval Elovici
Yuval Elovici is the director of the Telekom Innovation Laboratories at Ben-Gurion University of the Negev (BGU), head of BGU Cyber Security Research Center, and a Professor in the Department of Information Systems Engineering at BGU.
This is our brand new product, 992BK - Video Door Phone. The system is an intelligent product for home, office and business security based on advanced CCTV
system. It maximizes safety by seeing the visitor before opening the door.
Even in the dark, night vision with infrared leds makes you identify the visitor.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Security system with face recognition, sms alert and embedded network video m...ijsptm
Even though there are various security systems consuming large power are available in market nowadays,
robbery rate is very high. We are proposing a novel system to prevent robbery in highly secure areas with
lesser power consumption. This system has face-recognition technology which grants access to only
authorized people to enter that area. If others enter the place without access using some other means, then
the system alerts the security personnel and streams the video captured by the security camera. The facerecognition
is done using PCA algorithm. The video transmitted is compressed and transmitted by ENVMT.
By using this ENVMT, the video can play with lesser bandwidth consumption, latency and jitter.
Why do you need a voice evacuation system? This presentation explains the benefits of installing a VA system over the standard 'bells & sounders' option of a fire alarm.
Bio Lynx is another masterpiece from Star Link that serve its purpose of attendance perfectly. It helps to manage the work force properly and allows you to have a look on the exact working time of employees. It features capacity storage of 5,00,000 records while 9560 finger templates can be stored in it.
Critical Facilities have a continued need for efficient security, especially pertaining to protecting their perimeters. Facilities must actively monitor and respond to theft, unauthorized intrusions, safety events and potential terrorist activities. The ability to monitor a wide range of events over a vast amount of area in varied weather conditions, while accurately identifying potential threats and reacting is a complicated scenario. The solution calls for knowledgeable personnel and accurate sensors that work together to quickly assess a situation and react to it. This slide share looks at how video analytics can be used to address the needs encountered when protecting a critical facility’s perimeter.
[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...CODE BLUE
Air-gapped networks are isolated, separated both logically and physically from public networks. For example, military, industrial, and financial networks. Although the feasibility of invading such systems has been demonstrated in recent years, communication of data to/from air-gapped networks is a challenging task to attackers to perpetrate, an even more difficult threat to defend against.
New methods of communicating with air gapped networks are currently being exposed, some advanced and difficult to mitigate. These new found vulnerabilities have wide reaching implications on what we considered to be a foolproof solution to network security –the placement of a physical air gap.
But it doesn’t stop there – new techniques of covertly getting information in and out of air gapped networks are being exposed. Thus it is important not only to publicize these vectors of attack, but their countermeasures and feasibility as well.
In this talk, we will outline the steps an attacker must take in order to bridge an air gapped network. We will review the state-of-the-art techniques over thermal, radio, and acoustic channels, and discuss each one’s countermeasures and feasibility. Most of techniques in this talk were discovered in our labs by researcher Mordichai Guri under the supervision of Prof. Yuval Elovici.
--- Mordechai Guri
Mordechai Guri is an accomplished computer scientist and security expert with over 20 years of practical research experience. He earned his Bsc and Msc Suma Cum Laude, from the computer science department at the Hebrew University of Jerusalem.
--- Yisroel Mirsky
Yisroel Mirsky is a Ph.D. candidate supervised by Prof. Bracha Shapira and Prof. Yuval Elovici, in the department of Information Systems Engineering in Ben-Gurion University.
--- Yuval Elovici
Yuval Elovici is the director of the Telekom Innovation Laboratories at Ben-Gurion University of the Negev (BGU), head of BGU Cyber Security Research Center, and a Professor in the Department of Information Systems Engineering at BGU.
This is our brand new product, 992BK - Video Door Phone. The system is an intelligent product for home, office and business security based on advanced CCTV
system. It maximizes safety by seeing the visitor before opening the door.
Even in the dark, night vision with infrared leds makes you identify the visitor.
Types Of Proactive Security Solutions For Self-storageNexlar Security
The self-storage units and the contents within are protected by gates and security fences, which are two of the most crucial components of a storage facility. Many security gates have an electronic passcode that requires self-storage facility management and unit tenants to present unique codes in order to get access to the facility (and get past the gate). Protective fences also improve the curb attractiveness of Self Storage System Installation facilities.
The best way to efficient maintaining and securing your business operation is through monitoring.
Constantly checking your essential equipment is always been ways to prevent failure and unexpected break down however due to fast changing society manual monitoring is already out of league.
Linkwise developed it’s solution for this dilemma, in order to make an efficient, cost-effective and reliable monitoring system that is capable to send a critical alarm via SMS text message and Email.
For more information Visit: https://linkwisetech.com/
This presentation is about the security which is the utmost priority and need now. The perimeter security covers our surroundings and keep us safe from the vulnerabilities and mishap to be happen. We have described the security systems in detail.
The use of long range badges improves the security level in mining, tunnel construction or buildings, allowing the control of restricted areas, locating people for safety purposes and statistical safety reports.
bioaccez.com
Started to create milestones, we, Digital Enterprises marked our presence in the year 2011 and operate in the manufacturing/servicing of Fire Alarm System, Fire Extinguisher Security Alarm System, CCTV Servellance System since 3 years. Our quality services products have been always appreciated by our clients. Our spontaneous attitude and confident approach in offering an excellent range of Fire Extinguisher Security Alarm System, CCTV Servellance System, SDVR Surveillance System, NVR, Biometric Access Control , Time Attendance Video Door Phone, Metal Detector, Backup Storage Device, Analog Camera, IR Camera, PTZ Camera, Dome Camera, High Resolution Day & Night Camera, Auto Dialer, Security Cash Bag Alarm and Banking Security Alarm System has deepened our roots in the market. We, Digital Enterprises breathe with the aim of fully satisfying our clients with our high-quality products services. We are a unit of highly experienced professionals, all of them contributing at the best of their potentials to offer the highest degree of efficiency and client satisfaction.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
3. MEMBER OF INTERNATIONAL
PROFFISIONAL SECURITY ASSOCIATION
( Member of BRITISH STANDARD INSTITUTE(BSI
( Member of SECURITY INSTITUTE (UK
( Certificate of compliance to security industry authority (SIA
( IPSA)
عضو منظمة خبراء المن العالمية
4. Why HASCO?
Safeguarding Properties
Providing body-guarding
Providing Office Services (Various)
Cleaning & Pests Control
Provision of guards and labor force
Actively using Technology in Safety &
Protection
Your Safety Depends on Your Choice
6. Our Specialized Services
Safety & Protection of institutions against fire,
theft and destruction.
Providing Safety & Protection Systems.
Provision, control & maintenance of Alarms
Body-guarding
Mobile & Static Guarding
Control of Gates & Receptions
Cleaning Hygiene & Pests Control
Whatever your business, you need HASCO
services!
7. International Companies:
Position Technology (Canadian) Entrance Control Systems
Deltavistion (Canadian) Close Circuit TV
Paradox (Canadian) Burglar Alarms
Vista Box (German) Network Image Transfer
Tomsed Corp (English) Automatic Doors
Cadex (American) Close Circuit TV`
No limit to the technology we provide!
8. Advanced Safety & Security Systems:
HASCO directly import Safety &
Protection Systems from renowned
international companies to ensure
warranty and spare parts.
9. Why?
In modern world crime witnessed
advancement in its technique. With the
limited ability of man to protect himself, the
need for using modern technology is
inevitable. Furthermore, the technology in
the field of Safety & Protection is witnessing
almost daily advancement.
HASCO Technical Department (TD) is living
evidence of its interest in modern
technology.
The TD started to import and execute many
Systems and Safety Project, among them
are:
10. Network Camera SONY
•This is dome-shaped color video camera
¼ type Super HAD CCD .
•Supports PoE (Power of Ethernet
•The camera is supplied with the IP setup
Program for easy network setting.
•The camera is supplied with the IP setup
Program for easy network setting.
•The best picture quality is available in thw lowest light degree
(0.8 lux) to the object (in the color mode).
•Includes the Vare-focal auto iris lins as the standard
equipment. The focal length of the lens is from 3.0 mm to 8.0
mm.
11. Closed Circuits )
(TV
This system is a 24-hours surveillance
service which cover entrances and desired
locations. CCTV consists of the circuit,
different cameras, monitors, recording and
distribution equipment.
14. Canadian and
German cameras
with special
specifications for
indoors and
outdoors use.
Cameras with OUTOIRIS
automatically control lens
sensitivity to light .
15. Colored Cameras are sensitive and can
take images day and night without a need
for light source.
Range and angle of vision can be
controlled by using various size lenses
Motorized Zoom Lens can be used to
control image size as required.
17. Monitors are of high resolution and
different sizes.
DUPLEXER can merge images from
more than 4 cameras in one monitor.
Switcher can connect many cameras and
allow showing images sequentially on one
monitor.
18. All situations can be recorded on Time
Lapse or normal VCR cassettes with
date & time for easy reference.
19. DSP COLOR - KT&C
•1/3" EX view CCD
•0.01 LUX / F1.2
•537(H)X505(V)270K
•Auto Iris Lens Control
21. 16-Camera Digital Multiplex Recorder Now
Available with Continuous Archive! 4 Internal
Hard-Drives Providing up to 4 Month High-
Quality Digital Recordings
Scaleable Distributed Video
Quick And Easy Copy to Internal CD-Writer
Maximum Recording Rate up to 120PPS
(NTSC), 100PPS (PAL) Variable Record Rate
per Camera Video Motion Detection - Search
for Movement in a Particular Area of an Image
Network Integration - Remote Viewing from
Any Networked PC
22. Accessories can be added to transfer
audio-visual materials.
Cameras can be networked to transfer
audio-visual materials for long
distances through normal telephone
lines or via ISDN.
23. Access Control Systems:
1. One Door Standalone
2. Access Control Network Systems:
A) Magnetic
B) Proximity
24. Access Control System Network
One network controlled by one
PC and one software. It can be
customized and/or can be
modified to function as Time &
Attendance System.
25. HASCO has a device from Position
Technology Co. with magnetic cards
using proximity technology .
User need to move his/her card near
the system instead of inserting it
inside the machine. This ensure cards
long use without damage an
advantage over old systems.
26. How to Operate the System?
Special software in the control room
Computer controls “Cards Reader”
placed at door(s) fronts.
Every card will log bio data, time in and
out as well as times for meals, rest or
emergency out-of-office trips.
27. Staff and authorized persons can be
allowed to open doors through reading
data on their electronic cards.
The Software controls all ins and outs
and store them and transfer them to the
Computer in the control room.
28. The system controls staff ins
and outs with the advantage of
controlling shifts. Shifts times
can be programmed to allow
authorized personnel only to
enter at specified time(s).
29. Some staff can be provided with any-
time permission to enter by
programming their cards accordingly.
Programmer can add new cards
and/or terminate any undesirable
cards such as missing or expired
cards.
30. The System allow one permission for
entrance. If any other person tries to
enter with previously used card a
message will appear indicating that the
owner of the card is already in,
consequently denying the other person
access.
Card Reader can be placed at reception
desk or at doors where special access
is required.
31. A report can be printed and/or stored in
a special file. The report comprises of
information on users like:
1. Working days of the user.
2. Time log of ins and outs.
3. Ins and out remarks.
4. Total hours worked.
5. Time-outs during working hours.
32. One person can control the system
via a computer where all data on
every card are displayed such as
the bio data, time log, and other
info like intrusion, door status
(close/open) and the status and
location of all Readers in the
building (if many).
33. Doors can be closed and opened from
the control room, especially at
emergencies.
Position of any card user can be
determined in the building.
The System has a backup battery which
switches on instantly during power
failure.
34. System Controller has big memory for
storing data, especially at times when
connection with control room
computer is disrupted. All activities
will be recognized and stored when
connection is restored.
35. Stand Alone Access control
These systems are excellent for controlling
access to doors via secret codes or by
cards. Such systems require no computer
network connection.
36. Automatic doors and entrances
HASCO controls doors and entrances
with sophisticated systems.
37. Intruder Detection
Systems:
These systems launch voice
These systems launch voice
alarms if intruder(s) pass or
alarms if intruder(s) pass or
touch their sensors which are
touch their sensors which are
connected to a main control.
connected to a main control.
These systems cover various
These systems cover various
zones. Some covers 4, 18, 12,
zones. Some covers 4, 18, 12,
24 or 48 zones.
24 or 48 zones.
38. HASCO has in store:
System: Burglar Alarm
Manufacturer: Cadex
Origin: USA
Components:
1. Control Panel
2. Keyboard
3. Sensors
39. System can be place in the control room
with the sensors distributed around
desired zones.
Control panel connected to the keyboard
which has a monitor displaying zone with
sensors previously programmed.
At times of intrusion the zone affected will
appear on the monitor and voice alarm will
be on. Furthermore the system will
automatically dial 4 telephone numbers
previously stored sending a recorded
message that intrusion is in progress in a
specific zone.
40. Kinds of Detectors:
Motion Detector:
This kind of detectors emits infra red
rays covering a specific area. When
movement is detected within this area,
the sensor will send a signal indicating
assault or intrusion.
41. Fixed Detector:
This kind of detector is designed to be
fixed at door edges. It sends alarm when
the door is suspiciously opened.
42. Push Detector:
This detector is a Double Push device
placed beside employees to enable them
to push a button to release Panic Alarm
at emergencies.
The Detector can also operated by foot to
push without drawing the attention of the
criminals.
The detector can also be fixed on
windows to monitor any suspicious
movement.
43. Vibration Detector:
This kind of detectors is usually placed
of safes to detect any vibration and
release an alarm.
The detector sends alarm in case of
damage or wire cut or any disruption
in the electricity circuit.
The detector is controlled
by a keyboard where the
operator can switch it of by
entering special code.
44. Foss
This detector is a sophisticated
security system using fiber optic cord
as a detector.
The system is perfect for wide space
zones with high security requirements.
The detector can be placed on walls
or fences.
45. Components:
1. Electronic controller
2. Optic Detector Operation:
The system radiates laser beams through
the fiber optic cord. This enables the
controller to accurately analyze any
changes resulting from vibrations and
then an alarm is released.
System sensitivity can be fine-tuned to
minimize false alarms due to wind of
merely near-by traffic.
46. Electronic Controller is very easy to
work with. It has default sensitivity
adjustment options easy to deal with,
without any need for extra devices.
The system releases two laser beams at
different channels (Interference &
Alarm Channels). Comparing the two
the required sensitivity can be
adjusted.
The system also releases alarm if the
optic cord is cut.
47. Sensor light:
It is a sensitive detector with infra red
radiation detectors activated in case of
intrusion in its zone.
66. HASCO also serves:
Sudan Duty Free Zones
Kenana Sugar Co.
Kharoum Refinery (al-Jaili)
Concorp Refinery (Shajara)
Mechanical Transport Department
San Frontier Doctors
National Electricity Corporation
Al-Shamal Islamic Bank
67. For more information, Please
visit our WEBSITE at:
www.el-hadaf.com
Email:
alhadaf@el-hadaf.com
68. HASCO ..
The name, you should always
keep in mind!
Call us, You are the winners
Street (21), Al-Amarat, North Ibn Sina Hospital
P. O. Box 1770 Postal Code 11111 Khartoum - Sudan
Tel: 464076 - 640624 Fax: 464343
Designed by Sawah Co. Tel: 788681