SlideShare a Scribd company logo
‫بسم ا الرحمن‬
   ‫الرحيم‬
Al-Hadaf Services Co. Ltd
          (HASCO)




Safety & Protection is our
       Profession
MEMBER OF INTERNATIONAL
PROFFISIONAL SECURITY ASSOCIATION
   ( Member of BRITISH STANDARD INSTITUTE(BSI
          ( Member of SECURITY INSTITUTE (UK
( Certificate of compliance to security industry authority (SIA
                       ( IPSA)




       ‫عضو منظمة خبراء المن العالمية‬
Why HASCO?

   Safeguarding Properties
   Providing body-guarding
   Providing Office Services (Various)
   Cleaning & Pests Control
   Provision of guards and labor force
   Actively using Technology in Safety &
   Protection
Your Safety Depends on Your Choice
Safety & Protection:




       We’re the Best!
Our Specialized Services
  Safety & Protection of institutions against fire,
 theft and destruction.
 Providing Safety & Protection Systems.
 Provision, control & maintenance of Alarms
 Body-guarding
 Mobile & Static Guarding
 Control of Gates & Receptions
Cleaning Hygiene & Pests Control
Whatever your business, you need HASCO
               services!
International Companies:
Position Technology (Canadian)   Entrance Control Systems

Deltavistion (Canadian)          Close Circuit TV

Paradox (Canadian)               Burglar Alarms

Vista Box (German)               Network Image Transfer

Tomsed Corp (English)            Automatic Doors

Cadex (American)                 Close Circuit TV`



  No limit to the technology we provide!
Advanced Safety & Security Systems:

HASCO directly import Safety &
Protection Systems from renowned
international companies to ensure
warranty and spare parts.
Why?
In modern world crime witnessed
advancement in its technique. With the
limited ability of man to protect himself, the
need for using modern technology is
inevitable. Furthermore, the technology in
the field of Safety & Protection is witnessing
almost daily advancement.
HASCO Technical Department (TD) is living
evidence of its interest in modern
technology.
The TD started to import and execute many
Systems and Safety Project, among them
are:
Network Camera SONY
                      •This is dome-shaped color video camera
                                    ¼ type Super HAD CCD .
                             •Supports PoE (Power of Ethernet
                     •The camera is supplied with the IP setup
                            Program for easy network setting.
                     •The camera is supplied with the IP setup
                            Program for easy network setting.
•The best picture quality is available in thw lowest light degree
                     (0.8 lux) to the object (in the color mode).
         •Includes the Vare-focal auto iris lins as the standard
   equipment. The focal length of the lens is from 3.0 mm to 8.0
                                                            mm.
Closed Circuits )
(TV




  This system is a 24-hours surveillance
  service which cover entrances and desired
  locations. CCTV consists of the circuit,
  different cameras, monitors, recording and
  distribution equipment.
CCTV are of
two types:

1. Wire, and
2. Wireless
Cameras are either:
    1. Black & White, or
               White
    2. Colored
Canadian and
                     German cameras
                     with special
                     specifications for
                     indoors and
                     outdoors use.


Cameras with OUTOIRIS
automatically control lens
sensitivity to light .
Colored Cameras are sensitive and can
take images day and night without a need
for light source.
Range and angle of vision can be
controlled by using various size lenses
Motorized Zoom Lens can be used to
control image size as required.
o
PAN/TILT help moving the camera 360       to
avoid installing many cameras.
Monitors are of high resolution and
different sizes.
DUPLEXER can merge images from
more than 4 cameras in one monitor.

Switcher can connect many cameras and
allow showing images sequentially on one
monitor.
All situations can be recorded on Time
Lapse or normal VCR cassettes with
date & time for easy reference.
DSP COLOR - KT&C




•1/3" EX view CCD
    •0.01 LUX / F1.2
 •537(H)X505(V)270K
•Auto Iris Lens Control
DVR-BX2
16-Camera Digital Multiplex Recorder Now
 Available with Continuous Archive! 4 Internal
 Hard-Drives Providing up to 4 Month High-
 Quality Digital Recordings
Scaleable Distributed Video
  Quick And Easy Copy to Internal CD-Writer
 Maximum Recording Rate up to 120PPS
 (NTSC), 100PPS (PAL) Variable Record Rate
 per Camera Video Motion Detection - Search
 for Movement in a Particular Area of an Image
 Network Integration - Remote Viewing from
 Any Networked PC
Accessories can be added to transfer
audio-visual materials.



Cameras can be networked to transfer
audio-visual materials for long
distances through normal telephone
lines or via ISDN.
Access Control Systems:

   1. One Door Standalone
  2. Access Control Network Systems:

            A)   Magnetic
            B)   Proximity
Access Control System Network


 One network controlled by one
 PC and one software. It can be
 customized and/or can be
 modified to function as Time &
 Attendance System.
HASCO has a device from Position
Technology Co. with magnetic cards
using proximity technology .
User need to move his/her card near
the system instead of inserting it
inside the machine. This ensure cards
long use without damage an
advantage over old systems.
How to Operate the System?
Special software in the control room
Computer controls “Cards Reader”
placed at door(s) fronts.
Every card will log bio data, time in and
out as well as times for meals, rest or
emergency out-of-office trips.
Staff and authorized persons can be
allowed to open doors through reading
data on their electronic cards.
The Software controls all ins and outs
and store them and transfer them to the
Computer in the control room.
The system controls staff ins
and outs with the advantage of
controlling shifts. Shifts times
can be programmed to allow
authorized personnel only to
enter at specified time(s).
Some staff can be provided with any-
time permission to enter by
programming their cards accordingly.

  Programmer can add new cards
  and/or terminate any undesirable
  cards such as missing or expired
  cards.
The System allow one permission for
entrance. If any other person tries to
enter with previously used card a
message will appear indicating that the
owner of the card is already in,
consequently denying the other person
access.

Card Reader can be placed at reception
desk or at doors where special access
is required.
A report can be printed and/or stored in
a special file. The report comprises of
information on users like:

1.   Working days of the user.
2.   Time log of ins and outs.
3.   Ins and out remarks.
4.   Total hours worked.
5.   Time-outs during working hours.
One person can control the system
via a computer where all data on
every card are displayed such as
the bio data, time log, and other
info like intrusion, door status
(close/open) and the status and
location of all Readers in the
building (if many).
Doors can be closed and opened from
the control room, especially at
emergencies.

Position of any card user can be
determined in the building.

The System has a backup battery which
switches on instantly during power
failure.
System Controller has big memory for
storing data, especially at times when
connection     with    control    room
computer is disrupted. All activities
will be recognized and stored when
connection is restored.
Stand Alone Access control




These systems are excellent for controlling
access to doors via secret codes or by
cards. Such systems require no computer
network connection.
Automatic doors and entrances



HASCO controls doors and entrances
   with sophisticated systems.
Intruder Detection
Systems:
   These systems launch voice
  These systems launch voice
   alarms if intruder(s) pass or
  alarms if intruder(s) pass or
   touch their sensors which are
  touch their sensors which are
   connected to a main control.
  connected to a main control.
   These systems cover various
  These systems cover various
   zones. Some covers 4, 18, 12,
  zones. Some covers 4, 18, 12,
   24 or 48 zones.
  24 or 48 zones.
HASCO has in store:
     System: Burglar Alarm
     Manufacturer: Cadex
     Origin: USA

                      Components:
                       1. Control Panel
                       2. Keyboard
                       3. Sensors
System can be place in the control room
with the sensors distributed around
desired zones.
Control panel connected to the keyboard
which has a monitor displaying zone with
sensors previously programmed.
At times of intrusion the zone affected will
appear on the monitor and voice alarm will
be on. Furthermore the system will
automatically dial 4 telephone numbers
previously stored sending a recorded
message that intrusion is in progress in a
specific zone.
Kinds of Detectors:
Motion Detector:
This kind of detectors emits infra red
rays covering a specific area. When
movement is detected within this area,
the sensor will send a signal indicating
assault or intrusion.
Fixed Detector:
This kind of detector is designed to be
fixed at door edges. It sends alarm when
the door is suspiciously opened.
Push Detector:
This detector is a Double Push device
placed beside employees to enable them
to push a button to release Panic Alarm
at emergencies.
The Detector can also operated by foot to
push without drawing the attention of the
criminals.

 The detector can also be fixed on
 windows to monitor any suspicious
 movement.
Vibration Detector:
This kind of detectors is usually placed
of safes to detect any vibration and
release an alarm.
The detector sends alarm in case of
damage or wire cut or any disruption
in the electricity circuit.
            The detector is controlled
            by a keyboard where the
            operator can switch it of by
            entering special code.
Foss
This detector is a sophisticated
security system using fiber optic cord
as a detector.
The system is perfect for wide space
zones with high security requirements.

The detector can be placed on walls
or fences.
Components:
1. Electronic controller
2. Optic Detector              Operation:
The system radiates laser beams through
the fiber optic cord. This enables the
controller to accurately analyze any
changes resulting from vibrations and
then an alarm is released.
 System sensitivity can be fine-tuned to
 minimize false alarms due to wind of
 merely near-by traffic.
Electronic Controller is very easy to
work with. It has default sensitivity
adjustment options easy to deal with,
without any need for extra devices.

The system releases two laser beams at
different channels  (Interference &
Alarm Channels). Comparing the two
the required sensitivity can be
adjusted.
The system also releases alarm if the
optic cord is cut.
Sensor light:
It is a sensitive detector with infra red
radiation detectors activated in case of
intrusion in its zone.
Explosive and
Drug Detectors

                          Ionscan
Sabre 2000

                 They are small,
                 light and very
                 sensitive.
Prevention
                 and fighting
                    of fires
Smoke Detector




                                Extinguisher


      Using the best technology
‫الحراسات البشرية‬
‫‪Manned Guarding‬‬
Highly trained cadre, professionally
         and behaviorally.
         Modern Mobile
     Communication systems
Body-guarding dignitaries.
Control of Receptions
Some institutions
     enjoying
 HASCO’S Umbrella
for Safety & Protection
Petroleum Labs.
Sudan Grand Hotel
The
 International
Committee of
the Red Cross
Al-Gazera Trade & Services Co. Ltd.
Susuki Team
Friendship Hall
Ministry of Finance & Economy
Ministry of Mining & Energy
The National Fund for Social Security
Sudan Heart Center
HASCO also serves:
    Sudan Duty Free Zones
    Kenana Sugar Co.
    Kharoum Refinery (al-Jaili)
    Concorp Refinery (Shajara)
    Mechanical Transport Department
    San Frontier Doctors
    National Electricity Corporation
    Al-Shamal Islamic Bank
For more information, Please
     visit our WEBSITE at:



www.el-hadaf.com
             Email:
     alhadaf@el-hadaf.com
HASCO ..
   The name, you should always
         keep in mind!
     Call us, You are the winners

   Street (21), Al-Amarat, North Ibn Sina Hospital
P. O. Box 1770 Postal Code 11111 Khartoum - Sudan
        Tel: 464076 - 640624 Fax: 464343

 Designed by Sawah Co. Tel: 788681
Thank You.
For watching this presentation.

More Related Content

What's hot

Vera secure qsg_rf9_antenna_readerspreads (1)
Vera secure qsg_rf9_antenna_readerspreads (1)Vera secure qsg_rf9_antenna_readerspreads (1)
Vera secure qsg_rf9_antenna_readerspreads (1)
Domotica daVinci
 
Linovsion IP Suveillance Solution
Linovsion IP Suveillance SolutionLinovsion IP Suveillance Solution
Linovsion IP Suveillance Solution
linovision
 
Ce hv6 module 47 spying technologies
Ce hv6 module 47 spying technologiesCe hv6 module 47 spying technologies
Ce hv6 module 47 spying technologies
Vi Tính Hoàng Nam
 
J04701080085
J04701080085J04701080085
J04701080085
ijceronline
 
Access control basics-5
Access control basics-5Access control basics-5
Access control basics-5
grantlerc
 
T&Tec Overview
T&Tec OverviewT&Tec Overview
T&Tec OverviewClemgros
 
Security system with face recognition, sms alert and embedded network video m...
Security system with face recognition, sms alert and embedded network video m...Security system with face recognition, sms alert and embedded network video m...
Security system with face recognition, sms alert and embedded network video m...
ijsptm
 
What is voice alarm
What is voice alarmWhat is voice alarm
Bio lynx - Biometric attendance machine
Bio lynx - Biometric attendance machineBio lynx - Biometric attendance machine
Bio lynx - Biometric attendance machine
Star Link Communication Pvt Ltd
 
Video Analytics for Perimeter Surveillance
Video Analytics for Perimeter SurveillanceVideo Analytics for Perimeter Surveillance
Video Analytics for Perimeter Surveillance
PureTech Systems
 
Manual POPP-HUB-V2 (POP-011801)
Manual POPP-HUB-V2 (POP-011801)Manual POPP-HUB-V2 (POP-011801)
Manual POPP-HUB-V2 (POP-011801)
Domotica daVinci
 
Thermostat hidden camera w:built in digital video recorder (buy or rent)
Thermostat hidden camera w:built in digital video recorder (buy or rent)Thermostat hidden camera w:built in digital video recorder (buy or rent)
Thermostat hidden camera w:built in digital video recorder (buy or rent)dplsurve
 
Ecom Ex-Handy 08 LWP - ATEX Hazardous Area Mobile Phone - Data Sheet
Ecom Ex-Handy 08 LWP - ATEX Hazardous Area Mobile Phone - Data SheetEcom Ex-Handy 08 LWP - ATEX Hazardous Area Mobile Phone - Data Sheet
Ecom Ex-Handy 08 LWP - ATEX Hazardous Area Mobile Phone - Data Sheet
Thorne & Derrick International
 
Ultimate Surveillance Solution
Ultimate Surveillance SolutionUltimate Surveillance Solution
Ultimate Surveillance Solutiondplsurve
 
[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...
[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...
[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...
CODE BLUE
 
Technical training 2009
Technical training 2009Technical training 2009
Technical training 2009Ilias Varsamis
 
Digital Fingerprinting
Digital FingerprintingDigital Fingerprinting
Digital Fingerprinting
santhu652
 
Security Technology Systems
Security Technology SystemsSecurity Technology Systems
Security Technology Systems
Julius T Chibanga
 
Video Door Phone
Video Door PhoneVideo Door Phone
Video Door Phone
BioEnable
 
intrusion detection
 intrusion detection intrusion detection
intrusion detection
asif usmani
 

What's hot (20)

Vera secure qsg_rf9_antenna_readerspreads (1)
Vera secure qsg_rf9_antenna_readerspreads (1)Vera secure qsg_rf9_antenna_readerspreads (1)
Vera secure qsg_rf9_antenna_readerspreads (1)
 
Linovsion IP Suveillance Solution
Linovsion IP Suveillance SolutionLinovsion IP Suveillance Solution
Linovsion IP Suveillance Solution
 
Ce hv6 module 47 spying technologies
Ce hv6 module 47 spying technologiesCe hv6 module 47 spying technologies
Ce hv6 module 47 spying technologies
 
J04701080085
J04701080085J04701080085
J04701080085
 
Access control basics-5
Access control basics-5Access control basics-5
Access control basics-5
 
T&Tec Overview
T&Tec OverviewT&Tec Overview
T&Tec Overview
 
Security system with face recognition, sms alert and embedded network video m...
Security system with face recognition, sms alert and embedded network video m...Security system with face recognition, sms alert and embedded network video m...
Security system with face recognition, sms alert and embedded network video m...
 
What is voice alarm
What is voice alarmWhat is voice alarm
What is voice alarm
 
Bio lynx - Biometric attendance machine
Bio lynx - Biometric attendance machineBio lynx - Biometric attendance machine
Bio lynx - Biometric attendance machine
 
Video Analytics for Perimeter Surveillance
Video Analytics for Perimeter SurveillanceVideo Analytics for Perimeter Surveillance
Video Analytics for Perimeter Surveillance
 
Manual POPP-HUB-V2 (POP-011801)
Manual POPP-HUB-V2 (POP-011801)Manual POPP-HUB-V2 (POP-011801)
Manual POPP-HUB-V2 (POP-011801)
 
Thermostat hidden camera w:built in digital video recorder (buy or rent)
Thermostat hidden camera w:built in digital video recorder (buy or rent)Thermostat hidden camera w:built in digital video recorder (buy or rent)
Thermostat hidden camera w:built in digital video recorder (buy or rent)
 
Ecom Ex-Handy 08 LWP - ATEX Hazardous Area Mobile Phone - Data Sheet
Ecom Ex-Handy 08 LWP - ATEX Hazardous Area Mobile Phone - Data SheetEcom Ex-Handy 08 LWP - ATEX Hazardous Area Mobile Phone - Data Sheet
Ecom Ex-Handy 08 LWP - ATEX Hazardous Area Mobile Phone - Data Sheet
 
Ultimate Surveillance Solution
Ultimate Surveillance SolutionUltimate Surveillance Solution
Ultimate Surveillance Solution
 
[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...
[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...
[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...
 
Technical training 2009
Technical training 2009Technical training 2009
Technical training 2009
 
Digital Fingerprinting
Digital FingerprintingDigital Fingerprinting
Digital Fingerprinting
 
Security Technology Systems
Security Technology SystemsSecurity Technology Systems
Security Technology Systems
 
Video Door Phone
Video Door PhoneVideo Door Phone
Video Door Phone
 
intrusion detection
 intrusion detection intrusion detection
intrusion detection
 

Similar to Hasco english

ATM - Banking Proposal
ATM - Banking ProposalATM - Banking Proposal
ATM - Banking ProposalJogesh Makwana
 
Application of science & technology in security management
Application of science & technology in security managementApplication of science & technology in security management
Application of science & technology in security management
Capt SB Tyagi, COAC'CC*,FISM,CSC,
 
Types Of Proactive Security Solutions For Self-storage
Types Of Proactive Security Solutions For Self-storageTypes Of Proactive Security Solutions For Self-storage
Types Of Proactive Security Solutions For Self-storage
Nexlar Security
 
Villas intelligent surveillance
Villas intelligent surveillanceVillas intelligent surveillance
Villas intelligent surveillance
bappyni
 
INTELLIGENT ACCESS CONTROL. TIME & ATTENDANCE SYSTEM
INTELLIGENT ACCESS CONTROL. TIME & ATTENDANCE SYSTEMINTELLIGENT ACCESS CONTROL. TIME & ATTENDANCE SYSTEM
INTELLIGENT ACCESS CONTROL. TIME & ATTENDANCE SYSTEM
wisdom0313
 
GSM Based Security System
GSM Based Security SystemGSM Based Security System
GSM Based Security System
Prajjwol Tripathi
 
Kith Infotech
Kith InfotechKith Infotech
Kith Infotech
Dignesh Bhatt
 
Linkwise Facicility Monitoring; FM GUARD
Linkwise Facicility Monitoring; FM GUARDLinkwise Facicility Monitoring; FM GUARD
Linkwise Facicility Monitoring; FM GUARD
Linkwise Technology
 
Wireless portable digital video recorder and camera (buy or rent)
Wireless portable digital video recorder and camera (buy or rent) Wireless portable digital video recorder and camera (buy or rent)
Wireless portable digital video recorder and camera (buy or rent) dplsurve
 
Perimeter security systems
Perimeter security systemsPerimeter security systems
Perimeter security systems
Roundabout Technologies
 
Company Profile 2016
Company Profile 2016Company Profile 2016
Company Profile 2016Jatin Mehta
 
NextGuard_Brochure_WEB
NextGuard_Brochure_WEBNextGuard_Brochure_WEB
NextGuard_Brochure_WEBJaime Alboim
 
RFID tags in tunnels
RFID tags in tunnelsRFID tags in tunnels
RFID tags in tunnels
Bioaccez Controls
 
Security Solution By Digital Enterprises, Sahibabad
Security Solution By Digital Enterprises, SahibabadSecurity Solution By Digital Enterprises, Sahibabad
Security Solution By Digital Enterprises, Sahibabad
IndiaMART InterMESH Limited
 
Building Integrated Security Solution V1.4.pdf
Building Integrated Security Solution V1.4.pdfBuilding Integrated Security Solution V1.4.pdf
Building Integrated Security Solution V1.4.pdf
MusicGramOfficial
 
ppt.pptx
ppt.pptxppt.pptx
ppt.pptx
19474Dswathi
 
CCTV and Security Products
CCTV and Security ProductsCCTV and Security Products
CCTV and Security Products
Gabriel Vasquez
 

Similar to Hasco english (20)

ATM - Banking Proposal
ATM - Banking ProposalATM - Banking Proposal
ATM - Banking Proposal
 
Application of science & technology in security management
Application of science & technology in security managementApplication of science & technology in security management
Application of science & technology in security management
 
Types Of Proactive Security Solutions For Self-storage
Types Of Proactive Security Solutions For Self-storageTypes Of Proactive Security Solutions For Self-storage
Types Of Proactive Security Solutions For Self-storage
 
Villas intelligent surveillance
Villas intelligent surveillanceVillas intelligent surveillance
Villas intelligent surveillance
 
INTELLIGENT ACCESS CONTROL. TIME & ATTENDANCE SYSTEM
INTELLIGENT ACCESS CONTROL. TIME & ATTENDANCE SYSTEMINTELLIGENT ACCESS CONTROL. TIME & ATTENDANCE SYSTEM
INTELLIGENT ACCESS CONTROL. TIME & ATTENDANCE SYSTEM
 
GSM Based Security System
GSM Based Security SystemGSM Based Security System
GSM Based Security System
 
To design low
To design lowTo design low
To design low
 
Kith Infotech
Kith InfotechKith Infotech
Kith Infotech
 
Linkwise Facicility Monitoring; FM GUARD
Linkwise Facicility Monitoring; FM GUARDLinkwise Facicility Monitoring; FM GUARD
Linkwise Facicility Monitoring; FM GUARD
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
Wireless portable digital video recorder and camera (buy or rent)
Wireless portable digital video recorder and camera (buy or rent) Wireless portable digital video recorder and camera (buy or rent)
Wireless portable digital video recorder and camera (buy or rent)
 
Perimeter security systems
Perimeter security systemsPerimeter security systems
Perimeter security systems
 
Company Profile 2016
Company Profile 2016Company Profile 2016
Company Profile 2016
 
NextGuard_Brochure_WEB
NextGuard_Brochure_WEBNextGuard_Brochure_WEB
NextGuard_Brochure_WEB
 
RFID tags in tunnels
RFID tags in tunnelsRFID tags in tunnels
RFID tags in tunnels
 
Security Solution By Digital Enterprises, Sahibabad
Security Solution By Digital Enterprises, SahibabadSecurity Solution By Digital Enterprises, Sahibabad
Security Solution By Digital Enterprises, Sahibabad
 
Security Products
Security ProductsSecurity Products
Security Products
 
Building Integrated Security Solution V1.4.pdf
Building Integrated Security Solution V1.4.pdfBuilding Integrated Security Solution V1.4.pdf
Building Integrated Security Solution V1.4.pdf
 
ppt.pptx
ppt.pptxppt.pptx
ppt.pptx
 
CCTV and Security Products
CCTV and Security ProductsCCTV and Security Products
CCTV and Security Products
 

Recently uploaded

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Hasco english

  • 1. ‫بسم ا الرحمن‬ ‫الرحيم‬
  • 2. Al-Hadaf Services Co. Ltd (HASCO) Safety & Protection is our Profession
  • 3. MEMBER OF INTERNATIONAL PROFFISIONAL SECURITY ASSOCIATION ( Member of BRITISH STANDARD INSTITUTE(BSI ( Member of SECURITY INSTITUTE (UK ( Certificate of compliance to security industry authority (SIA ( IPSA) ‫عضو منظمة خبراء المن العالمية‬
  • 4. Why HASCO? Safeguarding Properties Providing body-guarding Providing Office Services (Various) Cleaning & Pests Control Provision of guards and labor force Actively using Technology in Safety & Protection Your Safety Depends on Your Choice
  • 5. Safety & Protection: We’re the Best!
  • 6. Our Specialized Services Safety & Protection of institutions against fire, theft and destruction. Providing Safety & Protection Systems. Provision, control & maintenance of Alarms Body-guarding Mobile & Static Guarding Control of Gates & Receptions Cleaning Hygiene & Pests Control Whatever your business, you need HASCO services!
  • 7. International Companies: Position Technology (Canadian) Entrance Control Systems Deltavistion (Canadian) Close Circuit TV Paradox (Canadian) Burglar Alarms Vista Box (German) Network Image Transfer Tomsed Corp (English) Automatic Doors Cadex (American) Close Circuit TV` No limit to the technology we provide!
  • 8. Advanced Safety & Security Systems: HASCO directly import Safety & Protection Systems from renowned international companies to ensure warranty and spare parts.
  • 9. Why? In modern world crime witnessed advancement in its technique. With the limited ability of man to protect himself, the need for using modern technology is inevitable. Furthermore, the technology in the field of Safety & Protection is witnessing almost daily advancement. HASCO Technical Department (TD) is living evidence of its interest in modern technology. The TD started to import and execute many Systems and Safety Project, among them are:
  • 10. Network Camera SONY •This is dome-shaped color video camera ¼ type Super HAD CCD . •Supports PoE (Power of Ethernet •The camera is supplied with the IP setup Program for easy network setting. •The camera is supplied with the IP setup Program for easy network setting. •The best picture quality is available in thw lowest light degree (0.8 lux) to the object (in the color mode). •Includes the Vare-focal auto iris lins as the standard equipment. The focal length of the lens is from 3.0 mm to 8.0 mm.
  • 11. Closed Circuits ) (TV This system is a 24-hours surveillance service which cover entrances and desired locations. CCTV consists of the circuit, different cameras, monitors, recording and distribution equipment.
  • 12. CCTV are of two types: 1. Wire, and 2. Wireless
  • 13. Cameras are either: 1. Black & White, or White 2. Colored
  • 14. Canadian and German cameras with special specifications for indoors and outdoors use. Cameras with OUTOIRIS automatically control lens sensitivity to light .
  • 15. Colored Cameras are sensitive and can take images day and night without a need for light source. Range and angle of vision can be controlled by using various size lenses Motorized Zoom Lens can be used to control image size as required.
  • 16. o PAN/TILT help moving the camera 360 to avoid installing many cameras.
  • 17. Monitors are of high resolution and different sizes. DUPLEXER can merge images from more than 4 cameras in one monitor. Switcher can connect many cameras and allow showing images sequentially on one monitor.
  • 18. All situations can be recorded on Time Lapse or normal VCR cassettes with date & time for easy reference.
  • 19. DSP COLOR - KT&C •1/3" EX view CCD •0.01 LUX / F1.2 •537(H)X505(V)270K •Auto Iris Lens Control
  • 21. 16-Camera Digital Multiplex Recorder Now Available with Continuous Archive! 4 Internal Hard-Drives Providing up to 4 Month High- Quality Digital Recordings Scaleable Distributed Video Quick And Easy Copy to Internal CD-Writer Maximum Recording Rate up to 120PPS (NTSC), 100PPS (PAL) Variable Record Rate per Camera Video Motion Detection - Search for Movement in a Particular Area of an Image Network Integration - Remote Viewing from Any Networked PC
  • 22. Accessories can be added to transfer audio-visual materials. Cameras can be networked to transfer audio-visual materials for long distances through normal telephone lines or via ISDN.
  • 23. Access Control Systems: 1. One Door Standalone 2. Access Control Network Systems: A) Magnetic B) Proximity
  • 24. Access Control System Network One network controlled by one PC and one software. It can be customized and/or can be modified to function as Time & Attendance System.
  • 25. HASCO has a device from Position Technology Co. with magnetic cards using proximity technology . User need to move his/her card near the system instead of inserting it inside the machine. This ensure cards long use without damage an advantage over old systems.
  • 26. How to Operate the System? Special software in the control room Computer controls “Cards Reader” placed at door(s) fronts. Every card will log bio data, time in and out as well as times for meals, rest or emergency out-of-office trips.
  • 27. Staff and authorized persons can be allowed to open doors through reading data on their electronic cards. The Software controls all ins and outs and store them and transfer them to the Computer in the control room.
  • 28. The system controls staff ins and outs with the advantage of controlling shifts. Shifts times can be programmed to allow authorized personnel only to enter at specified time(s).
  • 29. Some staff can be provided with any- time permission to enter by programming their cards accordingly. Programmer can add new cards and/or terminate any undesirable cards such as missing or expired cards.
  • 30. The System allow one permission for entrance. If any other person tries to enter with previously used card a message will appear indicating that the owner of the card is already in, consequently denying the other person access. Card Reader can be placed at reception desk or at doors where special access is required.
  • 31. A report can be printed and/or stored in a special file. The report comprises of information on users like: 1. Working days of the user. 2. Time log of ins and outs. 3. Ins and out remarks. 4. Total hours worked. 5. Time-outs during working hours.
  • 32. One person can control the system via a computer where all data on every card are displayed such as the bio data, time log, and other info like intrusion, door status (close/open) and the status and location of all Readers in the building (if many).
  • 33. Doors can be closed and opened from the control room, especially at emergencies. Position of any card user can be determined in the building. The System has a backup battery which switches on instantly during power failure.
  • 34. System Controller has big memory for storing data, especially at times when connection with control room computer is disrupted. All activities will be recognized and stored when connection is restored.
  • 35. Stand Alone Access control These systems are excellent for controlling access to doors via secret codes or by cards. Such systems require no computer network connection.
  • 36. Automatic doors and entrances HASCO controls doors and entrances with sophisticated systems.
  • 37. Intruder Detection Systems: These systems launch voice These systems launch voice alarms if intruder(s) pass or alarms if intruder(s) pass or touch their sensors which are touch their sensors which are connected to a main control. connected to a main control. These systems cover various These systems cover various zones. Some covers 4, 18, 12, zones. Some covers 4, 18, 12, 24 or 48 zones. 24 or 48 zones.
  • 38. HASCO has in store: System: Burglar Alarm Manufacturer: Cadex Origin: USA Components: 1. Control Panel 2. Keyboard 3. Sensors
  • 39. System can be place in the control room with the sensors distributed around desired zones. Control panel connected to the keyboard which has a monitor displaying zone with sensors previously programmed. At times of intrusion the zone affected will appear on the monitor and voice alarm will be on. Furthermore the system will automatically dial 4 telephone numbers previously stored sending a recorded message that intrusion is in progress in a specific zone.
  • 40. Kinds of Detectors: Motion Detector: This kind of detectors emits infra red rays covering a specific area. When movement is detected within this area, the sensor will send a signal indicating assault or intrusion.
  • 41. Fixed Detector: This kind of detector is designed to be fixed at door edges. It sends alarm when the door is suspiciously opened.
  • 42. Push Detector: This detector is a Double Push device placed beside employees to enable them to push a button to release Panic Alarm at emergencies. The Detector can also operated by foot to push without drawing the attention of the criminals. The detector can also be fixed on windows to monitor any suspicious movement.
  • 43. Vibration Detector: This kind of detectors is usually placed of safes to detect any vibration and release an alarm. The detector sends alarm in case of damage or wire cut or any disruption in the electricity circuit. The detector is controlled by a keyboard where the operator can switch it of by entering special code.
  • 44. Foss This detector is a sophisticated security system using fiber optic cord as a detector. The system is perfect for wide space zones with high security requirements. The detector can be placed on walls or fences.
  • 45. Components: 1. Electronic controller 2. Optic Detector Operation: The system radiates laser beams through the fiber optic cord. This enables the controller to accurately analyze any changes resulting from vibrations and then an alarm is released. System sensitivity can be fine-tuned to minimize false alarms due to wind of merely near-by traffic.
  • 46. Electronic Controller is very easy to work with. It has default sensitivity adjustment options easy to deal with, without any need for extra devices. The system releases two laser beams at different channels (Interference & Alarm Channels). Comparing the two the required sensitivity can be adjusted. The system also releases alarm if the optic cord is cut.
  • 47. Sensor light: It is a sensitive detector with infra red radiation detectors activated in case of intrusion in its zone.
  • 48. Explosive and Drug Detectors Ionscan Sabre 2000 They are small, light and very sensitive.
  • 49. Prevention and fighting of fires Smoke Detector Extinguisher Using the best technology
  • 51. Highly trained cadre, professionally and behaviorally. Modern Mobile Communication systems
  • 54. Some institutions enjoying HASCO’S Umbrella for Safety & Protection
  • 55.
  • 59. Al-Gazera Trade & Services Co. Ltd.
  • 62. Ministry of Finance & Economy
  • 63. Ministry of Mining & Energy
  • 64. The National Fund for Social Security
  • 66. HASCO also serves: Sudan Duty Free Zones Kenana Sugar Co. Kharoum Refinery (al-Jaili) Concorp Refinery (Shajara) Mechanical Transport Department San Frontier Doctors National Electricity Corporation Al-Shamal Islamic Bank
  • 67. For more information, Please visit our WEBSITE at: www.el-hadaf.com Email: alhadaf@el-hadaf.com
  • 68. HASCO .. The name, you should always keep in mind! Call us, You are the winners Street (21), Al-Amarat, North Ibn Sina Hospital P. O. Box 1770 Postal Code 11111 Khartoum - Sudan Tel: 464076 - 640624 Fax: 464343 Designed by Sawah Co. Tel: 788681
  • 69. Thank You. For watching this presentation.