SADAF Perimeter Protection System

Brief description:

The items in this system are controlled and monitored by the system management software using different types of telecommunication platforms such as optical fiber, radio links, and internal network, and at the time of an incident, the environmental sensors in the area carry out the detection operations and alarm notifications and send appropriate notifications to the software . At this time, the software, using surveillance cameras, storing the steps of the intrusion operation, in the mean time informs the guards of the complex about the occurrence of the intrusion and the quality of the operation, using audio and video alerts .the reporting system of the software is capable of checking and monitoring the events that happened in all different time periods along with the recorded images.

SKU: dzh-69 Category:
Get product information

In this section, you can get all the product documentation

ZIP

For more information and product price, please contact this number 02122889515

Loading...

Description

Introduction

Perimeter protection system is a smart system that is used to identify and prevent the intentional penetration into the site. This system is based on various sensors to detect and announce the intrusion warning from surrounding obstacles into the area. The selection of sensors and communication platforms is done according to the geographical location and characteristics of the monitored area. This system, in combination with all kinds of physical barriers such as fences, barbed wires and walls, is evaluated as a strong and reliable barrier against the penetration of attackers. Imen Dezhlock, as one of the main consultants in the field of Safety & Security engineering, with the help of its technical team, has produced completely native products to create impenetrable systems with the lowest false alarm rate. Using the effective efforts of the country’s elites in the fields of electronics, mechanics, telecommunications and software, this collection has succeeded in producing various sensors to detect the penetration of unauthorized agents, such as multi-purpose smart wire fences and laser fences along with “Homaye Hefazat” comprehensive management software.

The main features of the “Homaye Hefazat” system

The three essential features of this system are:

  • “Sensor” with the aim of identifying unauthorized people
  • “Surveillance cameras” with the purpose of investigating the method of penetration, location of penetration and recording operations
  • “Software” in order to manage and guide the performance of the system and register and announce the reports related to the system to the operator.

The items in this system are controlled and monitored by the system management software using different types of telecommunication platforms such as optical fiber, radio links, and internal network, and at the time of an incident, the environmental sensors in the area carry out the detection operations and alarm notifications and send appropriate notifications to the software . At this time, the software, using surveillance cameras, storing the steps of the intrusion operation, in the mean time informs the guards of the complex about the occurrence of the intrusion and the quality of the operation, using audio and video alerts .the reporting system of the software is capable of checking and monitoring the events that happened in all different time periods along with the recorded images.

Introduction of system components

Laser fence

The laser fence has been designed and produced in competition with the microwave system. In the laser fence, digital and photonic technologies are used to detect the location of intruders. Technical specifications of the laser fence system

Main board
  • FPGA processor
  • Microprocessor
  • Anti-intrusion digital circuits
  • Board damage detection sensors
  • Short circuit detection sensors
  • Temperature and humidity sensors
  • Different communication systems and protocols (LAN, Wi-Fi, XBee485RS
  • Analog and digital inputs
  • Analog and digital outputs
  • Visual indicators to detect system performance
Laser
  • Consisting of fourteen smart laser beams
  • Consisting of fourteen laser receivers
  • Movement direction detection system by each of the lasers
  • Self-diagnosis and malfunction notification system
  • The ability to send data on any laser beams
  • System for detecting the distance between the target and the source
  • Laser beam adjustment system at long distances
Body
  • Consists of a self-protection system including: (detection of impact to the body, applying electric shock to the attacker and cooling system)
  • Nano coating on the optical valves
  • Isolated stabilizer system for lasers and receivers
  • lightning arrester
  • Ability to install solar cells on it
  • Appropriate and changeable dimensions for different environmental conditions
  • Installation of unbreakable and anti-scratch laminate on light valves
  • Human detection system around the body
  • Body isolation from the equipment
Other features
  • The laser wall or fence can be produced in several color ranges (visible) and invisible. Visible spectrometers are for places where a visual indicator is needed and the visibility of the beam can be one of the warning signs, and in places where the visible spectrum and visual beam cause special sensitivity, invisible beams with X and IR wavelengths can be used.
  • Sound system in each box in the form of a siren or speech (pre-recorded)
  • The distance density between lasers can be changed depending on different applications. For example, high density in places where animals move and low density in areas where large animals and humans move. In addition to reducing costs, this density helps the accuracy and performance of the system in order to separate the infiltrating entity.
  • It has a system for reporting malfunctions and possible defects in the entire system along with the ability to remove the defective device from the system
  • High performance and reliability in harsh environmental conditions
  • Can be operated by solar energy
  • Energy consumption control system
  • The power consumption is about 20 w
  • Working voltage 220 volts alternating or 12 volts direct
  • Ability to build and design in different packages for different environments, including mountainous, desert, urban, hot and humid, dry and cold weather.

Smart electro-fence

The SADAF wire fence, which is designed and produced in competition with the microphone cable, can be installed on the wall, fence and ground.

 

Technical specifications of SADAF wire fence
  • It has intrusion detection sensors to determine the entry point in a related zone. (20 meter areas)
  • It has support bases at 20 meter intervals.
  • It has 8 strands of hot/cold galvanized wire.
  • Anti-deception: The intelligent design of the wire fence system has made it impossible for attackers to deceive the system or pass through it, that is, due to the voltage difference created between the fence wires and also the voltage difference with the ground if the voltages become zero. As mentioned, the system gives an alarm and protects the system from being deceived and preventing it from causing a shock.
  • It has support bases at 20 meter intervals.
  • It has a sensor control board and receiving alarms from sensors and setting its parameters as follows:
    • Consumption voltage: 10-30 volts DC
    • It has 8 sensor inputs.
    • It has 4 digital inputs.
    • RS485 port with standard protocol.
    • Has a specified MAC address

Homaye Hefazat software

This software is responsible for controlling and managing the system, and in its design and production, the most advanced and up-to-date methods in software production technology have been used.

Homaye Hefazat software specifications
  • The ability to manage all perimeter protection elements and various web based and local sensors.
  • 2D and 3D graphic display. Can be used in energy consumption management systems and the ability to control any external device and hardware.
  • Using domestically produced smart processing engines for higher security
  • 3D and 2D modeling of elements with audio and video indicators
  • Ability to communicate with all types of outdoor, analytical and IP cameras
  • The possibility of setting presets and guiding and target control for cameras
  • Hardware setting of controlled elements
  • Removing unwanted alarms
  • Ease of removing defective elements from the system
  • Ability to work simultaneously with three monitors to display 2D, 3D maps and video cameras
  • Extremely easy to use due to the use of intelligent software engine
  • Ability to develop and add other software as well as coordination with other security software
  • Ability of generating web based statistics of all the events that happened
  • The ability to connect to the Internet and intranet
  • Continuous management of alarms, pre-alarms and false alarms
  • Sending SMS for operation management
  • Ability to receive SMS to apply some commands
  • 2D and 3D mapping and simulation of the protected site
  • The possibility of controlling all systems and elements such as lighting system, closed circuit, all kinds of controllable facilities, all kinds of control rooms, control of dam valves, all kinds of entrances and exits, the area of refineries and ports, etc.
  • Very easy to use and simple operation of complex facilities by using two-dimensional and three-dimensional map display and clicking with the mouse on the desired option and applying desired settings and changes.
  • Constant monitoring of information intelligently
  • Intelligent anti-intrusion systems
  • Military grade protocols to communicate with the hardware in order not to create a bypass
  • Different user levels such as management, operator, etc
  • Two levels of access to the hardware system
  • Data encryption using the advanced AES algorithm
  • Graphics engine for displaying two-dimensional vector images (Vector Graphics) with SVG format support
  • Advanced 3D graphics engine to display the environment using OpenGL3.0+, DirectXAPI10+
  • Ability to run on Windows as well as Linux platforms for greater security
  • Saving all events in a encrypted database
  • Ability of viewing events and reporting through the web in SSL and without the need for a browser
  • The possibility of determining the level of access to users and restricting them from different parts of the software
  • The Linux version comes with a customized version of Linux that has high security and speed
  • Configuration and settings by separate software with easy user interface.
  • Software implementation in the form of client and server architecture
  • The possibility of installing different modules on the software to improve its performance. For example, adding the Mailer module to send an email or SMS to the user in case of a special event.

Reviews

There are no reviews yet.

Be the first to review “SADAF Perimeter Protection System”