Sfitex. The meeting place cannot be changed.
Sfitex. The meeting place cannot be changed. For many years now, leading security experts have been gathering in St. Petersburg in the fall. Their meeting place is traditionally the exhibition «Security and Safety — Sfitex», which was held for the 17th time this year. From October 15 to 18, more than 250 companies from Great …
Zelenograd streets will be illuminated by the latest energy-saving LEDs.
The article «Saving on a Light Bulb», published in «Vedomosti», is dedicated to the innovative technologies of the company «TSERS», which develops LED lighting equipment and recently became a resident of the Zelenograd special economic zone (SEZ). The article describes the history of the company's development since 2005, when a holding company engaged in high-tech …
Zelenograd streets will be illuminated by the latest energy-saving LEDs.Далее …
The success of the QNX Technology Day confirmed the interest of the Russian IT community in the latest QNX RTOS technologies.
The success of the «QNX Technology Day» confirmed the interest of the Russian IT community in the latest QNX RTOS technologies. The success of the «QNX Technology Day» confirmed the interest of the Russian IT community in the latest QNX RTOS technologies The success of the «QNX Technology Day» confirmed the interest of the Russian …
From July 1, the construction industry will switch from a licensing system to self-regulation.
From July 1, the construction industry switches from the licensing system to self-regulation. From July 1, the construction industry switches from the licensing system to self-regulation From July 1, the construction industry switches from the licensing system to self-regulation The upcoming abolition of licensing in the construction sector after July 1 and the introduction of …
SystemGroup has implemented an innovative solution, “Queue Killer,” in the KARAVAN hypermarket.
SystemGroup has implemented an innovative solution, «Queue Killer,» in the KARAVAN hypermarket. SystemGroup has implemented an innovative solution, «Queue Killer,» in the KARAVAN hypermarket. SystemGroup has implemented an innovative solution, «Queue Killer,» in the KARAVAN hypermarket. KARAVAN Group of Companies has become the first Ukrainian retail chain to implement the Queue Killer solution in its …
Recession or restructuring? The crisis creates conditions for strengthening the positions of Russian companies working in the high-tech sector.
Recession or Perestroika? The crisis creates conditions for strengthening the positions of Russian companies operating in the field of high technology. Recession or Perestroika? The crisis creates conditions for strengthening the positions of Russian companies operating in the field of high technology. Recession or Perestroika? The crisis creates conditions for strengthening the positions of Russian …
Professionals unite
Professionals Unite Since January 1, 2010, the only permit for an organization to operate in the construction industry is a certificate of admission issued by a self-regulatory organization. By this time, licenses are completely terminated, and the law «On Self-Regulatory Organizations» comes into force. According to this law, all engineering, construction and design organizations must …
MIRAX GROUP and Jones Lang LaSalle have signed a cooperation agreement.
MIRAX GROUP and Jones Lang LaSalle have signed a cooperation agreement. According to the agreement signed by the parties for a period of three years, Jones Lang LaSalle specialists will provide Federation Management Tower CJSC with marketing and sublease services for premises located on the lower (-2, -1 and 1) floors of the Federation business …
MIRAX GROUP and Jones Lang LaSalle have signed a cooperation agreement.Далее …
KNX has gone international.
KNX has become an international standard: ISO/IEC 14543-3 KNX is a globally recognized INTERNATIONAL STANDARD for home networks and building management. KNX has already proven its compliance with the requirements of both European standards CENELEC EN50090 and CEN EN 13321-1, and its recent recognition as an international standard (ISO/IEC 14543-3) has only confirmed the importance …
Excursion to the Federation Moscow City complex.
Excursion to the Federation Complex Moscow City. On November 14, 2006, MIRAX GROUP organized an exclusive excursion for the BIG-RU association to the towers of the Federation complex under construction. Currently, the building of Tower B («West») has been built up to the 62nd floor, with one more floor remaining. Then the entire facade of …
ARMO-Group demonstrated the benefits of building automation.
«ARMO-Group» demonstrated the benefits of building automation. The company «ARMO-Group» took part in the 7th International Exhibition HI-TECH BUILDING & House, dedicated to modern technologies for equipping, automating and operating business buildings. Visitors to the company's stand got acquainted with its new projects and solutions for building automation, as well as areas of activity for …
ARMO-Group demonstrated the benefits of building automation.Далее …
A new stage in the development of system integration: “system master – integrator”.
A new stage in the development of system integration: «system master — integrator». The development of today's open systems market is leading to a dramatic change in business relations in the field of building automation. Most manufacturers are moving or have already moved to open systems. The use of a single infrastructure across all sectors …
A new stage in the development of system integration: “system master – integrator”.Далее …
YORK Johnson Controls: Automation of high-rise refrigeration systems.
YORK Johnson Controls: Automation of high-rise refrigeration. YORK Johnson Controls has its own special examples of the implementation of automated control systems for the refrigeration of high-rise buildings. In accordance with MGSN, refrigeration systems and refrigeration units of high-rise buildings must: — ensure the specified parameters of the coolant during the billing period, the ability …
YORK Johnson Controls: Automation of high-rise refrigeration systems.Далее …
Implementation of “Intelligent Building” class solutions during reconstruction of buildings and structures.
Implementation of “Intelligent Building” class solutions during reconstruction of buildings and structures. Today, when large cities in Russia are experiencing an upswing in construction production, the condition of a significant number of buildings and structures in operation determines the objective need for reconstruction of engineering systems, technological cycles, structural and other components of construction projects. …
Technical and economic assessment of “Intelligent building” class solutions for reconstruction of buildings and structures.
Technical and economic assessment of solutions of the “Intelligent Building” class in the reconstruction of buildings and structures. Technical and economic assessment of the effectiveness of the application of specific organizational, technological and technical solutions is based on a multi-criteria analysis of various factors. To solve this problem, two methods have been adapted: target programming …
A fresh look at building automation and air filtration.
A fresh look at building automation and air filtration. Ken Bloom, President, Precision Air Technology, Inc. The issue of regular replacement of air filters is not exclusive to any modern ventilation and air conditioning (HVAC) system. Perhaps, not much attention was paid to this issue before. However, there is a growing understanding that it is …
A fresh look at building automation and air filtration.Далее …
Disposer or how to grind everything into powder.
Disposer or how to wipe everything into dust. Most of the problems in our lives arise from garbage: the one in our heads prevents us from adequately perceiving the world around us, the one on the streets disfigures our cities, and, finally, food garbage in the kitchen causes an unpleasant odor and serves as a …
Payback periods for energy-saving equipment.
Payback periods for energy-saving equipment. The practice of using energy-saving equipment, namely frequency converters, which are used to change the performance of fans, pumps, compressors, shows that this type of equipment often belongs to the «extra» category, since air or water can be supplied without these devices, and in the case of a requirement for …
NRG Systems Energy Efficiency System – LEED Gold Certified for Industrial Buildings.
NRG Systems Energy Saving System – LEED Gold Certified in Industrial Building Construction. Joy Null, Director of Public Relations, Watt Stopper/Legrand June 2007, Santa Clara (USA, California). NRG Systems, headquartered in Vermont, built its new headquarters taking into account environmental requirements, as well as requirements put forward by local unions and employees. The 4,325 square …
NRG Systems Energy Efficiency System – LEED Gold Certified for Industrial Buildings.Далее …
Automation system for the residential complex «Blizhnyaya Dacha».
Automation system of the residential complex «Blizhnyaya Dacha». Author: Zakharov N.S. Leading specialist in air conditioning systems, Moscow representative office of Mitsubishi Electric In the spring of 2006, the residential complex «Blizhnyaya Dacha» will be put into operation in Moscow, where multi-zone air conditioning systems «City Multi» manufactured by Mitsubishi Electric are installed. The general …
Automation system for the residential complex «Blizhnyaya Dacha».Далее …
The greenest skyscraper in New York.
The greenest skyscraper in New York. The owner of the skyscraper, Douglas Durst, and the chief architect, Robert Fox, hope that their building will become the most environmentally friendly in the world. All stages of the building's construction were modified in such a way that the developers of the high-rise could receive the desired rating …
Building automation systems market in the USA.
The building automation systems market in the USA. The company «BCS Partners» recently published an analysis of the North American building automation systems (BAS) market («BCS/2006: The Building Control Systems Market (2005-2010).»). This analysis revealed a number of important and perhaps surprising facts. Leading BAS vendors are pushing digital control systems in conjunction with centralized …
NEXA Software by Citect
NEXA software from Citect Citect has been a software supplier and successful player in the market of automation of buildings, infrastructure facilities, housing and utilities for over 30 years. To solve this class of problems, Citect offers the Nexa software product, the main functions of which are: centralized control and management of ventilation, heating and …
LEED Program: Models and Reality.
LEED Program: Models and Reality. Assessing the Effectiveness of Water and Energy Consumption Reduction Measures in 11 New Buildings in the Pacific Northwest. Cathy Turner New Buildings Institute Inc., Washington, USA* Is it Real to Reduce Water and Energy Consumption in Buildings That Meet Modern Environmental Standards? A recent study provides a preliminary assessment of …
Selling fear.
Selling fear. Service engineering is one of the few professional fields of activity where, as a tool for increasing revenue for service providers, it is possible to use the client's fear, forcing them to renew service contracts and abandon traditional design in favor of individual ones. Using building automation systems as a basis for escalating …
BACnet Practical Workshop – New Possibilities for Building Automation.
BACnet Practical Seminar – New Possibilities for Building Automation. When: May 15, 2007 Where: St. Petersburg, North-West RF Exhibition Center (building of the Research Institute «Electronstandart», pl. Pobedy, 2 (metro «Moskovskaya», exit to ul. Altayskaya). From May 15 to 17, 2007, the 3rd international specialized exhibition of equipment and technologies for industrial automation and embedded …
BACnet Practical Workshop – New Possibilities for Building Automation.Далее …
Apartment heat metering: problems and solutions.
Apartment-by-apartment heat metering: problems and solutions. Introduction Yu. Luzhkov: Muscovites are too wasteful in consuming energy resources. (Prime-TASS). Muscovites are excessively wasteful in consuming energy resources, according to Moscow Mayor Yuri Luzhkov. “According to various sources, Moscow consumes 4 tons of equivalent fuel per person per year — this is the most wasteful consumption compared …
Training of specialists in the field of automation of buildings and structures at MGSU: history and development prospects.
Training of specialists in the field of automation of buildings and structures at MGSU: history and development prospects. The history of training engineering personnel in the automation of buildings and structures (gas stations) is relatively young. As an independent specialty, “Automation of technological processes and production (in construction)”, has existed for less than 50 years, …
What do customers want?
From the editors You've probably already guessed that the topic of the March issue of our newsletter is «What do customers want?». This question has intrigued us for a long time, since at present the need to equip modern buildings with automation systems is obvious to everyone, but there are nuances in the relationship between …
Heating and ventilation of cottages.
Heating and ventilation of cottages. Recently, the idea of multifunctionality has been extended to all inventions, and at the moment there are already enough ways to combine all the functions of climate control in one system. More complete central air conditioners allow you to carry out almost any air treatment process and include: filters (depending …
Basics of warehouse operations using the latest WI-FI technologies.
To optimize work in a warehouse, it is necessary to automate it and establish a certain system of movement of goods in it. A warehouse is one of the most important links in the structure of any company that owns it. An automated warehouse contributes to the successful operation of a company, its superiority over …
Basics of warehouse operations using the latest WI-FI technologies.Далее …
Not savings, but profit.
Not savings, but profit. Paul Ehrlich, an information systems consultant, presented a number of figures at his Building Intelligence Tour Seminar at the ASHRAE Winter Convention that can help building engineers convince their clients of the economic feasibility of creating and using information systems for managing building engineering systems. He looked at scenarios for an …
Multifunctional complexes today: a problem, a necessity or an inevitability?
Multifunctional complexes today: a problem, a necessity or an inevitability?. Multifunctional complexes today: a problem, a necessity or an inevitability? Multifunctional complexes today: a problem, a necessity or an inevitability? Nika Pologovaya The main trend in the real estate markets of Europe and the USA, which are followed by the development of the markets of …
Multifunctional complexes today: a problem, a necessity or an inevitability?Далее …
Maximum monitoring capabilities.
Maximum monitoring capabilities. Maximum monitoring capabilities Maximum monitoring capabilities First, answer the test question: «Which of the following options best describes the frequency with which you use your energy monitoring system?» A. Almost every day. I find this system to be a useful tool that helps me get my work done efficiently. B. At least …
Leonid Nikolaev. Hotels need intelligence.
Hotels need intelligence The correspondent met with Leonid Nikolaev, First Vice President of JSC GAO MOSCOW, an organization authorized by the capital's government to coordinate work and conduct monitoring within the framework of the hotel construction program. Corr.: The General Development Plan for Moscow and the hotel construction program have been adopted and approved. That …
Integrated dispatching system for engineering systems of the Avtoframos plant.
Integrated dispatching system for engineering systems of the Avtoframos plant. Integrated dispatching system for engineering systems of the Avtoframos plant Integrated dispatching system for engineering systems of the Avtoframos plant OAO Avtoframos is a joint venture of the French concern Renault and the Moscow government for the production of Renault Logan cars. Renault specialists have …
Integrated dispatching system for engineering systems of the Avtoframos plant.Далее …
How to organize a “breathing” office.
How to organize a “breathing” office. How to organize a “breathing” office How to organize a “breathing” office City dwellers spend at least a third of their lives in the office. If we take into account that another third is spent sleeping, it turns out that a person is within the walls of office premises …
Intelligent buildings – from practice to theory.
Intelligent buildings — from practice to theory. Author: Volkov A.A. Doctor of Engineering Sciences, Professor, Dean of the Faculty of ISTAS MGSU The article continues a series of publications presenting the foundations of the promising science of designing “intelligent” buildings, directly aimed at eliminating the existing methodological gap between practice and theory in creating building …
Intelligent systems for modern operation.
Intelligent systems. Author: L.N. Makeev, Leading Specialist of the Automation and Dispatching Department of JSC NPO SEM The Automation and Dispatching Department of JSC NPO SEM (DAD) has completed another major project to create an automated control and management system for engineering equipment in the Pokrovskoe-Glebovo residential complex in Moscow. The property is an elite …
Integrated solutions based on BACnet and KNX protocols.
Solutions based on BACnet and KNX protocols. Neues Kranzler Eck (Berlin, Germany) The Neues Kranzler Eck office centre with an office area of 45,000 square metres offers space for 1,800 to 2,000 workstations. The building automation system was implemented using the KNX protocol, which is linked to the control level via BACnet gateways and is …
Integrated solutions based on BACnet and KNX protocols.Далее …
Engineering systems of a sports and recreation complex.
Engineering systems of the sports & health complex. Engineering systems of the sports & health complex. Engineering systems of the sports & health complex. health complex Since 1992, the engineering equipment in the building has been controlled using Sauter controllers. Last year, the entire building and automation were reconstructed. A unified engineering systems control system …
Engineering systems of a sports and recreation complex.Далее …
Hotels and hotel business.
Marina Smirnova is the Deputy Director of the Consulting Department, Head of the Hotel Consulting Group at Colliers International. About the company: Colliers International is an international consulting company providing services in the field of commercial real estate. It unites offices in North and South America, Europe and Asia, which makes it possible to apply …
Homeostat of buildings and structures.
Author: Volkov A.A.Doctor of Engineering Sciences, Professor, Dean of the Faculty of ISTAS MGSU This article continues a series of publications presenting the fundamentals of the promising science of designing “intelligent” buildings, directly aimed at eliminating the existing methodological gap between practice and theory in creating automation systems for buildings and structures at all levels …
Functional management of buildings.
Functional management of buildings. This article continues a series of publications presenting the fundamentals of promising applied science for designing “intelligent” buildings, directly aimed at eliminating the existing methodological gap between practice and theory in creating automation systems for buildings and structures at all levels (see AZ Bulletin, No. 5, 2006). The necessary terms and …
Once again about skyscrapers.
A little about skyscrapers. They talk and write a lot now about the fact that in our climate conditions, and especially in the absence of experienced specialists in Russia, it is dangerous to build skyscrapers. But, for example, in Toronto, which is very close to us in climate, high-rise buildings are built perfectly. There are …
Once again about the convergence of IP and IT.
Anto Budjarjo, President and CEO of Clasma Events Inc There is a lot of talk these days about the convergence of information technology (IT) and building automation systems. When I visited the AHR Expo in Chicago, I was asked the same questions over and over again. In this article, I will try to answer them. …
Saving on household expenses.
Five years ago, utility bills were annoying because you had to fill out a lot of receipts, although the bills themselves were pennies. Now they send us ready-made receipts, but the prices in them are no longer a joke. Tariffs will only go up from here. But if earlier electricity and water could be saved …
Gesis component system for electrical installations in buildings and structures.
Gesis component system for electrical installation in buildings and structures. Gesis component system for electrical installation in buildings and structures Gesis component system for electrical installation in buildings and structures The German company Wieland Electric GmbH offers the revolutionary Gesis component system for power supply systems and building infrastructure management. The use of Gesis allows …
Gesis component system for electrical installations in buildings and structures.Далее …
What is an Intelligent Building?
Andrey Golovin, Editor-in-Chief Dear readers! You are holding in your hands the first issue of the bulletin «Automation of Buildings in Russia», established and prepared by the BIG-RU Building Automation Association and the ALTpress publishing house. Probably, many will ask why another publication about building engineering systems is needed? Of course, today in Russia there …
The battle for heat in light of building automation.
The battle for heat in the light of building automation.. The battle for heat in the light of building automation. The battle for heat in the light of building automation. In Sverdlovsk Oblast, funding for the energy conservation program is being increased. USTU-UPI proposes to prohibit the connection of buildings built in violation of heat …
Biometrics in fitness clubs: visitors value safety and comfort.
Biometrics in fitness clubs: visitors value safety and comfort. Biometrics in fitness clubs: visitors value safety and comfort Biometrics in fitness clubs: visitors value safety and comfort Metalink and BioLink have integrated biometric identification technologies into the Metalink Fitness Manager management accounting system used in fitness clubs in Russia and the CIS. Fingerprint identification has …
Biometrics in fitness clubs: visitors value safety and comfort.Далее …
Bill Clinton: $5 billion for building energy efficiency.
The goal of the program is to reduce energy consumption in existing buildings. The program's partners were: The American Society of Engineers ASHRAE, the United States Green Building Council (USGBC). With their direct participation, standards for the design of building engineering systems will be developed to successfully achieve this goal. Clinton noted: ”Climate change is …
Bill Clinton: $5 billion for building energy efficiency.Далее …
Automation of high-rise buildings.
Automation of high-rise buildings. The topic of the October issue is high-rise buildings. We deliberately chose it, realizing that today this is a TOP-direction and the materials will be of interest to a wide range of specialists. But today only the lazy have not written articles and spoken at conferences on the topic of high-rise …
Automation of shopping and shopping and entertainment centers.
Automation of shopping centers and shopping and entertainment complexes. Automation and control systems in shopping and entertainment centers, as a rule, have a standard set of subsystems: automation of heating, ventilation and air conditioning systems, security systems. A typical task for such systems is to control the climate in large shopping areas, when there are …
Automation of shopping and shopping and entertainment centers.Далее …
Automation of school building.
School automation. Caroline Cadieux Marketing Manager Distech Controls, Inc. American high school wins Energy efficiency award Situation analysis Connolly High School, located in Tempe, Arizona (USA), won the Governor's Award for Energy Efficiency in 2005. These prestigious awards are presented annually to public institutions that have demonstrated the greatest optimization of energy use through the …
Automation is the only way to create an effective management system
Automation is a way to create an effective control system. The main goal of automatic remote control systems is to continuous monitoring of the ventilation systems, refrigeration center, boiler and heating points. The main difference of the project is the provision of data on controlled objects to the Internet. In automatic remote control systems, continuous …
Automation is the only way to create an effective management systemДалее …
Objective metrics for assessing the quality of video codecs.
Objective metrics for assessing the quality of video codecs. Objective metrics for assessing the quality of video codecs IN SEARCH OF A SUPPORT POINTOne of the trends in the CCTV market is the diversity of video codecs present in it. Almost every developer of CCTV software and hardware strives to develop their own unique video …
Objective metrics for assessing the quality of video codecs.Далее …
MPEG-4 vs H.264.
MPEG-4 vs H.264. MPEG-4 vs H.264 Of course, it is incorrect to contrast MPEG-4 and H.264, since H.264 and MPEG-4 (part 10) are the same thing. However, it turned out to be more convenient to write the main part of the article, understanding MPEG-4 only as MPEG-4 (part 2). MPEG-4 structure and a bit of …
Selecting fiber optic video transmitters.
Selecting fiber-optic video signal transmitters. Selecting fiber-optic video signal transmitters It has long been known that copper lines are limited in their capabilities. The kilohertz spectrum of telephone channels can be transmitted over tens of kilometers. The megahertz spectrum of a video signal — over hundreds of meters. And this is under optimal conditions, in …
Image processing in CVS systems.
Image processing in CVS systems. In CVS computer television systems, the amplitude and spectral characteristics of images in each frame are analyzed. The results of the analysis are then used to improve the image, the operation of motion and activity detectors, deinterlacing, eliminating redundancy, compression and transmission of images over the network. Digital video recorders …
Quick search for a needle in a haystack, or how to properly organize work with a video archive.
Quick search for a needle in a haystack, or how to properly organize work with a video archive. Technologies do not stand still, their development is daily pushed by the ever-increasing demands of consumers. Indeed, if 3-4 years ago recording at a speed of 50 fields per second on 16 channels did not raise any …
Selecting the exposure time for a security camera in single-shot video signal generation mode.
Selection of exposure time for a security camera in the single-shot video signal generation mode. Vyacheslav Mikhailovich SMELKOV, Candidate of Technical Sciences SELECTION OF EXPOSURE TIME FOR A SECURITY CAMERA IN THE SINGLE-SHOT VIDEO SIGNAL GENERATING MODE The article analyzes possible methods for automatic selection of accumulation time depending on the parameters of the …
Television photography of a test object with pulsed exposure of a photodetector by a packet of flashes.
Television photography of the test object with pulsed exposure of the photodetector by a flash pack.. Television photography of the test object with pulsed exposure of the photodetector by a flash pack. Smelkov Vyacheslav Mikhailovich, Candidate of Technical Sciences, Associate Professor TELEVISION PHOTOGRAPHY OF THE CONTROL OBJECT WITH PULSE EXPOSURE OF THE PHOTO DETECTOR WITH …
Television observations in difficult conditions.
Television observations in difficult conditions. Kulikov Alexander Nikolaevich TELEVISION OBSERVATIONS IN DIFFICULT CONDITIONS. Quite recently, in 1970, a microprocessor and a charge-coupled device (CCD) appeared simultaneously [1]. Modern life is already unthinkable without computers and CCD cameras. The electronic revolution continues and amazes us every year with new products and unprecedented price reductions. It is …
Different units – different results of measuring the sensitivity of television cameras.
Different units — different results of measuring the sensitivity of television cameras.. Different units — different results of measuring the sensitivity of television cameras. KRUTIK Mikhail Ilyich, MAYOROV Viktor Petrovich LUMENS, CANDELAS, WATTS AND PHOTONS. DIFFERENT UNITS – DIFFERENT RESULTS OF MEASURING THE SENSITIVITY OF TV CAMERAS BASED ON IMAGE TUBE AND CCD The authors …
Different units – different results of measuring the sensitivity of television cameras.Далее …
FEATURES OF TECHNOLOGICAL EQUIPMENT FOR ALIGNMENT OF THE TELEVISION SYSTEM'S SIGHTING AXIS.
FEATURES OF TECHNOLOGICAL EQUIPMENT FOR ALIGNMENT OF THE SIGHTING AXIS OF A TELEVISION SYSTEM.. FEATURES OF TECHNOLOGICAL EQUIPMENT FOR ALIGNMENT OF THE SIGHTING AXIS OF A TELEVISION SYSTEM. Vyacheslav Mikhailovich SMELKOV, Candidate of Technical Sciences, Associate Professor FEATURES OF TECHNOLOGICAL EQUIPMENT FOR ALIGNMENT OF THE SIGHTING AXIS OF A TELEVISION SYSTEM In [1], a method …
FEATURES OF TECHNOLOGICAL EQUIPMENT FOR ALIGNMENT OF THE TELEVISION SYSTEM'S SIGHTING AXIS.Далее …
METHOD OF INCREASING THE RESOLUTION OF A TELEVISION CAMERA FOR FORENSIC DIAGNOSTICS.
Vyacheslav Mikhailovich SMELKOV, PhD in Engineering, Associate Professor METHOD OF INCREASING THE RESOLUTION OF A TELEVISION CAMERA FOR FORENSIC DIAGNOSTICS Due to the non-destructive nature of reading information and the convenience of providing it to the consumer, the television method is preferred in conducting various forensic studies. The most important link in the television hardware …
METHOD OF INCREASING THE RESOLUTION OF A TELEVISION CAMERA FOR FORENSIC DIAGNOSTICS.Далее …
“PIR” METHOD FOR 24-HOUR SECURITY CAMERA.
THE “PIR” METHOD FOR A 24-HOUR SECURITY CAMERA.. THE “PIR” METHOD FOR A 24-HOUR SECURITY CAMERA. SMELKOV Vyacheslav Mikhailovich THE “PiP” METHOD FOR A 24-HOUR SECURITY CAMERA The term “PiP” is an English abbreviation for the phrase “picture in picture”, which means “image in image” or “picture in picture”. Looking back at the “PiP” method …
PRESS THE BUTTON… What do we see on the screen when we try to play back CCTV recordings?
PRESS THE BUTTON… What do we see on the screen when trying to play back CCTV recordings?. PRESS THE BUTTON… What do we see on the screen when trying to play back CCTV recordings? PRESS THE BUTTON… What do we see on the screen when we try to play back CCTV recordings? CCTV is at …
PRESS THE BUTTON… What do we see on the screen when we try to play back CCTV recordings?Далее …
What the IP era has in store for us…
What the IP era has in store for us…. If you look at all the well-known media resources covering the security industry in recent months of this year, it is easy to notice that a number of articles are devoted to a new direction – security IP television. Most of these articles are, of course, …
ISS is the first to implement international standards for technical support.
ISS is the first to implement international technical support standards. ISS has always paid great attention to technical support issues. The qualifications of specialists, the list of services provided, their quality and efficiency — all this plays an important role in working with Partners. ISS announces an improvement in the quality of service and the …
ISS is the first to implement international standards for technical support.Далее …
Advanced functionality of modern cameras.
Expanded functionality of modern cameras. The use of digital signal processors (DSP) in the circuitry of modern analog cameras has made it possible not only to improve the quality of the formed image — namely, to increase clarity, sensitivity and dynamic budget — but also to implement a range of additional functions taking into account …
AXIS Q1910 thermal IP cameras can “see” even a black cat in a dark room.
AXIS Q1910 thermal IP cameras will “see” even a black cat in a dark room. The Q1910 Series thermal network cameras are the first AXIS Communications devices to combine the functionality of IP cameras with the advantages of infrared cameras. They can operate indoors or outdoors in absolute darkness, detecting objects at any time of …
AXIS Q1910 thermal IP cameras can “see” even a black cat in a dark room.Далее …
Innovation as a strategy.
Innovation as a strategy. The brief of the company «Nedap» gives the following definition of its activities: «Nedap is an innovative commercial enterprise.» For my part, I am ready to fully subscribe to this phrase, which, as it seems to me, expresses the basis of the modern mechanism for the emergence of innovations in any …
Communication interfaces for access control systems.
Communication interfaces for access control systems. Let me make a reservation right away: I am not writing these notes at all to compare the most frequently used communication interfaces for access control systems (ACS) today and to name the best ones. For a normal specialist, there are no «best» ones. There are those that are …
Parsec — reliable and functional!
Parsec is reliable and functional! Sergey Stasenko, Relvest Group of Companies sserg@relvest.ru ParsecNET 2.5: a new level of reliability A new version of software for the ParsecNET integrated security system has been released. The user will find very few external differences, but «inside» — this is completely different software. Maintaining a user-friendly external interface was …
RFID — prospects and reality.
RFID — Prospects and Reality. Let the reader not be confused by some violation of the sequence of words in the construction of the title. I did this intentionally: after all, in order to assess the current state of affairs in terms of the implementation of RFID technology, we need to take a look back …
NEDAP-AEOS Access Control System: Concentration of Advantages.
NEDAP-AEOS access control system: concentration of advantages. NEDAP-AEOS access control system: concentration of advantages NEDAP-AEOS access control system: concentration of advantages PROGRAMMABLE CONTROLLER One of the unique features of the AEOS system is the ability to “behaviourally” program the operation of your controllers.The server contains the necessary software components describing all possible system configurations, from …
NEDAP-AEOS Access Control System: Concentration of Advantages.Далее …
Access control system NEDAP-AEOS. A new look at security management.
NEDAP-AEOS Access Control System. A New Look at Security Management. NEDAP-AEOS Access Control System. A New Look at Security Management NEDAP-AEOS Access Control System. A New Look at Security Management The role of management in the technical security of a company is constantly growing. Keeping up with the latest technologies and realizing all their benefits …
Access control system NEDAP-AEOS. A new look at security management.Далее …
ACS: access via Ethernet.
ACS: access via Ethernet. Everyone talks and writes about the IP revolution in access control systems (ACS). What is it in practice? Why Ethernet? Let's start with the fact that this is not a revolution, but rather an evolution. The process has been going on for several years, but to this day the share of …
ACS: savings and accounting.
ACS: savings and accounting. In most cases, any security systems, including ACS, are often considered by property owners as a kind of burden — something that requires additional (sometimes considerable) financial costs. I will not consider the advantages of using ACS in this article, I will only focus on those features of using systems that …
ACS and IP: no need to build barricades.
ACS and IP: no need to build barricades. I may disappoint some readers, but there will be no revolutionary pathos in these notes, typical of many publications on the introduction of IP technologies into security systems. I don’t think there is any reason for such statements. Because IP is just a low-level protocol for transmitting …
Current state of the network access control system market in Saint Petersburg.
Current state of the network access control system market in St. Petersburg. In the spring of 2010, specialists from the Club of Business and Politics Consultants conducted a telephone survey of organizations engaged in the sale and installation of security systems in St. Petersburg. Of the 528 registered enterprises, 244 (46%) took part in the …
Current state of the network access control system market in Saint Petersburg.Далее …
Selection and design of access control systems: basic mistakes and miscalculations.
Selecting and designing an ACS: basic mistakes and miscalculations. As the saying goes, only he who does nothing makes no mistakes. However, in relation to the topic of this article, there are a number of fairly common miscalculations and mistakes, avoiding which can save your nerves and the customer's. Plus, you can save money. The …
Selection and design of access control systems: basic mistakes and miscalculations.Далее …
What is long-range identification for? What tasks does it solve?
What is long-range identification for? What tasks does it solve?. Long-range identification is identification based on radio frequency identification (RFID) technology. When we talk about long-range identification, we are talking about reading tags at long distances. This can be 5-10 meters, and for some tasks, 50-100 meters. One of the areas of application of long-range …
What is long-range identification for? What tasks does it solve?Далее …
Mechatronic access control and management systems VERSO CLIQ from Effeff IKON ASSA ABLOY Sicherheitstechnik GmbH.
Mechatronic access control and management systems VERSO CLIQ from effeff IKON ASSA ABLOY Sicherheitstechnik GmbH.
Automatic parking operation: problems and solutions.
Automatic parking operation: problems and solutions. If there are traffic rules and technical means for this, then there must be rules for road standing and, accordingly, equipment for this. That is, there must be areas and buildings for parking cars, there must be a system for informing drivers about the location of such facilities and …
Access point operating modes.
Access point operating modes. Recently, I've been hearing more and more often that access control systems are competing in some system parameters — one can work with 10,000 cards, and another — with a million. One can service 250 checkpoints with turnstiles, and another — 5,000 checkpoints. One works via radio, and another via the …
Hands must be touched. Biometric readers by ZKSoftware.
Hands are a must. Biometric readers from ZKSoftware. Any access control system (ACS) starts with keys that are given to each user. In this case, the key in modern ACS can be cards or key fobs of various types: magnetic, Wiegand and proximity. No matter how convenient and reliable these passes are, they also have …
Hands must be touched. Biometric readers by ZKSoftware.Далее …
Symbiosis of 1C:Enterprise and access control systems. A new look.
Symbiosis of 1C:Enterprise and access control systems. A new look. The intensive development of IT technologies for enterprise management and security technologies inevitably had to lead to their intersection. This process has been going on for a number of years and is actively discussed on the pages of various publications by both industrial automation specialists …
Symbiosis of 1C:Enterprise and access control systems. A new look.Далее …
Time and attendance terminals.
#Time tracking Time tracking terminals. Purpose The efficiency of any enterprise largely depends on the efficiency of its employees. The issue of labor discipline plays an important role in this — management, of course, wants to pay its employees for the time actually worked time. It is important to take into account that it is …
Technologies for protection against intruders.
Technologies for protecting against intruders. Technologies for protection against intruders Technologies for protection against intruders In recent years, we have seen rapid changes in the field of network technologies and the economic conditions in which they are used. It has become increasingly clear that existing approaches to such an area of activity as security management …
Features of creating access control systems in universities.
Features of creating ACS in universities. Since 1993-1996, information technologies have been actively introduced into all areas of educational institutions, and especially into the educational process. At present, any university has the following automated information systems (AIS): AIS «Student Contingent Management» — end-to-end accounting of students in the relevant structural divisions of the university; AIS …
Features of creating access control systems in universities.Далее …
Road and parking blockers.
Road and parking blockers. Devices for blocking the passage of vehicles are used, as a rule, as part of access control and management systems of the general complex of security systems of any facility: banking institutions, office centers, strategically important facilities, for example, defense enterprises, embassy buildings. The device for blocking the passage of vehicles …
Parking systems for above-ground and underground paid parking.
Parking systems for above-ground and underground paid parking lots. Speaking about parking, it should be noted that it is a mandatory element of the infrastructure, for example, of a shopping center. The buyer will leave his money where he can park his car without problems, and then quickly find it. Without worrying about the fate …
Parking systems for above-ground and underground paid parking.Далее …
Barriers.
Barriers. A barrier, as is known, is one of the most common peripheral actuators for controlling the movement of vehicles within the framework of a general security system at a facility, for example, an ACS. At the same time, in parallel with the security market, this device is no less popular in the market of …
Modern perimeter security systems. Article updated 09.04 in 2023.
Modern perimeter security systems. Vvedenskiy Boris Sergeevich, candidate of physical and mathematical sciences MODERN PERIMETER SECURITY SYSTEMS (End. Beginning in Nos. 3, 4, 1999) Introduction Previous issues examined perimeter security systems of various types: optical, radio wave, radio beam, capacitive, etc. This final part of the article describes perimeter systems that are sensitive to vibrations …
Modern perimeter security systems. Article updated 09.04 in 2023.Далее …
Modern perimeter security systems. Article updated 03.04 in 2023.
Modern perimeter security systems. Boris Sergeevich Vvedensky, Candidate of Physical and Mathematical Sciences MODERN PERIMETER SECURITY SYSTEMS (Continued. Beginning in No. 3, 1999) Introduction In the first part of the article we looked at some perimeter security systems using radio emission — radio beam and radio wave. This section describes security systems based on …
Modern perimeter security systems. Article updated 03.04 in 2023.Далее …
PERIMETER SECURITY SYSTEMS WITH FIBER OPTIC SENSORS..
PERIMETER SECURITY SYSTEMS WITH FIBER-OPTIC SENSORS.. PERIMETER SECURITY SYSTEMS WITH FIBER-OPTIC SENSORS. VVEDENSKY Boris Sergeevich, Candidate of Physical and Mathematical Sciences PERIMETER SECURITY SYSTEMS WITH FIBER-OPTIC SENSORS General principles of operation of security systems with fiber-optic sensors Fiber optic cables, which are usually used for transmitting information, can also be used as sensors for perimeter …
PERIMETER SECURITY SYSTEMS WITH FIBER OPTIC SENSORS..Далее …
Office surveillance rules.
Office surveillance rules. Office Surveillance Rules Office Surveillance Rules At the gate — an access control system with magnetic readers. At the entrance to the office — a revolving door with plastic keys. On the floors — electronic locks. Today it is difficult to find an administrative building in which some access control systems would …
Wireless systems for perimeter security.
Radio beam and combined systems The American company Southwest Microwave produces a wireless radio beam system M.I.L. PAC 316, which is a development of the well-known system M.I.L. PAC 310B. The two-position microwave sensor M.I.L. PAC 316 (Fig. 9) consists of a transmitter and receiver on three-support stands, two autonomous battery power supplies, a radio …
Alarm messages over the Internet: feasibility, installation and use features.
Alarm messages on the Internet: feasibility, installation and use features. First of all, I will warn you that in the article, in order not to advertise either myself or competitors, there are no mentions of specific brands and models of products. Do not be upset, specific products can easily be «googled» using Yandex. I will …
Alarm messages over the Internet: feasibility, installation and use features.Далее …
Rapidly deployable perimeter security systems.
Rapidly deployable perimeter security systems. Modern perimeter security systems are characterized by a wide variety of physical principles and design options. Technological advances enable developers to create compact security systems that can quickly organize signal lines even in unprepared areas. Such systems are usually distinguished by covert installation of sensors. They are often used to …
Invisible gates. Beam IR barriers of the Activa series for security systems of internal and external perimeters of objects.
Invisible gates. Beam IR barriers of the Activa series for security systems of internal and external perimeters of objects. Active IR motion sensors from Satel are designed to protect shop windows, museums, window openings and external perimeters of objects from unauthorized intrusion. The Activa series includes 7 models, differing from each other in the number …
Automation of design.
Design automation. Rare is the manager who was not outraged by the slowness of projects in his own organization. Indignation is often accompanied by the desire to disperse the design department. In addition to the radical one, there is another way to solve the problem. It is not implemented so quickly and requires financial costs, …
Intelligent detectors for open spaces.
Intelligent detectors for open spaces. Among professional manufacturers of security detectors, the Swiss company ASIM Technologies has always stood apart due to a number of unique technical solutions and the highest quality of its products. With the loss of independence and inclusion in the international corporation Xtralis, the company has not lost its technological potential …
PIR detectors with anti-masking.
PIR detectors with anti-masking. Passive infrared (PIR) detectors, which have become widespread in the last 10 years, are one of the main technical means of security alarms for protecting premises for various purposes. This is due to a number of undoubted advantages that they have compared to microwave or ultrasonic sensors of similar purposes. First …
Vibrating microphone detection devices.
Vibration microphone detection devices. Vibration microphone detection devices (SDD) are designed to detect an intruder by the vibrations they create in a strong engineering barrier (physical barrier) during penetration into a protected facility.The operating principle of such detection devices is based on recording mechanical vibrations or movements of the fence that occur when an intruder …
Vibrating fiber optic detection devices.
Vibrating fiber-optic detection devices. Vibrating fiber-optic detection devices are designed to detect an intruder by the vibrations of the alarm barrier they create during penetration into the protected facility. The operating principle of vibrating fiber-optic detection devices is based on recording mechanical vibrations or movements of the barrier that occur when an intruder attempts to …
Combined alarm sensors.
Combined security alarm sensors. Combined security alarm sensors Andreev S.P. COMBINED SECURITY ALARM SENSORS Source: magazine «Special Equipment» Combination sensors, also called dual technology sensors, are relatively new and are currently becoming increasingly popular. The advantage of such sensors is a significant reduction in the frequency of false alarms. This is achieved by using a …
RAPIDLY DEPLOYABLE DETECTION AND ALARM SYSTEMS.
RAPIDLY DEPLOYABLE DETECTION AND SECURITY ALARM SYSTEMS. RAPIDLY DEPLOYABLE DETECTION MEANS AND SECURITY ALARM SYSTEMS ZVEZHINSKY Stanislav Sigismundovich, Candidate of Technical Sciences RAPIDLY DEPLOYABLE DETECTION MEANS AND SECURITY ALARM SYSTEMS Perimeter alarm systems (PAS), designed to detect intruders on the ground, are an important part of automated physical protection systems for facilities and …
If you can't see it, you can't steal it!
You can't see — you can't steal! The modern Russian security market offers a wide range of alarm systems aimed at effectively solving the problem of protecting property. The most important points of interest to the consumer are: response time, equipment price and ease of use. No timeDepending on the protection method, the alarm signal …
The security guard gets up early.
Security gets up early. Security rises early Guards rise early Do you think there is nothing to steal in your apartment? You are wrong – such ordinary things as a TV, a computer or a fur coat cost money. Therefore, you should not rely so much on a lucky chance protecting you from uninvited guests …
What you need to know about protecting your electrical grid.
What you need to know about protecting the electrical network. What you need to know about protecting the electrical network. What you need to know about protecting the electrical network. Operation of electrical networksIn production, industrial and other similar premises from operation of electrical networksthe main part of the work depends on, so it is …
What you need to know about protecting your electrical grid.Далее …
Electrical wiring diagram.
Electrical wiring diagram. Electrical wiring diagram Electrical wiring diagram Electrical wiring diagramwill also help in identifying faults, which can be especially difficult to do if there is hidden wiring. For example, due to the serial and parallel connection of individual sections of the circuit, the disappearance of voltage on any terminal device can be caused …
Basic electrical protective equipment and its operation.
Basic electrical protective equipment and their operation. Basic electrical protective equipment and their operation Basic electrical protective equipment and their operation Basic electrical protective equipmentInsulating electrical protective equipment is a means of protection against electric shock, used to ensure electrical safety. The classification of personal protective equipment includes this type of equipment. They are divided …
Basic electrical protective equipment and its operation.Далее …
Semiconductor gas sensors.
Semiconductor gas sensors. Semiconductor gas sensors Semiconductor gas sensors Gas sensors made of semiconductor materials are no less popular — semiconductor gas sensors. The operation of this type of sensor is similar to that of catalytic sensors: it is based on the properties of gas absorption by the surface of a heated oxide. This is …
Rules for installation of household gas cylinders.
Rules for installing household gas cylinders. Rules for installing household gas cylinders Rules for installing household gas cylinders According to official data from a special commission, in most incidents where a gas cylinder explodes, the cause lies in disregard for the rules for using cylinders. Gas cylinders are used in various premises — both residential …
Contradictions between Federal Law 94 and consumer rights.
Contradictions of Federal Law 94 to consumer rights. Contradictions of Federal Law 94 to consumer rights Contradictions of Federal Law 94 to consumer rights The President of the Russian Federation proposed to jail those who profit from government procurement for a long time. Conscientious participants in competitions and tenders even claim that the legislation on …
Contradictions between Federal Law 94 and consumer rights.Далее …
Russian top-class anti-theft systems.
Russian top-class anti-theft systems. Russian high-end anti-theft systems Russian high-end anti-theft systems This anti-theft system is designed to protect your goods from theft, and also serve as a high-quality advertisement for your store, brand of a retail chain. The Detex Line Logo anti-theft system is made in the form of stylish solid stands, on almost …
HDCCTV: comparative analysis.
HDCCTV – the transition to the HD standard without the use of IP technologies – has recently been the subject of close attention from the press. However, it remains unclear to what extent this standard represents a real alternative to systems based on megapixel IP cameras and hybrid digital video recorders. Specification Currently, specification 0.9 …
Automation of control and safety of an industrial facility.
Automation of control and safety of an industrial facility. Prerequisites A comprehensive safety system for an industrial facility (hereinafter referred to as CSSF) is defined as a complex ergotechnical system designed to protect an industrial facility (PF) from the impact of external and internal sources of security threats, as well as to prevent offenses, the …
Automation of control and safety of an industrial facility.Далее …
What is the difference between a CCD sensor and a CMOS sensor?
What is the difference between a CCD matrix and a CMOS matrix? What is the difference between a CCD matrix and a CMOS matrix? What is the difference between a CCD matrix and a CMOS matrix? By that time, it had become obvious that CCD provided better performance when shooting dynamic and small objects, so …
What is the difference between a CCD sensor and a CMOS sensor?Далее …
Security alarm sensor: overview of the working mechanism.
Security alarm sensor: an overview of the working mechanism. Security alarm sensor: an overview of the working mechanism. Security alarm sensor: an overview of the working mechanism. You can design a security alarm system without leaving your home. Today, contactless sensors that react to thermal radiation inside the alarm device are extremely common. Optical proximity …
Security alarm sensor: overview of the working mechanism.Далее …
Graphical user interface for public address and music broadcasting systems.
Graphical user interface for public address and music broadcasting systems. Graphical user interface for public address and music broadcasting systems Graphical user interface for public address and music broadcasting systems. In our time of rapid development of information technologies and structured cabling systems, more and more engineering systems of the building use network solutions for …
Graphical user interface for public address and music broadcasting systems.Далее …
Which video intercom to choose?
Which video intercom to choose?. Which video intercom to choose? Which video intercom to choose? Video intercom in a city apartment The optimal option for installing an individual video intercom in a city apartment involves the presence of space on the landing, fenced off by an additional metal door. In this case, the main call …
Concepts for selecting the number and placement of video cameras to build a digital video monitoring system at a retail facility with self-service trading.
Concepts for selecting the number and placement of video cameras to build a digital video monitoring system at a retail facility with self-service trading. Concepts for selecting the number and placement of video cameras to build a digital video monitoring system at a retail facility with a self-service trading form Concepts for selecting the number …
Methods for protecting databases from internal attackers
INSIDE – how much is in this sound… It is probably unnecessary to talk about the relevance of the problem again. It is only worth defining it more specifically in order to imagine what kind of enemy we are dealing with. We will talk about theoretical methods of protecting data from users who are authorized …
Methods for protecting databases from internal attackersДалее …
Multichannel notification transmission subsystem.
Multi-channel notification transmission subsystem. Multi-channel notification transmission subsystem Multi-channel notification transmission subsystem To understand the fundamental differences between notification transmission systems, we offer a brief historical excursion. For a long time, up until the 2000s, monitoring systems based on low-speed communication channels dominated in the world, mainly using dial-up telephone lines and radio channels, and …
Some aspects of automatic recognition of vehicle license plates.
Some aspects of automatic recognition of vehicle license plates. Some aspects of automatic recognition of vehicle license plates Some aspects of automatic recognition of vehicle license plates Currently, there are more than half a billion cars on the roads in the world. All these vehicles have a unique identification number as the main identification mark. …
Some aspects of automatic recognition of vehicle license plates.Далее …
General information about the Mirage/Siberia monitoring systems.
General information about the Mirage/Siberia monitoring systems. General information about the Mirage/Siberia monitoring systems General information about the Mirage/Siberia monitoring systems Criterion 1. Information delivery time The well-known axiom «Time is money» in security systems has a special, clearly expressed material meaning. The total response time to an alarm event consists of several components, the …
General information about the Mirage/Siberia monitoring systems.Далее …
Organization of work of the head of the marketing department for product promotion in the security systems market.
Organization of work of the head of the marketing department for product promotion in the security systems market. Organization of work of the head of the marketing department for product promotion in the security systems market. Organization of work of the head of the marketing department for product promotion in the security systems market. The …
Features and differences of two-position perimeter security systems.
Features and differences of two-position perimeter security means. Features and differences of two-position perimeter security means. Features and differences of two-position perimeter security means. An attempt to make a choice based on advertising materials leads to the conclusion that all detectors are practically the same. All have certificates of conformity. Prices for models with similar …
Features and differences of two-position perimeter security systems.Далее …
New additions to the class of radio wave detectors.
New additions to the class of radio wave detectors. New additions to the class of radio wave detectors New additions to the class of radio wave detectors Radio wave detectors (radio beam detection devices) with a volumetric detection zone in the form of an ellipsoid of rotation have always played the most important role in …
Position of the Russian National Standardization Committee TC — 234 on the draft international standard IEC 62642-2-2.
Position of the Russian National Standardization Committee TC 234 on the draft international standard IEC 62642-2-2. Position of the Russian National Standardization Committee TC 234 on the draft international standard IEC 62642-2-2. Position of the Russian National Standardization Committee TC 234 on the draft international standard IEC 62642-2-2 The prospect of Russia joining the WTO …
Practical solution to security issues through information technology.
Practical solution to security issues through information technology. Practical solution to security issues through information technology Practical solution to security issues through information technology Several years ago, the owner of a sports complex in the Moscow suburbs expressed a desire to create an unprecedented security system at this facility. A corresponding tender was announced, and …
Practical solution to security issues through information technology.Далее …
Proximity cards – the way is open.
Proximity cards – the way is open. Proximity cards – the way is open. Proximity cards – the way is open. A plastic contactless card operating using Proximity technology at frequencies of 125 and 62.5 kHz. Proximity cards are made of light-colored polycarbonate. They have compact dimensions, usually no more than 85.7x54x1.8 mm, which makes …
Working with fiber optics: not as scary as it seems.
Working with fiber optics: not as scary as it seems. Working with fiber optics: not as scary as it seems. Working with fiber optics: not as scary as it seems. Everyone has heard many times about the difficulties in the work, about the need for highly qualified specialists. Many believe that welding of fiber optics …
Reducing losses in trade.
Reducing losses in trading. Reducing losses in trading Reducing Losses in Trade One of the most effective means of attracting customers in retail is openly available goods. It has been proven that in a store with openly available goods, a person spends more than in a store where the goods are sold by a salesperson …
Technical means of perimeter protection. Options for protecting objects and territories.
Technical means of perimeter protection. Options for protecting objects and territories.. Technical means of perimeter protection. Options for protecting objects and territories. Technical means of perimeter protection. Options for protecting objects and territories. Today, there are quite a lot of different systems and methods for protecting objects and territories. In the conditions of rapid development …
Technical means of perimeter protection. Options for protecting objects and territories.Далее …
Transformer and switching power supplies.
#power supplies Transformer and pulse power supplies. Transformer power supplies A classic power supply is a transformer power supply. In general, it consists of a step-down transformer or autotransformer, whose primary winding is designed for line voltage. Then a rectifier is installed, converting alternating voltage to direct voltage (pulsating unidirectional). In most cases, the rectifier …
Hi-End class video recorders.
Hi-End class video recorders. Hi-End class video recorders Hi-End class video recorders INTRODUCTION Earlier in the articles we described the classification of recorders, dividing them into 4 classes:1. Budget, so-called Econom-class.2. Average, Medium*class, or, using computer terminology, SOHO (for small offices and home use).3. Professional, Professional — class.4. Hi-End class.A table of dividing DVRs into …
What's good for a hypermarket is death for a bookstore.
What's good for a hypermarket is death for a bookstore. What's good for a hypermarket is death for a bookstore. Anti-theft systems are divided into four main technologies: acoustomagnetic, radio frequency, electromagnetic and radio magnetic. All of them have a very wide range of applications, but in each specific case it is necessary to analyze …
What's good for a hypermarket is death for a bookstore.Далее …
Two heads are better than one.
Two heads are better than one. when security depends on eliminating unwanted alarms and detecting real threats In an ongoing effort to replicate the human brain's analytical skills in recognizing actions and patterns, developers are always looking for new ways to improve the reliability and accuracy of video systems' detection of unauthorized intrusions. One new …
Computer networks: basic concepts.
Computer networks: basic concepts. Computer networks: basic concepts Computer networks: basic concepts The security of the user's personal data starts from the basics, so it is important to have general information about how a computer network is structured. Computer networks. Basic conceptsFirst, it is necessary to define the concept of computer networks. Basic conceptswill be …
Briefly about new antivirus programs and the concept of «light antivirus».
Briefly about new antivirus programs and the concept of «light antivirus». Briefly about new antivirus programs and the concept of «light antivirus» Briefly about new antivirus programs and the concept of «light antivirus» New antivirus programsThere are quite a few companies that produce special protective software. Some of them are extremely popular and known throughout …
Briefly about new antivirus programs and the concept of «light antivirus».Далее …
Review of estimating programs.
9 estimating programs that an estimator should know about. Despite the fact that the algorithm for calculating estimates, in theory, should be universal for any user, nevertheless, manufacturers often orient their product to the standards of a specific country, since in each state there are many nuances that can make it almost impossible to bring …
Copenhagen Airport installs thermal imaging cameras
With the threat of attack or, worse, terrorist attacks, passenger safety at the airport is a top priority for airlines and airport authorities. However, it is not just passengers who need protection, but also staff and valuable equipment. FLIR Systems SR-100 thermal imaging cameras help raise the level of security at Copenhagen Airport to an …
What processor does your analog camera have?
What processor does your analog camera have?. The question is not trivial. If 10 years ago the competition between major CCTV camera manufacturers was directly related to the technologies and characteristics of CCD, today there is a rivalry between digital signal processors – DSP (Digital Signal Processor). They are designed to process digital signals in …
Open Technologies reported on the work of the St. Petersburg branch.
Open Technologies reported on the work of the St. Petersburg branch. Open Technologies has been operating in the Russian system integration market since 1994. The company's key areas of activity are solving infrastructure problems, including network integration, supply of computing equipment, data storage and processing equipment, construction of telecommunication networks, and software services. Among the …
Open Technologies reported on the work of the St. Petersburg branch.Далее …
Vulnerability scanner.
Vulnerability scanner. Vulnerability scanner Vulnerability scanner A vulnerability scanner is a software or hardware tool used to diagnose and monitor network computers. This device allows you to analyze the security of networks, computers, and applications to detect possible problems in the security system. A vulnerability scanner operates in the field of assessment and troubleshooting. A …
The USB universal host controller is an important hardware component.
USB universal host controller is an important hardware component. Today it is very important that the hardware program «standard usb host controller driver» has ready-made top-level drivers and libraries for working with them, as well as a simple interface for communicating with an external processor. What you need to know about this type of application. …
The USB universal host controller is an important hardware component.Далее …
Types of malware.
Types of malware. Windows blockers Windows blockers are malicious programs that, according to the classification, are called Trojan.Winlock. Windows blockers when the Windows system starts, display a message on top of all windows stating that access to the system is blocked, and in order for this window to disappear, you must send a paid SMS …
Software for IP systems.
Software for IP systems. In previous reviews (TZ No. 5, 6 – 2007) we considered the IP system as a software and hardware complex, in which each device performs a strictly defined task, being a significant part of a single system. Of course, the unification and interaction of these devices is carried out by the …
Intelligent system for monitoring and diagnostics of high-voltage equipment of power plants.
Intelligent system for monitoring and diagnostics of high-voltage equipment of power plants. Intelligent system for monitoring and diagnostics of high-voltage equipment of power plants. Intelligent system for monitoring and diagnostics of high-voltage equipment of power industry The MVKS system is designed for continuous monitoring of the temperature of cable lines in real time, to ensure …
Intelligent system for monitoring and diagnostics of high-voltage equipment of power plants.Далее …
How to choose the right video intercom?
How to choose the right video intercom?. How to choose the right video intercom? How to choose the right video intercom? The best option for installing an individual video intercom in a city apartment involves the presence of space on the landing, fenced off by an additional metal door. In this case, the main call …
Review of the L4 ACS controller from Legos.
Review of the L4 ACS controller by Legos. Review of the L4 ACS controller by Legos Review of the L4 ACS controller by Legos. The equipment set provided for testing by the regional representative office of «Legos» consisted of the following separately supplied: «L4» controller (support for up to 16,000 users) «PLR2EH» readers …
Intercall IP ward alarm system, Intercall IP staff call systems.
Intercall IP ward signaling, Intercall IP staff call systems. Intercall IP ward signaling, Intercall IP staff call systems Intercall IP Ward Alarm, Intercall IP Staff Call Systems The Intercall IP system is the leading medical staff call system in the UK. This system provides, in addition to the ability to exchange voice, allows the patient …
Intercall IP ward alarm system, Intercall IP staff call systems.Далее …
TREZOR.
TREZOR. Perimeter equipment under the TREZOR brand appeared on the security systems market in 2004. The TREZOR line is represented by the following equipment: TREZOR-R — radio wave detection devices, TREZOR-V — vibration detection devices, TREZOR-M — microwave detection devices, as well as installation accessories (junction boxes, cable splicing stand). Today, TREZOR detectors have found …
OPTEX.
OPTEX. OPTEX was founded in the Japanese city of Otsu in 1979 with the aim of developing and advancing sensor technologies that had previously been used exclusively in the space, military and medical industries. The company's engineers proposed a revolutionary idea for that time of using infrared technologies in everyday life and already in 1980 …
DAIWON OPTICAL Co., Ltd.
DAIWON OPTICAL Co., Ltd. Founded in 1988, the South Korean company DAIWON OPTICAL COMPANY (that was its original name) entered the market as a manufacturer of lenses for binoculars, as well as photo and video cameras. Just four years later, the company firmly occupied its niche in the market of technical security equipment, having started …
The device and diagram of the gas analyzer.
Gas analyzer design and circuit. Design and circuit of the gas analyzer Design and circuit of the gas analyzer A gas analyzer is a device that analyzes gas mixtures in the air to determine their qualitative and quantitative composition. The device helps prevent explosions of household gas. Types of gas analyzersLet's consider some types of …
Super-economical floodlight for illuminating the perimeter of objects.
Super-efficient floodlight for illuminating the perimeter of objects. Super-efficient floodlight for illuminating the perimeter of objects. Super-efficient floodlight for illuminating the perimeter of objects. The use of LEDs with a built-in lens allows you to organize the illumination of perimeter sections up to 50 meters long. At the same time, the illumination of the observed …
Super-economical floodlight for illuminating the perimeter of objects.Далее …
Telephone call recording systems.
Telephone call recording systems. Telephone call recording systems Telephone call recording systems Technologies are developing by leaps and bounds today. A couple of decades ago, computers were bulky and slow, but today they are mobile and fast. New technologies are constantly emerging that open up new possibilities for existing products and give rise to new …
New generation warning systems.
New generation warning systems. New generation warning systems New generation warning systems Sometimes life presents us with tragic events without a happy ending. We must be prepared for them. We are not able to control the elements: rain or wind, but with the help of reliable technology and timely warning, we are able to reduce …
Series of video intercoms PVD-704C.
Series of video intercoms PVD-704C. PVD-704C video intercom series Video intercom series PVD-704C Video intercom series PVD-704C: choose your memory size The company «Security Technologies», a supplier of security equipment under the Polyvision brand, announces the start of deliveries of color intercoms of the PVD-704 series. The 704th series of Polyvision intercoms includes 3 models …
RVi-R04SA — video recorder for budget solutions.
RVi-R04SA — video recorder for budget solutions. RVi-R04SA — video recorder for budget solutions RVi-R04SA — video recorder for budget solutions RVi-R04SA — video recorder for budget solutions. Most RVi video recorders are very functional devices. However, in some cases, not all capabilities are actually used, and the recording device is used only for its …
Division of the detection zone into several subzones using the example of radio wave single-position detectors ZEBRA-30 and ZEBRA-60. The article was updated in 2023.
Division of the detection zone into several subzones using the example of ZEBRA-30 and ZEBRA-60 single-position radio wave detectors Division of the detection zone into several subzones using the example of ZEBRA-30 and ZEBRA-60 single-position radio wave detectors Radio wave single-position detectors ZEBRA-30 and ZEBRA-60 have a detection zone divided into 12 subzones in the …
Anti-ram and barrier installations. Review.
Anti-ram and barrier installations. The problem of terrorism is of particular concern in our country. It is no coincidence that the Concept of National Security of the Russian Federation, in the list of factors creating «a wide range of internal and external threats to the national security of the country», names the increase in the …
Entrance video intercoms.
Entrance video intercoms. Entrance video intercoms Entrance video intercoms Entrance video intercom refers to access control systems for premises designed for use in a small office, apartment or residential building. There are several types of implementations in which entrance video intercoms are used. They can be installed at the entrance to the entrance, near the …
Single-position radio wave detector «Agat-7».
Single-position radio wave detector «Agat-7». Single-position radio wave detector «Agat-7» Single-position radio wave detector «Agat-7» Characteristics and parameters: The detector uses sawtooth frequency modulation of the transmitter carrier frequency and software signal processing at the receiver. There is gain and range adjustment, discrete threshold adjustment, relay and interface (RS-485) outputs. Unlike similar detectors operating on …
New in the class of radio wave two-position detectors.
New in the class of radio wave two-position detectors. New in the class of radio wave two-position detectors New in the class of radio wave two-position detectors Despite their great popularity and prevalence, more and more questions arise regarding their selection and conditions of use. The large range of manufactured detectors and their insufficiently clear …
New in the class of radio wave two-position detectors.Далее …
New control panel of the SP Spectra series — SP4000.
New control panel of the SP Spectra series — SP4000. New control panel of the SP Spectra series — SP4000 New control panel of the SP Spectra series — SP4000 Dear users! We are pleased to announce the release of a new SP Spectra series control panel — SP4000. Features: * StayD mode * 4-wire …
Murena-2 for those who value Godograph.
Murena-2 for those who value Godograph. Murena-2 for those who value Godograph. «Murena-2» for those who value Godograph. The new generation of vibration detectors of the MURENA-2 series has a completely modernized algorithm for analyzing signals from a vibration cable sensor, a special triboelectric cable developed by YUMIRS. Such a cable is often called a …
What should be the care of the battery?
How to care for a battery. As has been proven more than once, a battery is the most economical and convenient device among all power supplies. Although its life is not infinite. When a battery is charged and discharged, it goes through a certain cycle. With each charge/discharge cycle, the battery capacity decreases. The number …
K-engineering increases the level of Service.
K-engineering improves the level of Service. K-engineering improves the level of Service K-engineering improves the level of Service RELIABLE, stable, constant, instilling confidence… What do these words tell us? What do we expect from a company or product that uses them to describe its activities. Undoubtedly — success. After all, where there is success, there …
GSM alarm in one sensor.
GSM alarm in one EPIR sensor Information security system via mobile phone. If someone enters the premises, the EPIR GSM alarm automatically informs the owner by SMS message and call. The security system consists of a motion sensor and a GSM module, all elements are built into one case. EPIR can also be used in …
Two-way security system for commercial vehicles SCHER-KHAN TAIGA.
Two-way security system for commercial vehicles SCHER-KHAN TAIGA. Two-way security system for commercial vehicles SCHER-KHAN TAIGA Two-way security system for commercial vehicles SCHER-KHAN TAIGA Several thousand cases of theft and hijacking of commercial vehicles are registered in Russia every year, and the total damage from these criminal acts amounts to tens of millions of dollars. …
Two-way security system for commercial vehicles SCHER-KHAN TAIGA.Далее …
Oubau door closers.
Oubau door closers. Oubau door closers Oubau door closers About OUBAO OUBAO is one of the largest manufacturers of door closers in the world. OUBAO has American UL, UL10C, ETL, ITS certificates and European TUV, CE, SP and EN1154 certificates. OBAO door closers are manufactured using modern manufacturing and assembly technologies, which ensures their high …
Biometrics in the service of security.
Biometrics in the service of security. Biometrics in the service of security Biometrics in the service of security Various biometric security systems can be compared with each other using several characteristics listed below. Biometrics (some calculations for security systems) Biometrics– is the registration of individual parameters of the human body. Special biometric systems must read …
Pelco: equipment for industrial facilities.
#Pelco Pelco: equipment for industrial facilities. It is known that the term CCTV covers not only security systems, but also technological television surveillance, as well as remote object monitoring systems. Despite the general principles of creating these systems, there are characteristic differences regarding the requirements for operational characteristics and the design of system elements. Indeed, …
New equipment — new opportunities from Tedd Electronics.
New equipment — new opportunities from Tedd Electronics. The range of equipment manufactured under the Tedd Electronics brand is expanding. The Formula Bezopasnosti company presents new budget video recorders with an optimal price/quality ratio for this equipment. All equipment has been tested and meets the declared parameters. In addition to DVR, the range includes small-sized …
New equipment — new opportunities from Tedd Electronics.Далее …
PELCO digital recording systems. Article updated in 2023.
PELCO digital recording systems The main event of 2007 for PELCO was the company's entry into the financial and industrial group Schneider Electric and the actual unification of its engineering, production and marketing potential with TAC, a well-known supplier of solutions for engineering support of buildings. The main goal of this step for PELCO was …
PELCO digital recording systems. Article updated in 2023.Далее …
Basler IP cameras: criteria of German quality.
Basler IP cameras: criteria for German quality. What do you expect from your surveillance system? Is it supposed to record images 24/7 to reliably protect your property? You may even think that this goes without saying. But often, poor quality surveillance cameras lead to their breakdowns and, as a result, expensive repairs. This should not …
Foreign arched metal detectors. Informed choice.
#metal detectors Foreign arched metal detectors — a conscious choice. Sinelytsykov Georgy Alexandrovich Metal detectors for searching weapons during personal inspections have become an integral part of most security systems. When building such a system, the consumer faces the task of choosing from 30 models and modifications of domestic and foreign metal detectors currently available …
Technical characteristics of some domestic rapidly deployable detection equipment.
Table 1. Technical characteristics of some domestic rapidly deployable detection tools Name, manufacturer- supplier Features of the detection tool (DS) Detection zone, m Power parameters and operating temperature range, oC Approximate cost with VAT, $ VITIM GUP SNPO ELERON” Moscow Radar system for guarding temporary-based facilities with a perimeter length of up to 1 km …
Technical characteristics of some domestic rapidly deployable detection equipment.Далее …
PANORAMIC MEASURING RECEIVER ARK-D1TR..
PANORAMIC MEASURING RECEIVER ARK-D1TR.. PANORAMIC MEASURING RECEIVER ARK-D1TR. SERGEEV Viktor Borisovich, SERGIENKO Alexander Rostislavovich, PEREVERZEV Sergey Borisovich. PANORAMIC MEASURING RECEIVER ARC-D1TR This article discusses the panoramic measuring receiver ARK-D1TR, the features of its use in stationary and mobile multifunctional measuring complexes and methods for calibrating the hardware and software part of the radio receiver and …
Portable Spectral Video Comparator VSC-4C..
Portable spectral video comparator VSC-4C.. Portable spectral video comparator VSC-4C. Vadim Antoninovich Shelkov PORTABLE SPECTRAL VIDEO COMPARATOR VSC-4c FOR FORENSIC EXAMINATION OF DOCUMENTS Determining the authenticity and integrity of various documents has always made up a significant share of the total volume of forensic investigations. Such work is usually carried out on special installations — …
Portable device for checking documents “Korund-MTV”.
Portable device for checking documents «Korund-MTV».. Portable device for checking documents «Korund-MTV». KOVALEV Aleksey Alekseevich POLYAKOV Yury Alekseevich SINELNIKOVA Elena Nikolaevna STUDITSKY Aleksandr Sergeevich KHNYKOV Yury Alekseevich PORTABLE DEVICE FOR CHECKING DOCUMENTS “KORUND-MTV” The portable device “Korund-MTV” is designed for visual inspection of documents in non-stationary conditions. The device implements a combination of inspection …
Portable system for radio monitoring and determination of the location of radio emission sources.
Portable system for radio monitoring and determining the location of radio emission sources.. Portable system for radio monitoring and determining the location of radio emission sources. ASHIKHMIN Aleksandr Vladimirovich, Candidate of Technical Sciences KOZMIN Vladimir Alekseevich, Candidate of Technical Sciences, Associate Professor REMBOVSKY Yuri Anatolyevich, Candidate of Physical and Mathematical Sciences Portable system for radio …
Exclusive models of LCD TVs from Pioneer..
Exclusive models of liquid crystal televisions from Pioneer.. Exclusive models of liquid crystal televisions from Pioneer. Exclusive models of LCD TVs from Pioneer. Pioneer has launched the production of a limited series of KURO plasma TVs — KRP-500ABG and KRP-500AW. Designers have offered two color solutions especially for these models — classic white and delicate …
ISUTS: international cooperation.
MSUC: international cooperation. We have already told our readers (No. 6-2010) about the Federal State Institution «Intersectoral Special Training Center» (FSI MSUC). Of course, this first material gave only a general idea of the multifaceted activities of the MSUC. Therefore, we agreed with the management of the Center that we would definitely return to this …
Search for hidden danger.
Search for hidden danger. Camille Shieh's article analyzes the problem of detecting chemical, biological, radiological and nuclear substances. The use of weapons of mass destruction, the author notes, can lead to numerous losses, so there is a high need for the use of advanced technical detection equipment. To prevent such a threat, it is necessary …
Certified by the International Standards Centre.
Certified in MSUC. Certification of equipment from leading manufacturers in the OIT system (equipment, products and technologies for nuclear installations, radiation sources and storage facilities) is becoming a noticeable trend in the TSB market. For example, this year the German company GEUTEBRÜCK became the holder of such a certificate. Moreover, colleagues from Germany certified almost …
Journal TZ — Methodology for assessing the state of engineering and technical security of objects.
Journal TZ — Methodology for assessing the state of engineering and technical security of objects. Author: Alexander MALTSEV, Technical Director of Intel Tectum, PhD in Engineering When planning capital expenditures on equipping facilities with engineering and technical security equipment, there is always the task of rational spending of material resources. To determine the need to …
A supplier without technical support is a waste of money.
A supplier without technical support is a waste of money.. Supply of security systems is a kind of art, requiring active maneuvering among competitive offers and hard work to create and maintain your own reputation, trust of manufacturers and development of clients. Although we will not dissemble — the same picture is in other areas …
A supplier without technical support is a waste of money.Далее …
Mines, quarries and associated facilities.
Mines, pits and related facilities. My experience with mines is rather negative. It is very difficult to meet mine explosion safety requirements, so I have never been able to place security equipment directly at depth — the cost of the solution was always higher than the customer's desire to observe something at depth. Even at …
Subtleties of using a long-range identification system.
Subtleties of using a long-range identification system. We have recently covered some applications of long-range identification systems at sites, in particular for monitoring parking lots, access to premises and entry to parking lots. Today we will look at some more aspects of long-range identification applications using PR-G07 readers, manufactured under the Parsec brand. Standard Problems… …
Subtleties of using a long-range identification system.Далее …
The other side of Microsoft Project.
The Other Side of Microsoft Project. More and more often, managers of large companies are faced with the issue of effective project management. Its solution requires modern management approaches. One of the popular products is Microsoft Project. It is designed for rational and effective management of projects, plans, resources and finances. But no matter how …
Strengths of combining BACnet and KNX.
Strengths of combining BACnet and KNX. Strengths of combining BACnet and KNX Strengths of combining BACnet and KNX Richard Staub (Richard Staub),BUS-House Recently, we have increasingly seen the process of combining various protocols in the implementation of projects. One such example of cooperation is the St. Olavs University Hospital under construction at the University of …
B2b according to Kotler, or Biometric system for Kamenskaya.
b2b according to Kotler, or a Biometric System for Kamenskaya. Float like a butterfly and sting like a bee Mohammed Ali Advertising for washing powder, yoghurts, sanitary pads and beer (despite all the obstacles and restrictions on the advertising activity of manufacturers of one of the most popular drinks) has occupied wide and other screens …
B2b according to Kotler, or Biometric system for Kamenskaya.Далее …
Marketing communications of the security market in figures. Part 2.
Marketing communications of the security market in figures. Part 2. The first part, “Marketing communications of the security market in figures” (TZ No. 4-2009), presented data characterizing advertising in the technical security equipment market as a whole. This is the volume of advertising for 2008, the distribution of investments between communication means, such as special …
Marketing communications of the security market in figures. Part 2.Далее …
Security systems sales managers: myths and reality of modern requirements.
Sales managers of security systems: myths and reality of modern requirements. Regardless of whether your company's sales managers are focused on actively searching for clients or on working with «incoming requests» and an existing client base, carefully and painstakingly nurtured by an active marketing strategy and marketers, they interact with potential or existing clients every …
Security systems sales managers: myths and reality of modern requirements.Далее …
Journal TZ — Methodology for assessing the qualifications of security service personnel.
Journal TZ — Methodology for assessing the qualifications of security personnel. Author: Alexander MALTSEV, Technical Director of Intel Tectum, PhD in Engineering The tasks of assessing the qualification level of security personnel (divisions), including specialists in engineering and technical security means (ITSM), arise when forming plans for training and retraining employees, conducting employee certification, and …
Journal TZ — Methodology for assessing the qualifications of security service personnel.Далее …
Sales and Marketing: Who is to Blame and What to Do?
Sales and Marketing: Who's to Blame and What to Do?. The sacramental questions for Russians that I risked putting in the title are relevant in many life situations that, in fact, make up our existence. But let's get down to specifics, namely, to the problems that sometimes slow down the work of market mechanisms in …
Visibility of vehicle license plates.
Visibility of license plates. When designing security television systems, the task of estimating the maximum size of the horizontal field of view at which manual or automatic recognition of a license plate is still possible often arises. The probability of correct recognition of a car license plate depends on many factors that have an impact …
Tattoo-ID: comparison of tattoos for personal identification.
Tattoo-ID: comparing tattoos for personal identification. A researcher from Michigan State University has developed an automatic image search and identification system that allows law enforcement agencies to compare scars, birthmarks, and tattoos to identify suspects and victims of crimes.“Traditionally, people identify themselves using passports, licenses, or personal identification numbers, but there are concerns about the …
Tattoo-ID: comparison of tattoos for personal identification.Далее …
Consulting in the TSB market. Article updated in 2023.
Consulting in the TSB market Two opinions on the current problem of the technical security equipment market We'll see Alexander Zhukov — expert In the classical sense, consulting means professional consulting in a particular area. Of course, each market segment has its own specific features of this activity. In our case, i.e. in the market …
Consulting in the TSB market. Article updated in 2023.Далее …
I don't see any prospects yet.
I don't see any prospects yet. I'll make a reservation right away: I'm one of those (I don't know how many of my colleagues from the EU countries have also gone down this path) who tried to study the issue of importing Russian TSB to the EU countries. Some developments attracted my attention, I negotiated …
Study, study and study…
Study, study and study…. An analysis of the existing European market of technical security equipment shows that there is no problem with exporting Russian-made products as such. Because the volume of these exports is extremely small. Attempts by individual Russian companies, including ours, to sell something abroad change the overall picture very little. No one …
Are there any errors when carrying out activities aimed at monitoring security activities?
Are there any errors in carrying out activities aimed at monitoring security activities? Are there any errors in carrying out activities aimed at monitoring security activities? Are there any errors in carrying out activities aimed at monitoring security activities? Security activity control The Internal Affairs Directorate is empowered to carry out control activities. However, as …
Are there any errors when carrying out activities aimed at monitoring security activities?Далее …
What is the staffing structure of the Ministry of Internal Affairs in Russia?
What is the staffing structure of the Ministry of Internal Affairs in Russia? Let's consider the changes that have occurred in the structure of the internal affairs bodies of the Russian Federation using the example of the structural framework of this government agency. Since changes have occurred not only in the sphere of practical activity, …
What is the staffing structure of the Ministry of Internal Affairs in Russia?Далее …
Competitive Intelligence in Business. «Whites Start and Win!»
Competitive intelligence in business. «Whites start and win!» Competitive intelligence in business. «Whites start and win!» Competitive intelligence in business. «Whites start and win!» For business, information possession is one of the key factors of its success. Prompt information can have a dramatic impact on management and strategic decision-making. Intelligence is as old as the …
Competitive Intelligence in Business. «Whites Start and Win!»Далее …
On the issue of motivation of security service employees of hypermarkets.
On the issue of motivating employees of the security service of hypermarkets. On the issue of motivating employees of the security service of hypermarkets On the issue of motivating employees of the security service of hypermarkets. In this article, I would like to touch upon the issue of motivating employees of the security service …
On the issue of motivation of security service employees of hypermarkets.Далее …
Store security is a delicate matter.
Store security is a delicate matter. Store security is a delicate matter Store security is a delicate matter Store security is a delicate matter. Citizens, when you go to the store, take your compulsory medical insurance policy with you. Recently in St. Petersburg, 3 (three!) security guards beat up a customer — an elderly man …
Planning the work of the security service department of a trading enterprise.
Planning the work of the security service unit of a trading enterprise. Planning the work of the security service unit of a trading enterprise Planning the work of the security service unit of a trading enterprise. The organization of work of any structural division of a trading enterprise, to ensure maximum efficiency of its functioning, …
Planning the work of the security service department of a trading enterprise.Далее …
Security guard rights.
What is allowed for a private security company employee. Dear readers, please note that private detective and security activities are regulated by the law «On private detective and security activities in the Russian Federation» and the order of the Ministry of Internal Affairs of Russia «On approval of the instructions on the organization of work …
Psychological preparation.
Psychological preparation. Psychological preparation. Psychological preparation. Nothing can be taught — everything can be learned. At the end of last year, it was considered good form in the media to badmouth Gennady Malakhov. But it's not that he was suggesting stupid things — the fact is that such a lifestyle, means and methods of treatment, …
Psychology of influence on people.
Psychology of influencing people. Psychology of influencing people Psychology of influencing people From early childhood, we are all exposed to stereotypes (psychological principles), and they haunt us throughout our lives. Each such principle can be discovered and used as a tool for automatic influence on people. Here are described the principles of psychological influence on …
Remote security: features of choice
#Remote control security If you decide to engage in remote control security, the most important issue will be the choice of equipment. It is no secret that mistakes made when choosing a security system can be revealed in a few years. It will be very difficult, and often impossible, to correct them. First of all, …
Commercial transport control system in the Russian Federation.
Commercial transport control system in the Russian Federation. Commercial transport control system in the Russian Federation Commercial transport control system in the Russian Federation It is recognized that the main cause of such accidents is the human factor, associated with violations of traffic rules and the work and rest regime of drivers. As a means …
Commercial transport control system in the Russian Federation.Далее …
Biometric locks — a new generation of security guard.
Biometric locks — a new generation security guard. Biometric locks — a new generation security guard Biometric locks — new generation security guard Biometric locksBiometric locks– these are new generation access control systems. The process of opening and closing the lock is carried out by placing a finger on the optical sensor, then the sensor …
Biometric locks — a new generation of security guard.Далее …
What a burglar-proof door should be like.
What a burglar-proof door should be like. What a burglar-proof door should be like. What a burglar-proof door should be like. Burglar-proof doorsOne of the most important characteristics is burglar-proof doors, that is, the ability of the entrance door to resist burglary and penetration. Based on the results of experimental testing and the necessary tests, …
How to bypass security alarms?
How to bypass security alarms?. How to bypass security alarms? How to bypass security alarms? However, experienced professionals know several loopholes that allow you to fool even the most advanced system. As always happens in nature, for every clever protection there is a method that allows you to bypass it. There are many such methods, …
Coordinate, digital and wireless intercoms and their features.
Coordinate, digital and wireless intercoms and their features. Coordinate, digital and wireless intercoms and their features Coordinate, digital and wireless intercoms and their features Coordinate intercoms Coordinate intercomsare the most common type of access control system equipment. The operation of such intercoms is based on the principle of switching coordinate-matrix systems. When installed, coordinate intercoms …
Coordinate, digital and wireless intercoms and their features.Далее …
Repellent lighting.
Repellent lighting. Repellent lighting Deterrent lighting Lighting devices are an effective addition to mechanical protection. Their use has a deterrent effect on burglars. Nothing makes a burglar feel more insecure than the danger of being seen at work. Lighting devices, correctly positioned in the area adjacent to the house and especially in «critical places», in …
The concept of theft in domestic forensics.
The concept of theft in domestic forensics. Forensics — definition: The very definition of forensicsas a science is based on several main points: development of a system of special techniques, methods and means of collecting, examining and evaluating forensic evidence; their application in criminal proceedings for the prevention, detection and investigation of crimes; their use …
A safe door is an excellent option for an entrance door for a city apartment.
A safe door is a great option for an entrance door to a city apartment. A safe door is a great option for an entrance door to a city apartment. A safe door is a great option for an entrance door for a city apartment. The door frame can be made of a U-shaped steel …
A safe door is an excellent option for an entrance door for a city apartment.Далее …
Safe Cracking: From Origins to Modern Times.
Safecracking: from the origins to the present.. Safecracking: from the origins to the present. Safecracking: from the origins to the present. As soon as the concept of private property appeared, how did man begin to protect this property. This is how the first safes appeared, although in ancient times, of course, locking systems were much …
Locks for safes.
Safe locks. Safe locks Safe locks The burglar resistance of a safe is ensured by four types of locks known today. Safe locks are key, mechanical combination locks of different configurations, electronic locks and biometric locks. Let's start with key locks: cylinder-type key locks can be pin and frame. Safe locks key locks for opening …
European standard for protective fog comes into force.
European standard for protective fog comes into effect. European standard for protective fog comes into effect. European standard for protective fog comes into effect. The thief is only two steps away from the treasured box, when suddenly… The room instantly fills with thick smoke, everything disappears in it, including the goal that seemed so close. …
European standard for protective fog comes into force.Далее …
What is included in the concept of crime prevention?
What is included in the concept of crime prevention. What is included in the concept of crime prevention. What is included in the concept of crime prevention. The concept of crime preventionBased on the data of social analysis, the legal system of a developed state was introduced concept of crime preventionas the most rational way …
A brief overview of numbered sealing products-access control indicators.
Brief overview of numbered sealing products-access control indicators. Brief overview of numbered sealing products-access control indicators. Brief overview of numbered sealing products-access control indicators. Most likely, everyone in their life and work faced problems of theft, pilferage, «mistakes» of employees, problems with customers and suppliers related to the «loss» of goods from closed containers, packaging …
A brief overview of numbered sealing products-access control indicators.Далее …
Qualification of theft in the Criminal Code of the Russian Federation.
Theft qualification in the Criminal Code of the Russian Federation. Theft qualification in the Criminal Code of the Russian Federation Theft qualification in the Criminal Code of the Russian Federation Clause 1 of Article 158 of the Criminal Code of the Russian Federation provides the following definition of the concept of «theft» — secret theft …
Qualification of theft in the Criminal Code of the Russian Federation.Далее …
Several examples of the use of indicator seals to prevent theft.
Several examples of using indicator seals to prevent theft. Several examples of using indicator seals to prevent theft. Several examples of using indicator seals to prevent theft. Huge amounts to be written off for «Shrinkage» and «Depreciation» of goods and products — as a result of problems with theft from warehouses and during transportation? World …
Several examples of the use of indicator seals to prevent theft.Далее …
New federal law on security of the Russian Federation.
New federal law On security of the Russian Federation. New federal law On security of the Russian Federation. New federal law «On security» of the Russian Federation. Previous The Federal Law on Security of the Russian Federation was adopted on March 5, 1992, and some of its provisions no longer meet the requirements of modern …
New federal law on security of the Russian Federation.Далее …
Russian legislation on countering terrorism.
Russian legislation on counteracting terrorism. Russian legislation on counteracting terrorism Russian legislation on counteracting terrorism Law on Combating Terrorismdefines terrorism as the commission of an explosion, arson or other actions that create a danger of loss of life, significant property damage or the occurrence of other socially dangerous consequences, if these actions are committed with …
Aspects of design and implementation of access control and management systems (ACS).
Aspects of design and implementation of access control and management systems ACS. At present, access control and management systems (ACS) are an integral part of the comprehensive security system of enterprises and organizations. The access subject (employee, visitor) must present some access identifier when accessing the facility (protected area, premises) for identification. The ACS, based …
Aspects of design and implementation of access control and management systems (ACS).Далее …
Housing Code and personal data. Expert commentary.
Housing Code and personal data. Expert commentary. Housing Code and personal data. Expert commentary Housing Code and personal data. Expert commentary Part 2 of Article 6 of Federal Law No. 152 has been amended and supplemented with a new clause with the following content: «5.1) the processing of personal data is necessary for management organizations, …
How to avoid becoming a victim: signs of mobile phone wiretapping.
How not to become a victim: signs of mobile phone wiretapping. How not to become a victim: signs of mobile phone wiretapping. How not to become a victim: signs of mobile phone wiretapping. Mobile phone wiretapping. Protection of information rights assumes that wiretapping a mobile phone without the owner’s permission is illegal. There are several …
How to avoid becoming a victim: signs of mobile phone wiretapping.Далее …
How is it done and how to prevent network password hacking.
How to hack a network password and how to prevent it. How to hack a network password and how to prevent it. How to hack a network password and how to prevent it. The content of the article, taking into account the law on the protection of information rights, in no way encourages the reader …
How is it done and how to prevent network password hacking.Далее …
Computer attacks: some types and methods of combating them.
Computer attacks: some types and methods of struggle. Computer attacks: some types and methods of struggle Computer attacks: some types and methods of struggle Computer attacksToday, there are so many dangers that lie in wait for the user on the network that it is difficult to classify them all, however, we will try to do …
Computer attacks: some types and methods of combating them.Далее …
Information security model.
Information security model. Information security model Information security model In order to protect users from unauthorized intrusion and theft of information resources and confidential data, specialists have developed an information security model. The basis of the model is based on the fact that a modern information system is a complex multi-level mechanism, which consists of …
Fundamentals and principles of copyright today.
Fundamentals and principles of copyright today. Fundamentals and principles of copyright today Fundamentals and principles of copyright today Principles of copyrightTo define the concept, let us turn to the interpretation of the principles of copyrightin modern regulatory documents. Thus, copyright is usually understood as a set of norms of civil and other branches of law …
The rules change during the game.
The rules change during the game. The rules change during the game The rules change during the game The law, in particular, provides that regulatory legal acts on certain issues of personal data processing can be adopted not only by state bodies, as is currently established, but also by local governments, as well as the …
A unique method of depersonalizing personal data.
A unique method of depersonalizing personal data. A unique method of depersonalizing personal data. A unique method of depersonalizing personal data. According to the definition given in the Federal Law «On Personal Data» dated 26.07.2006 No. 152, depersonalization is a method of processing PD, as a result of which it is impossible to identify the …
Recover information from a flash drive yourself.
Recover information from a flash drive yourself. Recover information from a flash drive yourself Recover information from a flash drive yourself It's no secret that today a flash card is the most convenient and reliable storage medium that almost everyone uses. However, the problem of data protection may arise here too. Recover files from a …
Protection of information rights. Regulatory aspect.
Protection of information rights. Regulatory aspect. Protection of information rights. Regulatory aspect Protection of information rights. Regulatory aspect The main modern source of information is the Internet. Information resources of the World Wide Web include information in the form of electronic documents of various types — text, audio and video materials, graphic objects, databases, programs, …
PROTECTION FROM UNAUTHORIZED ACCESS. PASSWORD SYSTEM.
PROTECTION AGAINST UNAUTHORIZED ACCESS. PASSWORD SYSTEM. PROTECTION AGAINST UNAUTHORIZED ACCESS. PASSWORD SYSTEM MASYUK Mikhail Igorevich PROTECTION AGAINST UNAUTHORIZED ACCESS. PASSWORD SYSTEM The password system as an integral part of the access control subsystem of the information security system (ISS) is part of the “front line of defense” of the entire security system. Therefore, the password …
PROTECTION FROM UNAUTHORIZED ACCESS. PASSWORD SYSTEM.Далее …
Information protection devices for VHF radio communications. Scramblers.
#Scramblers, #scrambler, #ultrasound Information security devices for VHF radio communications. Ovchinnikov A.M., Lazin A.S. Source: Special Equipment» magazine The article discusses information security devices — scramblers, which can be used in VHF radio communications. Possible principles of their implementation and main parameters are described. Specific models of scramblers are considered and their technical characteristics are …
Information protection devices for VHF radio communications. Scramblers.Далее …
Removal of traces of other phono-objects from a speech signal by decomposing them into microwave elements.
Removing traces of other phono-objects from a speech signal by decomposing them into microwave elements.. Removing traces of other phono-objects from a speech signal by decomposing them into microwave elements. Zhenilo Valery Romanovich, Doctor of Technical Sciences REMOVING TRACES OF OTHER PHONOOBJECTS FROM A SPEECH SIGNAL BY DECOMPOSING THEM INTO MICROWAVE ELEMENTS Source: «Special Technology» …
Technical support for conducting examination of the authenticity of documents as one of the aspects of economic security. Article updated in 2023.
Technical support for conducting an examination of the authenticity of documents as one of the aspects of economic security. Trukhachev Valery Vladimirovich TECHNICAL SUPPORT FOR CONDUCTING AN EXAMINATION OF THE AUTHENTICITY OF DOCUMENTS AS ONE OF THE ASPECTS OF ECONOMIC SECURITY With the development of economic relations in society and the increase in the technical …
Evaluation of the effectiveness of means of destroying information stored in hard disk drives.
Evaluation of the effectiveness of means of destroying information stored in hard disk drives. Evaluation of the effectiveness of means of destroying information stored in hard disk drives Boborykin Sergey Nikolaevich Ryzhikov Sergey Sergeevich, Candidate of Technical Sciences ASSESSMENT OF THE EFFICIENCY OF MEANS OF DESTRUCTION OF INFORMATION STORED IN HARD MAGNETIC DISK DRIVES Source: …
CURRENT STATE AND TACTICAL POSSIBILITIES OF USING ELECTROMAGNETIC RADIATION INDICATORS.
CURRENT STATE AND TACTICAL CAPABILITIES OF USING ELECTROMAGNETIC RADIATION INDICATORS.. CURRENT STATE AND TACTICAL CAPABILITIES OF USING ELECTROMAGNETIC RADIATION INDICATORS. LOBASHEV Aleksey Konstantinovich, Candidate of Technical Sciences, Associate Professor, LOSEV Lev Sergeevich CURRENT STATE AND TACTICAL POSSIBILITIES OF USING ELECTROMAGNETIC RADIATION INDICATORS Devices designed to detect equipment for unauthorized transmission of information outside the controlled …
CURRENT STATE AND TACTICAL POSSIBILITIES OF USING ELECTROMAGNETIC RADIATION INDICATORS.Далее …
Problems of optimization of the process of instrumental control of information processing equipment.
Problems of optimizing the process of instrumental control of information processing equipment. Problems of optimizing the process of instrumental control of information processing equipment Goryachev Sergey Vyacheslavovich PROBLEMS OF OPTIMIZING THE PROCESS OF INSTRUMENTAL CONTROL OF INFORMATION PROCESSING EQUIPMENT Source: journal «Special Equipment» When determining the possibility of using certain technical means to process information …
Problems of detection and identification of radio signals of covert information control means.
Problems of detection and identification of radio signals of covert information control means. Problems of detection and identification of radio signals of covert information control means Part 1. Basic requirements for radio signal detection systems Kargashin Viktor Leonidovich Candidate of Technical Sciences Special equipment, No. 3, 2000 Radio frequency signal detection and identification systems are …
Problems of active protection of vibroacoustic channels.
Problems of active protection of vibroacoustic channels. Kargashin Viktor Leonidovich, Candidate of Technical Sciences PROBLEMS OF ACTIVE PROTECTION OF VIBRAO-ACOUSTIC CHANNELS Source: magazine «Special Equipment» In recent years, the development of devices for creating vibration and acoustic interference, designed to ensure the protection of speech information from its leakage from premises through building structures and …
Problems of active protection of vibroacoustic channels.Далее …
ENSURING THE PROTECTION OF INFORMATION FROM UNINTENDED INFLUENCE BY TECHNICAL MEANS.
ENSURING THE PROTECTION OF INFORMATION FROM UNINTENDED INFLUENCE BY TECHNICAL MEANS. PROTECTING INFORMATION FROM UNINTENDED INFLUENCE BY TECHNICAL MEANS Vakhlakov Valery Rudolfovich PROTECTING INFORMATION FROM UNINTENDED INFLUENCE BY TECHNICAL MEANS In modern conditions, possession of information in various forms of its manifestation is an important advantage. It is for this reason that the problem of …
ENSURING THE PROTECTION OF INFORMATION FROM UNINTENDED INFLUENCE BY TECHNICAL MEANS.Далее …
NSD: THEORY AND PRACTICE. UNAUTHORIZED ACCESS.
#unauthorized access, #NSD NSD: THEORY AND PRACTICE. MASYUK Mikhail Igorevich Terminology When setting the task of information security, it is necessary to take into account the implementation of a whole range of measures. The components of this complex are protection against unauthorized access (UAA), against leakage via technical channels, against possibly introduced special electronic …
New solution for protecting confidential negotiations.
New solution for protecting confidential negotiations. Valery Ivanovich Zolotarev, PhD in Engineering NEW SOLUTION FOR PROTECTING CONFIDENTIAL NEGOTIATIONS In the information age, the well-known principle applies: whoever owns the information, owns the world. There are more than enough people who want to take over the world in this way, which means there is a …
New solution for protecting confidential negotiations.Далее …
New technology for protecting telephone conversations.
New technology for protecting telephone conversations. New technology for protecting telephone conversations. Doctor of Engineering Sciences, Professor E. I. Abalmazov The need to improve the means of physical protection of telephone conversations from interception follows, as the author claims, from the analysis of modern “telephone” threats and existing countermeasures. In this regard, the capabilities of …
New technology for protecting telephone conversations.Далее …
Methods and means of protecting telephone lines.
Methods and means of protecting telephone lines.. Methods and means of protecting telephone lines. Anatoly Anatolyevich Khorev, Doctor of Technical Sciences METHODS AND MEANS OF PROTECTION OF TELEPHONE LINES When organizing the protection of telephone lines, it is necessary to take into account several aspects: telephones (even when the receiver is hung up) can …
Masking of speech messages based on modern computer technologies.
Masking of speech messages based on modern computer technologies.. Masking of speech messages based on modern computer technologies. Dvoryankin Sergey Vladimirovich, Doctor of Technical Sciences Klochkova Ekaterina Nikolaevna Kaluzhin Roman Vladimirovich MASKING SPEECH MESSAGES BASED ON MODERN COMPUTER TECHNOLOGIES Source: magazine «Special Equipment» In recent years, the protection of confidential voice messages has received increasing …
Masking of speech messages based on modern computer technologies.Далее …
Cryptographic protection of telephone messages.
Cryptographic protection of telephone messages. Igor Vasilievich Sudarev, Doctor of Technical Sciences CRYPTOGRAPHIC PROTECTION OF TELEPHONE MESSAGES Source: «Special Equipment» magazine No. 2, 1998. This article summarizes the methods of cryptographic protection of telephone messages published in the open press and widely used in domestic and foreign practice. In modern conditions, information plays a decisive …
Car GPS tracker to protect your vehicle.
Car GPS tracker on guard of your transport. Car GPS tracker is a modern reliable equipment that is used for car monitoring. Such systems, by the way, are characterized by ease of use. The car GPS tracker is installed on the car, using the gprs GPS communication channel, which makes it possible to receive a …
Car recorder PVDR-0163.
Car DVR PVDR- 0163. The company «Security Technologies» presents a new product of the Polyvision brand — a single-channel car DVR PVDR-0163 auto (Korea). The device acts as a «black box» in the car — it records everything that happens on video, links the video to the time of shooting, location on the map, speed …
Interview with the General Director of Armor Group, O.N. Gusarovsky.
Interview with the General Director of «Armor Group» Gusarovsky O.N. Interview with the General Director of «Armor Group» Gusarovsky O.N. Interview with the General Director of «Armor Group» Gusarovsky O.N. — Oleg Nikolaevich, you head one of the largest armored vehicle manufacturing companies in Russia – Armor Group. Please tell us about the specifics of …
Interview with the General Director of Armor Group, O.N. Gusarovsky.Далее …
Car security systems yesterday and today.
Car safety systems yesterday and today. Car safety systems yesterday and today Car safety systems yesterday and today Car safety systemsIt is impossible to give a 100% guarantee that there will be no danger when using a car under any circumstances. However, car security systems are created to minimize risks. The concept is quite broad …
Immobilizer device.
Immobilizer device. Immobilizer device Immobilizer device It is no secret that not everyone will dare to leave their car unattended for a long time today. More precisely, almost all car owners have to do this, because such is the rhythm of life. But the anxiety does not go away: such a number of thefts committed …
Modern technologies for transport control and enterprise fleet management.
Modern technologies for transport control and enterprise fleet management. Modern technologies for transport control and enterprise fleet management. Modern technologies for transport control and enterprise fleet management GPS/GLONASS transport monitoring. Any organization with its own vehicle fleet has problems with “left” trips, fuel theft, unauthorized downtime, and the use of equipment for personal purposes. All …
Modern technologies for transport control and enterprise fleet management.Далее …
What is good about a satellite security system?
What is good about a satellite security system. What is good about a satellite security system. What is good about a satellite security system. Satellite security systemWhen talking about an integrated approach to security today, a number of requirements are put forward: relative ease of installation and use, durability, reliability, wide functionality. It is safe …
Every year various new GPS products appear.
Various new GPS products appear every year. Various new GPS products appear every year Various new GPS products appear every year GPS navigator typesVarious GPS navigator types are distinguished based on the set of functions inherent in each of them individually. These are devices for installation on cars and portable models for various types of …
ERA GLONASS against road accidents.
ERA GLONASS versus road accidents. ERA GLONASS versus road accidents ERA GLONASS versus road accidents In recent years, the GLONASS navigation system has been distributed at the regional level, — GLONASS social projects are being implemented, digital maps of the area are being created. ERA GLONASS The main projects that are being implemented in the …
History of GLONASS in Russia.
The history of GLONASS in Russia. The Russian global satellite positioning system, which is an analogue of the American GPS system — one of the global positioning systems. The global navigation system is designed to provide the ability to determine the coordinates of moving and stationary objects on the Earth's surface. Where did the GLONASS …
Basics of the functioning of the GPS navigation system.
Basics of the GPS navigation system. Basics of the GPS navigation system. Basics of the GPS navigation system. The abbreviation GPS stands for Global Positioning System. GPS navigation systemsare based on the technology of receiving signals from satellites. In this case, the distance between the satellite at the time of emission and the object receiving …
Basics of the functioning of the GPS navigation system.Далее …
Transmission of radio signal.
Radio signal transmission. Radio signal transmission Radio signal transmission Radio signals, which are the basis, in particular, of satellite communications and other types of communications, are electromagnetic waves. The communication system uses various types of radio signals to transmit information through the air from one point to another. Radio signal transmissionThe radio signal is transmitted …
The principle of operation of the satellite system.
The principle of operation of the satellite system. The principle of operation of the satellite system The principle of operation of the satellite system It is believed that satellite navigation appeared on October 4, 1957 — then the first artificial Earth satellite was launched. The first satellite radio navigation system, which allows determining the coordinates …
Satellite monitoring of transport: control and optimization.
Satellite monitoring of transport: control and optimization. Satellite monitoring of transport: control and optimization. Satellite monitoring of transport: control and optimization. Satellite monitoring of transport belongs to the category of satellite monitoring and control systems for mobile objects based on satellite navigation systems, equipment and technologies for cellular or radio communications, computing equipment and digital …
Satellite monitoring of transport: control and optimization.Далее …
Application of satellite radio navigation methods.
Application of satellite radio navigation methods.. Application of satellite radio navigation methods. Petrov Nikolay Nikolaevich, Candidate of Technical Sciences APPLICATION OF SATELLITE RADIONAVIGATION METHODSFOR THE CREATION OF SYSTEMS AND COMPLEXES OF TECHNICAL MEANS FOR LOCATION OF MOBILE OBJECTS. Application of satellite radio navigation methods for the creation of systems and complexes of technical means for …
Positioning of moving objects based on satellite navigation systems.
Location of moving objects based on satellite navigation systems.. Location of moving objects based on satellite navigation systems. Petrov Nikolay Nikolaevich, Candidate of Technical Sciences LOCATION OF MOBILE OBJECTS BASED ON SATELLITE NAVIGATION SYSTEMS This article continues a series of articles devoted to positioning systems and their use to ensure the safety of mobile objects. …
Positioning of moving objects based on satellite navigation systems.Далее …
Batteries for mobile devices and portable appliances. Condition assessment.
#Batteries for mobile devices Batteries for mobile devices and portable devices. Condition assessment. VASILIEV Vladimir Yuryevich It is no secret that the trouble-free operation of mobile devices or devices with backup (or uninterruptible) power supply directly depends on the condition of their batteries. In this regard, the correct and timely determination of the actual characteristics …
Batteries for mobile devices and portable appliances. Condition assessment.Далее …
Batteries. History, technology, reality.
#Battery Batteries. History, technology, reality. Vasiliev Vladimir Yuryevich Petrov Nikolay Nikolaevich, Candidate of Technical Sciences The article attempts to present information about batteries currently used in radio engineering equipment in a concise form. The article is of a review nature and is intended for readers of our magazine working with batteries. All materials used are …
Active protection in vibroacoustic channels.
Requirements for interference generating equipment. In recent years, the development of devices for creating vibration and acoustic interference designed to ensure the protection of speech information from its leakage from premises through building structures and engineering communications has been intensively developing. The following should be noted as reasons that force developers of special equipment to …
Acoustic protection of confidential negotiations.
Acoustic protection of confidential negotiations. In the information age, when the principle applies: whoever owns the information, owns the world. There are more than enough people who want to take over the world in this way, which means there is a steady demand for information obtained in an unauthorized way. In such a situation, the …
WAVELET video compression algorithm.
Any image entered into a computer is digitized and stored in it in the form of a so-called bitmap or, in other words, a matrix, each element of which describes the color of a point on the original image. The number of matrix elements (image points) depends on the resolution selected during digitization. However, storing …
Spectrum analyzer.
Spectrum Analyzers. A good spectrum analyzer is the “workhorse” of the TSCM industry and, when combined with a computer, printer, and vector signal analyzer, will detect any RF eavesdropping devices (including those used by the FBI, NSA, CIA, MI5, etc.) Hewlett Packard HP 71910A/P Wideband Receiver and Vector Signal Analyzer The HP 89410A is …
Analysis of paper used to package drugs.
Analysis of paper used to package drugs. The International Criminal Police Review has published an article devoted to issues related to the analysis of paper used to package drugs. Paper is a material that forensic experts commonly encounter. It often contains important data such as fingerprints and blood stains, and in some cases, paper analysis …
Analysis of existing regulatory, technical and methodological documents in terms of ensuring the reliability of communication facilities.
Analysis of existing regulatory, technical and methodological documents in terms of ensuring the reliability of communication facilities. An analysis of existing regulatory, technical and methodological documents in terms of ensuring the reliability of communication facilities is provided. It is shown that the current and newly developed international, interstate military standards of the SRPPVT, SNT, SNVT, …
Analysis of explosion versions. Domestic explosion or terrorist act?
Analysis of the versions of the explosions. «We live in conditions of the threatening spread of terrorism. And this means — it is necessary to unite all the forces of society and the state to repel the internal enemy. This enemy has no conscience, pity and honor. No face, nationality and faith.» (from the televised …
Analysis of explosion versions. Domestic explosion or terrorist act?Далее …
Analysis of the possibilities of preventing leakage of information stored on hard drives.
Analysis of the possibilities of preventing leakage of information stored on hard drives. 1. Introduction The total computerization of the infrastructure of industrialized countries has currently led to the rapid development of technical intelligence tools (TIS), allowing the extraction of confidential information from computers and computer networks. The prospects of this direction are determined by …
Analysis of the possibilities of preventing leakage of information stored on hard drives.Далее …
Analysis of ATM network security.
Analysis of ATM network security. The article provides an analysis of information security issues in data transmission networks built on the basis of technical means of ATM technology, taking into account the features of the interaction of various types of equipment and the architecture of the protocols used. Introduction The telecommunications and communication market offers …
Analog cellular mobile radio communication system of AMPS standards.
Analog cellular system of mobile radio communication of AMPS standards. ANALOG CELLULAR SYSTEM OF MOBILE RADIO COMMUNICATION EMX-2500 BY MOTOROLA FOR AMPS, TAGS, E-TACS, J-TACS STANDARDS 5.1 Structural diagram of the EMX-2500 CCPS The EMX-2500 is a fully automatic analog cellular radiotelephone system. The system consists of hardware and software components for fixed and mobile …
Analog cellular mobile radio communication system of AMPS standards.Далее …
Antenna-contact method for detecting local objects in concealing environments.
Antenna-contact method for detecting local objects in sheltering environments. A new method for detecting local objects in a semiconducting medium is proposed. The essence of the method is to use the search object as a transmitting antenna. The method allows, with a single contact with the search object, to determine its geometric dimensions and electrical …
Antenna-contact method for detecting local objects in concealing environments.Далее …
Intelligence enhancing equipment.
Intelligibility enhancement equipment. Intelligibility enhancement equipment. Intelligibility enhancement equipment. General Provisions. During the process of receiving and recording audio information, interference and noise may occur due to various reasons: street noise, rain, noise and interference from various electrical household and industrial devices, music, etc. The main means for cleaning audio information from the above-mentioned …
Hardware for verifying the authenticity of documents based on the optical method of non-destructive testing.
Hardware for verifying the authenticity of documents based on the optical method of non-destructive testing. KEKIN Aleksey Gennadievich, KOVALEV Aleksey Alekseevich, KOVALEV Dmitry Alekseevich, STUDITSKY Aleksandr Sergeevich, FEDOTOV Aleksey Vladimirovich, KHNYKOV Yury Alekseevich The problem of determining the authenticity of documents arose simultaneously with their appearance. As for counterfeiters, they have always been there. …
Automated systems. Protection from unauthorized access to information.
AUTOMATED SYSTEMS PROTECTION AGAINST UNAUTHORIZED ACCESS TO INFORMATION CLASSIFICATION OF AUTOMATED SYSTEMS AND REQUIREMENTS FOR INFORMATION PROTECTION This guideline document establishes the classification of automated systems subject to protection against unauthorized access to information, and requirements for information protection in AS of various classes. The guideline document has been developed in addition to GOST 34.003-90, …
Automated systems. Protection from unauthorized access to information.Далее …
Autonomous power supply for miniature electronic equipment.
Autonomous power supply of miniature radio-electronic equipment. Nizhnikovsky Evgeny Aleksandrovich, candidate of chemical sciences, Serdyukov Petr Nikolaevich, doctor of technical sciences AUTONOMOUS POWER SUPPLY OF MINIATURE RADIO-ELECTRONIC EQUIPMENT The operation of most types of special-purpose radio-electronic equipment (REA) is impossible without modern, highly efficient and reliable power sources. Autonomous power supply of REA is provided …
Autonomous power supply for miniature electronic equipment.Далее …
Ajax-8 is a portable camera.
Ayaks-8 — portable photo camera. The first Soviet portable photo camera «Ayaks-8» was designed in 1948 in a special photo-optical laboratory of the MGB in Moscow for covert photography of objects «of operational interest», primarily people and their actions. Considering the post-war devastation and the acute shortage of developers and designers, this was an event …
Federal Bureau of Investigation electronic imaging database.
The Federal Bureau of Investigation's Electronic Image Database. Law Enforcement Technology.- 1996.- November.- P. 56 57. Even before the 1996 Summer Olympics in Atlanta, more than 15,000 color photographs were taken of the venues. But, unlike photographs published in newspapers and magazines, these photographs documenting the progress of the Olympic Games were never available to …
Federal Bureau of Investigation electronic imaging database.Далее …