SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Welcome to the Seminar of
 Technology has made security systems more
affordable, more competent, and more accessible to
every one. Early security systems were awkward devices
that were hard to install and were very limited in abilities.
 Basically, there was only one thing an early security
system could do, emit an ear-piercing wail and perhaps
turn on a light or two.
 As technology advanced, security systems became
smarter and more reliable. Home security technology has
made it virtually impossible for any danger to approach
or make it in your home without you and the proper
emergency response teams knowing about it.
 Without you being home or without you having to press
one button, the control panels can be programmed to
alert you and the police or medical or fire units, as well as
activate various response methods such as sprinkler
systems or lights and alarms.
 Security cameras and recorders, environment
sensors, motion detectors, and advanced control panels
allow you and local emergency units to have the
immediate knowledge of an intrusion or danger to health
and happiness. In fact, newer systems not only supply the
knowledge of danger, but also allow you to control the
response.
 Security systems are putting security more and more into
the hands of the homeowner. The most basic way is
through the progression and simplification of the home
security systems. No longer is a professional needed to
install the system. Because technology has simplified the
system, any homeowner can easily and quickly install a
security unit and control the unit from home or away.
 Modern adjustments to security technology provide
owners with more access and flexibility with their systems.
you can gain access to your unit through the Internet or
cell phone. You can control your system at home or from
anywhere in the world.
1. Surveillance cameras,
2. Fire alarm systems,
3. Intruder/Burglar alarms,
4. Electronic article surveillance,
5. Electronic lock,
are some of the Electronic security devices
which have been invented and developed these
days.
 Surveillance cameras are video cameras
also called as Closed Circuit Television
(CCTV) camera used for the purpose of
observing an area. They are often
connected to a recording device or IP
network, and may be watched by
a security guard or law enforcement
officer.
 Cameras and recording equipment used to
be relatively expensive and required human
personnel to monitor camera footage, but
analysis of footage has been made easier by
automated software that organizes digital
video footage into a
searchable database, and by video analysis
software (such as VIRAT and HumanID). The
amount of footage is also drastically reduced
by motion sensors which only record when
motion is detected.
 The amount of footage is also drastically
reduced by motion sensors which only record
when motion is detected. With cheaper
production techniques, surveillance cameras
are simple and inexpensive enough to be
used in home security systems, and for
everyday surveillance.
 An automatic fire alarm system is designed to detect
the unwanted presence of fire by monitoring
environmental changes associated with combustion.
 In general, a fire alarm system is classified as either
automatically actuated, manually actuated, or
both.
 Automatic fire alarm systems are intended to notify
the building occupants to evacuate in the event of
a fire or other emergency, report the event to an off-
premises location in order to summon emergency
services, and to prepare the structure and
associated systems to control the spread of fire and
smoke.
 Fire alarm control panel (FACP): This
component, the hub of the system, monitors
inputs and system integrity, controls outputs and
relays information.
 Primary Power supply: Commonly the non-
switched 120 or 240 Volt Alternating Current
source supplied from a commercial power utility.
 Secondary (backup) Power supplies: This
component, commonly consisting of sealed
lead-acid storage batteries or other emergency
sources including generators, is used to supply
energy in the event of a primary power failure.
 Initiating Devices: This component acts as an input to the
fire alarm control unit and are either manually or
automatically actuated.
 Notification appliances: This component uses energy
supplied from the fire alarm system or other stored energy
source, to inform the proximate persons of the need to
take action, usually to evacuate.
 Building Safety Interfaces: This interface allows the fire
alarm system to control aspects of the built environment
and to prepare the building for fire, and to control the
spread of smoke fumes and fire by influencing air
movement, lighting, process control, human transport
and exit.
 A burglar alarm is a system designed to
detect intrusion –unauthorized entry– into a
building or area. They are also called security
alarms, security systems, alarm
systems, intrusion detection systems, perimeter
detection systems, and similar terms.
 Burglar alarms are used in
residential, commercial, industrial, and
military properties for protection
against burglary (theft) or property
damage, as well as personal protection
against intruders. Car alarms likewise
protect vehicles and their
contents. Prisons also use security systems
for control of inmates.
 Some alarm systems serve a single purpose of
burglary protection; combination systems
provide both fire and intrusion protection.
Intrusion alarm systems may also be combined
with closed-circuit television surveillance systems
to automatically record the activities of
intruders, and may interface to access control
systems for electrically locked doors. Systems
range from small, self-contained noisemakers, to
complicated, multi-area systems with computer
monitoring and control.
The most basic alarm consists of one or more sensors to detect
intruders, and an alerting device to indicate the intrusion.
However, a typical premises security alarm employs the
following components:
 Premises control unit (PCU), or panel: The "brain" of the
system, it reads sensor inputs, tracks arm/disarm status, and
signals intrusions. In modern systems, this is typically one or
more computer circuit boards inside a metal
enclosure, along with a power supply.
 Sensors: Devices which detect intrusions. Sensors may
placed at the perimeter of the protected area, within it, or
both. Sensors can detect intruders by a variety of
methods, such as monitoring doors and windows for
opening, or by monitoring unoccupied interiors for
motions, sound, vibration, or other disturbances.
 Alerting devices: These indicate an alarm condition. Most
commonly, these are bells, sirens, and/or flashing lights.
Alerting devices serve the dual purposes of warning
occupants of intrusion, and potentially scaring off burglars.
 Keypads: Small devices, typically wall-
mounted, which function as the human-
machine interface to the system. In addition to
buttons, keypads typically feature indicator
lights, a small mulch-character display, or both.
 Interconnections between components. This
may consist of direct wiring to the control unit, or
wireless links with local power supplies.
 Security devices: Devices to detect thieves such
as spotlights, cameras & lasers.
1. Passive infrared detectors
2. Ultrasonic detectors
3. Microwave detectors
4. Glass break detection
5. Smoke, heat, and carbon monoxide detectors
6. Vibration (shaker) or inertia sensors
7. Passive magnetic field detection
8. E-field
9. Microwave barriers
10. Microphonic systems
11. Taut wire fence systems
12. Fibre optic cable
13. H-field
 Electronic article surveillance (EAS) is a technological method for
preventing shoplifting from retail stores or pilferage of books from
libraries. Special tags are fixed to merchandise or books. These tags
are removed or deactivated by the clerks when the item is properly
bought or checked out. At the exits of the store, a detection system
sounds an alarm or otherwise alerts the staff when it senses active
tags.
 Some stores also have detection systems at the entrance to the
bathrooms that sound an alarm if someone tries to take unpaid
merchandise with them into the bathroom.
 Some stores with EAS have keypads by the detection systems with
monitors that beep showing the response time on the screen when
the alarm sounds to ensure that employees respond to the alarm.
The keypad keeps beeping until an employee responds to it.
 For high-value goods that are to be manipulated by the
patrons, wired alarm clips may be used instead of tags.
 There are several major types of electronic article
surveillance systems:
 Magnetic, also known as magneto-harmonic
 Acousto-magnetic, also known as
magnetostrictive
 Radio frequency
 Microwave
 Video surveillance systems (to some extent)
 These tags are made of a strip of amorphous
metal (metglas) which has a very low magnetic
saturation value. Except for permanent tags, this
strip is also lined with a strip of ferromagnetic
material with a moderate coercive
field (magnetic "hardness").
 Detection is achieved by sensing harmonics and
sum or difference signals generated by the non-
linear magnetic response of the material under a
mixture of low-frequency (in the 10 Hz to 1000 Hz
range) magnetic fields.
 These are similar to magnetic tags in that they
are made of two strips, a strip
of magnetostrictive, ferromagnetic amorphous
metal and a strip of a magnetically semi-hard
metallic strip, which is used as a biasing magnet
(to increase signal strength) and to allow
deactivation. These strips are not bound together
but free to oscillate mechanically.
 These tags are thicker than magnetic tags and
are thus seldom used for books. However they
are relatively inexpensive and have better
detection rates than magnetic tags.
 These tags are essentially an LC tank circuit that has
a resonance peak anywhere from 1.75 MHz to
9.5 MHz. The most popular frequency is 8.2 MHz.
Sensing is achieved by sweeping around the
resonant frequency and detecting the dip.
Deactivation for 8.2 MHz label tags is achieved by
detuning the circuit by partially destroying
the capacitor. This is done by submitting the tag to a
strong electromagnetic field at the resonant
frequency which will induce voltages exceeding the
capacitor's breakdown voltage, which is artificially
reduced by puncturing the tags.
 These permanent tags are made of a non-
linear element (a diode) coupled to one
microwave and one electrostatic antenna. At
the exit, one antenna emits a low-frequency
(about 100 kHz) field, and another one emits
a microwave field. The tag acts as a mixer
reemitting a combination of signals from both
fields. This modulated signal triggers the
alarm. These tags are permanent and
somewhat costly. They are mostly used in
clothing stores.
 An electronic lock (or electric lock) is a locking
device which operates by means of electric current.
Electric locks are sometimes stand-alone with an
electronic control assembly mounted directly to the
lock.
 More often electric locks are connected to
an access control system.
 The advantages of an electric lock connected to an
access control system include: key control, where
keys can be added and removed without re-keying
the lock cylinder; fine access control, where time
and place are factors; and transaction
logging, where activity is recorded.
Electronic locks offer a variety of means of authentication;
those described below are not considered exhaustive.
 Numerical codes, passwords and passphrases
Perhaps the most prevalent form of electronic lock is that using a
numerical code for authentication; the correct code must be
entered in order for the lock to deactivate. Such locks typically
provide a keypad, and some feature an audible response to each
press. Combination lengths are usually between 4 and 6 digits long.
A variation on this design involves the user entering the
correct password or passphrase.
 Security tokens
Another means of authenticating users is to require them to scan or
"swipe" a security token such as a smart card or similar, or to interact
a token with the lock. For example, some locks can access stored
credentials on a personal digital assistant (PDA) using infrared data
transfer methods.
 Biometrics
As biometrics become more and more prominent as a
recognized means of positive identification, their use in
security systems increases. Some new electronic locks
take advantage of technologies such as fingerprint
scanning, retinal scanning and iris
scanning, and voiceprint identification to authenticate
users.
 RFID
Radio-frequency identification (RFID) is the use of an
object (typically referred to as an RFID tag) applied to or
incorporated into a product, animal, or person for the
purpose of identification and tracking using radio waves.
Some tags can be read from several meters away and
beyond the line of sight of the reader. This technology is
also used in modern electronic locks.
Thank you for your Attention !
We Hope this Seminar made you aware about
the Electronic Security System

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Building Management System BMS Introduction
Building Management System BMS  IntroductionBuilding Management System BMS  Introduction
Building Management System BMS Introduction
 
fire detection and alarm system
fire detection and alarm systemfire detection and alarm system
fire detection and alarm system
 
Fire fighting
Fire fightingFire fighting
Fire fighting
 
FIRE ALARM SYSTEM
FIRE ALARM SYSTEM FIRE ALARM SYSTEM
FIRE ALARM SYSTEM
 
Fire alarm system Research
Fire alarm system ResearchFire alarm system Research
Fire alarm system Research
 
Fire Detection and Alarm Systems
Fire Detection and Alarm SystemsFire Detection and Alarm Systems
Fire Detection and Alarm Systems
 
CCTV Camera Presentation
CCTV Camera PresentationCCTV Camera Presentation
CCTV Camera Presentation
 
Access Control System, BMS
Access Control System, BMSAccess Control System, BMS
Access Control System, BMS
 
Cctv presentation
Cctv presentationCctv presentation
Cctv presentation
 
CCTV
CCTVCCTV
CCTV
 
Video Surveillance
Video SurveillanceVideo Surveillance
Video Surveillance
 
Building management system (bms)
Building management system (bms)Building management system (bms)
Building management system (bms)
 
Perimeter Intrusion Detection System | PIDS | GMAX
Perimeter Intrusion Detection System | PIDS | GMAXPerimeter Intrusion Detection System | PIDS | GMAX
Perimeter Intrusion Detection System | PIDS | GMAX
 
CCTV
CCTVCCTV
CCTV
 
Fundamentals of Fire Alarm System
Fundamentals of Fire Alarm SystemFundamentals of Fire Alarm System
Fundamentals of Fire Alarm System
 
Bms overview
Bms overviewBms overview
Bms overview
 
Cctv report
Cctv reportCctv report
Cctv report
 
Summary of smart building
Summary of smart buildingSummary of smart building
Summary of smart building
 
Intro to basic fire alarm technology
Intro to basic fire alarm technologyIntro to basic fire alarm technology
Intro to basic fire alarm technology
 
CCTV Surveillance
CCTV SurveillanceCCTV Surveillance
CCTV Surveillance
 

Andere mochten auch

Safety & security
Safety & securitySafety & security
Safety & securityRohit Mohan
 
Safety and security for buildings
Safety and security for buildingsSafety and security for buildings
Safety and security for buildingsKhaled Ali
 
central air conditioning system
central air conditioning systemcentral air conditioning system
central air conditioning systemUiTM Shah Alam
 
Types of air conditioning systems
Types of air conditioning systemsTypes of air conditioning systems
Types of air conditioning systemsbecoolseo
 
Air Conditioning System
Air Conditioning SystemAir Conditioning System
Air Conditioning SystemSumit Ranjan
 
Air conditioning-system ppt
Air conditioning-system pptAir conditioning-system ppt
Air conditioning-system pptIshtiaq Ahmad
 
Air Conditioning & Hvac Systems
Air Conditioning & Hvac SystemsAir Conditioning & Hvac Systems
Air Conditioning & Hvac SystemsGAURAV. H .TANDON
 
Fire Protection Systems Unit-I
Fire Protection Systems Unit-IFire Protection Systems Unit-I
Fire Protection Systems Unit-IGAURAV. H .TANDON
 
Hvac Presentation
Hvac PresentationHvac Presentation
Hvac PresentationChoong KW
 
Fire protection systems
Fire protection systemsFire protection systems
Fire protection systemsHer Riv
 
Fire fighting presentation
Fire  fighting presentationFire  fighting presentation
Fire fighting presentationRaghunath Patil
 
Hvac presentation for beginers
Hvac presentation for beginersHvac presentation for beginers
Hvac presentation for beginersguestf11b52
 

Andere mochten auch (20)

Fire fighting
Fire fightingFire fighting
Fire fighting
 
Fire fighting active system
Fire fighting active systemFire fighting active system
Fire fighting active system
 
Safety & security
Safety & securitySafety & security
Safety & security
 
Fire fighting passive system
Fire fighting passive systemFire fighting passive system
Fire fighting passive system
 
Fire fighting
Fire fightingFire fighting
Fire fighting
 
Safety and security for buildings
Safety and security for buildingsSafety and security for buildings
Safety and security for buildings
 
central air conditioning system
central air conditioning systemcentral air conditioning system
central air conditioning system
 
Types of air conditioning systems
Types of air conditioning systemsTypes of air conditioning systems
Types of air conditioning systems
 
Fire Fighting System
Fire Fighting SystemFire Fighting System
Fire Fighting System
 
Air Conditioning System
Air Conditioning SystemAir Conditioning System
Air Conditioning System
 
Air conditioning-system ppt
Air conditioning-system pptAir conditioning-system ppt
Air conditioning-system ppt
 
System security
System securitySystem security
System security
 
Air Conditioning & Hvac Systems
Air Conditioning & Hvac SystemsAir Conditioning & Hvac Systems
Air Conditioning & Hvac Systems
 
Air conditioning
Air conditioningAir conditioning
Air conditioning
 
Fire Protection Systems Unit-I
Fire Protection Systems Unit-IFire Protection Systems Unit-I
Fire Protection Systems Unit-I
 
Hvac Presentation
Hvac PresentationHvac Presentation
Hvac Presentation
 
Basics of Fire fighting
Basics of Fire fightingBasics of Fire fighting
Basics of Fire fighting
 
Fire protection systems
Fire protection systemsFire protection systems
Fire protection systems
 
Fire fighting presentation
Fire  fighting presentationFire  fighting presentation
Fire fighting presentation
 
Hvac presentation for beginers
Hvac presentation for beginersHvac presentation for beginers
Hvac presentation for beginers
 

Ähnlich wie Electronic security system

An electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring systemAn electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring systemZac Darcy
 
intrusion detection
 intrusion detection intrusion detection
intrusion detectionasif usmani
 
Intrusion Systems
Intrusion SystemsIntrusion Systems
Intrusion Systemstamilarasan
 
A Simple and Reliable Touch Sensitive Security System
A Simple and Reliable Touch Sensitive Security SystemA Simple and Reliable Touch Sensitive Security System
A Simple and Reliable Touch Sensitive Security SystemIJNSA Journal
 
Home alarm system
Home alarm systemHome alarm system
Home alarm systemnishiyath
 
FIRE ALARM SYSTEM BASED ON MCU FOR INDUSTRY APPLICATION
FIRE ALARM SYSTEM BASED ON MCU FOR INDUSTRY APPLICATIONFIRE ALARM SYSTEM BASED ON MCU FOR INDUSTRY APPLICATION
FIRE ALARM SYSTEM BASED ON MCU FOR INDUSTRY APPLICATIONIRJET Journal
 
Addressable fire alarm system
Addressable fire alarm systemAddressable fire alarm system
Addressable fire alarm systemFIRE KNOCK
 
14983184 industrial-security-system-using-auto-dialer
14983184 industrial-security-system-using-auto-dialer14983184 industrial-security-system-using-auto-dialer
14983184 industrial-security-system-using-auto-dialera_subramaniyam
 
Security Alarm Systems blaze automation
Security Alarm Systems blaze automationSecurity Alarm Systems blaze automation
Security Alarm Systems blaze automationBlaze Automation
 
Blaze Security Alarm Systems
Blaze Security Alarm SystemsBlaze Security Alarm Systems
Blaze Security Alarm Systemshomeautomation
 
Effective Human Detection & Tracking Security Using Machine Vision
Effective Human Detection & Tracking Security Using Machine VisionEffective Human Detection & Tracking Security Using Machine Vision
Effective Human Detection & Tracking Security Using Machine Visionmarshallbutler
 

Ähnlich wie Electronic security system (20)

An electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring systemAn electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring system
 
intrusion detection
 intrusion detection intrusion detection
intrusion detection
 
To design low
To design lowTo design low
To design low
 
Anti-Theft System
Anti-Theft SystemAnti-Theft System
Anti-Theft System
 
Anti-Theft System By MINDWARE
Anti-Theft System By MINDWAREAnti-Theft System By MINDWARE
Anti-Theft System By MINDWARE
 
Intrusion Systems
Intrusion SystemsIntrusion Systems
Intrusion Systems
 
Em latest
Em latestEm latest
Em latest
 
A Simple and Reliable Touch Sensitive Security System
A Simple and Reliable Touch Sensitive Security SystemA Simple and Reliable Touch Sensitive Security System
A Simple and Reliable Touch Sensitive Security System
 
Home alarm system
Home alarm systemHome alarm system
Home alarm system
 
Pioneer Systems
Pioneer Systems Pioneer Systems
Pioneer Systems
 
Pioneer Systems
Pioneer Systems Pioneer Systems
Pioneer Systems
 
Pioneer Systems
Pioneer SystemsPioneer Systems
Pioneer Systems
 
FIRE ALARM SYSTEM BASED ON MCU FOR INDUSTRY APPLICATION
FIRE ALARM SYSTEM BASED ON MCU FOR INDUSTRY APPLICATIONFIRE ALARM SYSTEM BASED ON MCU FOR INDUSTRY APPLICATION
FIRE ALARM SYSTEM BASED ON MCU FOR INDUSTRY APPLICATION
 
Addressable fire alarm system
Addressable fire alarm systemAddressable fire alarm system
Addressable fire alarm system
 
14983184 industrial-security-system-using-auto-dialer
14983184 industrial-security-system-using-auto-dialer14983184 industrial-security-system-using-auto-dialer
14983184 industrial-security-system-using-auto-dialer
 
Security Alarm Systems blaze automation
Security Alarm Systems blaze automationSecurity Alarm Systems blaze automation
Security Alarm Systems blaze automation
 
Blaze Security Alarm Systems
Blaze Security Alarm SystemsBlaze Security Alarm Systems
Blaze Security Alarm Systems
 
Blaze Security Alarm Systems
Blaze Security Alarm SystemsBlaze Security Alarm Systems
Blaze Security Alarm Systems
 
Effective Human Detection & Tracking Security Using Machine Vision
Effective Human Detection & Tracking Security Using Machine VisionEffective Human Detection & Tracking Security Using Machine Vision
Effective Human Detection & Tracking Security Using Machine Vision
 
Panel
PanelPanel
Panel
 

Kürzlich hochgeladen

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 

Kürzlich hochgeladen (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Electronic security system

  • 1. Welcome to the Seminar of
  • 2.  Technology has made security systems more affordable, more competent, and more accessible to every one. Early security systems were awkward devices that were hard to install and were very limited in abilities.  Basically, there was only one thing an early security system could do, emit an ear-piercing wail and perhaps turn on a light or two.  As technology advanced, security systems became smarter and more reliable. Home security technology has made it virtually impossible for any danger to approach or make it in your home without you and the proper emergency response teams knowing about it.
  • 3.  Without you being home or without you having to press one button, the control panels can be programmed to alert you and the police or medical or fire units, as well as activate various response methods such as sprinkler systems or lights and alarms.  Security cameras and recorders, environment sensors, motion detectors, and advanced control panels allow you and local emergency units to have the immediate knowledge of an intrusion or danger to health and happiness. In fact, newer systems not only supply the knowledge of danger, but also allow you to control the response.
  • 4.  Security systems are putting security more and more into the hands of the homeowner. The most basic way is through the progression and simplification of the home security systems. No longer is a professional needed to install the system. Because technology has simplified the system, any homeowner can easily and quickly install a security unit and control the unit from home or away.  Modern adjustments to security technology provide owners with more access and flexibility with their systems. you can gain access to your unit through the Internet or cell phone. You can control your system at home or from anywhere in the world.
  • 5. 1. Surveillance cameras, 2. Fire alarm systems, 3. Intruder/Burglar alarms, 4. Electronic article surveillance, 5. Electronic lock, are some of the Electronic security devices which have been invented and developed these days.
  • 6.  Surveillance cameras are video cameras also called as Closed Circuit Television (CCTV) camera used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer.
  • 7.  Cameras and recording equipment used to be relatively expensive and required human personnel to monitor camera footage, but analysis of footage has been made easier by automated software that organizes digital video footage into a searchable database, and by video analysis software (such as VIRAT and HumanID). The amount of footage is also drastically reduced by motion sensors which only record when motion is detected.
  • 8.  The amount of footage is also drastically reduced by motion sensors which only record when motion is detected. With cheaper production techniques, surveillance cameras are simple and inexpensive enough to be used in home security systems, and for everyday surveillance.
  • 9.  An automatic fire alarm system is designed to detect the unwanted presence of fire by monitoring environmental changes associated with combustion.  In general, a fire alarm system is classified as either automatically actuated, manually actuated, or both.  Automatic fire alarm systems are intended to notify the building occupants to evacuate in the event of a fire or other emergency, report the event to an off- premises location in order to summon emergency services, and to prepare the structure and associated systems to control the spread of fire and smoke.
  • 10.  Fire alarm control panel (FACP): This component, the hub of the system, monitors inputs and system integrity, controls outputs and relays information.  Primary Power supply: Commonly the non- switched 120 or 240 Volt Alternating Current source supplied from a commercial power utility.  Secondary (backup) Power supplies: This component, commonly consisting of sealed lead-acid storage batteries or other emergency sources including generators, is used to supply energy in the event of a primary power failure.
  • 11.  Initiating Devices: This component acts as an input to the fire alarm control unit and are either manually or automatically actuated.  Notification appliances: This component uses energy supplied from the fire alarm system or other stored energy source, to inform the proximate persons of the need to take action, usually to evacuate.  Building Safety Interfaces: This interface allows the fire alarm system to control aspects of the built environment and to prepare the building for fire, and to control the spread of smoke fumes and fire by influencing air movement, lighting, process control, human transport and exit.
  • 12.  A burglar alarm is a system designed to detect intrusion –unauthorized entry– into a building or area. They are also called security alarms, security systems, alarm systems, intrusion detection systems, perimeter detection systems, and similar terms.
  • 13.  Burglar alarms are used in residential, commercial, industrial, and military properties for protection against burglary (theft) or property damage, as well as personal protection against intruders. Car alarms likewise protect vehicles and their contents. Prisons also use security systems for control of inmates.
  • 14.  Some alarm systems serve a single purpose of burglary protection; combination systems provide both fire and intrusion protection. Intrusion alarm systems may also be combined with closed-circuit television surveillance systems to automatically record the activities of intruders, and may interface to access control systems for electrically locked doors. Systems range from small, self-contained noisemakers, to complicated, multi-area systems with computer monitoring and control.
  • 15. The most basic alarm consists of one or more sensors to detect intruders, and an alerting device to indicate the intrusion. However, a typical premises security alarm employs the following components:  Premises control unit (PCU), or panel: The "brain" of the system, it reads sensor inputs, tracks arm/disarm status, and signals intrusions. In modern systems, this is typically one or more computer circuit boards inside a metal enclosure, along with a power supply.  Sensors: Devices which detect intrusions. Sensors may placed at the perimeter of the protected area, within it, or both. Sensors can detect intruders by a variety of methods, such as monitoring doors and windows for opening, or by monitoring unoccupied interiors for motions, sound, vibration, or other disturbances.  Alerting devices: These indicate an alarm condition. Most commonly, these are bells, sirens, and/or flashing lights. Alerting devices serve the dual purposes of warning occupants of intrusion, and potentially scaring off burglars.
  • 16.  Keypads: Small devices, typically wall- mounted, which function as the human- machine interface to the system. In addition to buttons, keypads typically feature indicator lights, a small mulch-character display, or both.  Interconnections between components. This may consist of direct wiring to the control unit, or wireless links with local power supplies.  Security devices: Devices to detect thieves such as spotlights, cameras & lasers.
  • 17. 1. Passive infrared detectors 2. Ultrasonic detectors 3. Microwave detectors 4. Glass break detection 5. Smoke, heat, and carbon monoxide detectors 6. Vibration (shaker) or inertia sensors 7. Passive magnetic field detection 8. E-field 9. Microwave barriers 10. Microphonic systems 11. Taut wire fence systems 12. Fibre optic cable 13. H-field
  • 18.  Electronic article surveillance (EAS) is a technological method for preventing shoplifting from retail stores or pilferage of books from libraries. Special tags are fixed to merchandise or books. These tags are removed or deactivated by the clerks when the item is properly bought or checked out. At the exits of the store, a detection system sounds an alarm or otherwise alerts the staff when it senses active tags.  Some stores also have detection systems at the entrance to the bathrooms that sound an alarm if someone tries to take unpaid merchandise with them into the bathroom.  Some stores with EAS have keypads by the detection systems with monitors that beep showing the response time on the screen when the alarm sounds to ensure that employees respond to the alarm. The keypad keeps beeping until an employee responds to it.  For high-value goods that are to be manipulated by the patrons, wired alarm clips may be used instead of tags.
  • 19.  There are several major types of electronic article surveillance systems:  Magnetic, also known as magneto-harmonic  Acousto-magnetic, also known as magnetostrictive  Radio frequency  Microwave  Video surveillance systems (to some extent)
  • 20.  These tags are made of a strip of amorphous metal (metglas) which has a very low magnetic saturation value. Except for permanent tags, this strip is also lined with a strip of ferromagnetic material with a moderate coercive field (magnetic "hardness").  Detection is achieved by sensing harmonics and sum or difference signals generated by the non- linear magnetic response of the material under a mixture of low-frequency (in the 10 Hz to 1000 Hz range) magnetic fields.
  • 21.  These are similar to magnetic tags in that they are made of two strips, a strip of magnetostrictive, ferromagnetic amorphous metal and a strip of a magnetically semi-hard metallic strip, which is used as a biasing magnet (to increase signal strength) and to allow deactivation. These strips are not bound together but free to oscillate mechanically.  These tags are thicker than magnetic tags and are thus seldom used for books. However they are relatively inexpensive and have better detection rates than magnetic tags.
  • 22.  These tags are essentially an LC tank circuit that has a resonance peak anywhere from 1.75 MHz to 9.5 MHz. The most popular frequency is 8.2 MHz. Sensing is achieved by sweeping around the resonant frequency and detecting the dip. Deactivation for 8.2 MHz label tags is achieved by detuning the circuit by partially destroying the capacitor. This is done by submitting the tag to a strong electromagnetic field at the resonant frequency which will induce voltages exceeding the capacitor's breakdown voltage, which is artificially reduced by puncturing the tags.
  • 23.  These permanent tags are made of a non- linear element (a diode) coupled to one microwave and one electrostatic antenna. At the exit, one antenna emits a low-frequency (about 100 kHz) field, and another one emits a microwave field. The tag acts as a mixer reemitting a combination of signals from both fields. This modulated signal triggers the alarm. These tags are permanent and somewhat costly. They are mostly used in clothing stores.
  • 24.  An electronic lock (or electric lock) is a locking device which operates by means of electric current. Electric locks are sometimes stand-alone with an electronic control assembly mounted directly to the lock.  More often electric locks are connected to an access control system.  The advantages of an electric lock connected to an access control system include: key control, where keys can be added and removed without re-keying the lock cylinder; fine access control, where time and place are factors; and transaction logging, where activity is recorded.
  • 25. Electronic locks offer a variety of means of authentication; those described below are not considered exhaustive.  Numerical codes, passwords and passphrases Perhaps the most prevalent form of electronic lock is that using a numerical code for authentication; the correct code must be entered in order for the lock to deactivate. Such locks typically provide a keypad, and some feature an audible response to each press. Combination lengths are usually between 4 and 6 digits long. A variation on this design involves the user entering the correct password or passphrase.  Security tokens Another means of authenticating users is to require them to scan or "swipe" a security token such as a smart card or similar, or to interact a token with the lock. For example, some locks can access stored credentials on a personal digital assistant (PDA) using infrared data transfer methods.
  • 26.  Biometrics As biometrics become more and more prominent as a recognized means of positive identification, their use in security systems increases. Some new electronic locks take advantage of technologies such as fingerprint scanning, retinal scanning and iris scanning, and voiceprint identification to authenticate users.  RFID Radio-frequency identification (RFID) is the use of an object (typically referred to as an RFID tag) applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader. This technology is also used in modern electronic locks.
  • 27. Thank you for your Attention ! We Hope this Seminar made you aware about the Electronic Security System