Abstract


 
 
 
 Security systems are the guarantee of stable functioning of the organization, company, office, industry, housing and other types of buildings. For entire security, complex control devices are set on the building which has to be protected, like fire and burglar alarms, video-audio controls and access systems. Intelligent Security Management System is built on Atmel’s microcontrollers. This allows the system to be flexible and to modify it easily if needed. The reliability of the security system depends on its uniqueness. This given security system is easily modified and hence its reliability is high. The system can be easily integrated into a variety of external modules, which can further increase the factor of reliability. It’s also easy to adopt it to various security management systems. Many of the security and video surveillance systems allow to control the situation of the object from a large distance. From any point of the planet, we can track and manage the security system modes and make easy changes in them, which enable adequate reaction.Digital complexes of video surveillance are one of the variants of defense organization. The main areas of their use are the most important objects and large areas where buildings are located far from each other.
 
 
 

Highlights

  • The tendencies of developing technologies of security systems has caused the transformation of existed security systems into more serious complexes of various devices, which are designed for the protection of industrial properties [1]

  • Modern security and video surveillance systems provide a unique opportunity to fully control the situation at the property that has to be protected

  • Many systems of security and video surveillance allow to control the situation at the property

Read more

Summary

Introduction

Modern security and video surveillance systems provide a unique opportunity to fully control the situation at the property that has to be protected. Many systems of security and video surveillance allow to control the situation at the property. Nowadays password authentification systems are quite widespread, which enables to distinguish between individual users with the help of unique information, which is known only for them.

Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.