Smart City Solutions: Following the Wireless Protocol
a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, systems integrators and other product purchasers on product sources and identifies developments in video surveillance, access control, biometrics, intrusion alarm, intercom/ video door phone, home automation and other fields relevant to electronic security. ISSN 1997-6267 中華郵政北台字第 1571 號 執照登記為雜誌交寄
What’s Cooking in the Smart Traffic Industry? The traffic management market worldwide is expected to grow at 21-percent CAGR over the next four years.
Wireless technologies are an integral part of smart cities.
Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former a&s Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, websites, events, and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China and a&s Taiwan (above published in Chinese). a&s Adria, a&s India, a&s Italy, a&s Japan, a&s Polska, a&s Russia and a&s Vietnam are licensed editions. For changes of address or subscription problems, contact us at firstname.lastname@example.org Copyright© 2018 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher. Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices
John Shi Executive Editor-in-Chief Hubert Duh Managing Director / Publisher Editorial General Press email@example.com
Jill Lai Editor-in-Chief firstname.lastname@example.org
Optimized Chips Push Machine, Deep Learning to New Heights The tech world’s obsession with artificial intelligence is driving companies to develop better, more optimized solutions for running machine learning and deep learning algorithms.
Alf Chang Senior Consultant email@example.com Emily Lin Executive Editor firstname.lastname@example.org
Marketing Lisa Hsu Senior Media Marketing Coordinator email@example.com
News Feature Products of The Month 8 Outdoor IP Video Intercoms 10 Is AI-Powered Video Search Becoming Inevitable to Security for Commercial Buildings 11 How Smart City Projects Help Municipalities Achieve Further Savings 11 Cybersecurity Critical in the Age of IP-Based Access Control 12 Systems Integrators, are You Making the Most of Wireless Access Control? www.asmag.com
Melody Chen Editorial Assistant firstname.lastname@example.org
Circulation Michelle Shih Officer
Needless to say, transmission is a vital component in a video surveillance system for large sites, for example utilities, power plants, airports and manufacturing facilities.
The IP video intercom market has grown gradually as a result of the innovation of the internet, video streaming and SIP (session initiation protocol).
William Pao Senior Reporter email@example.com
Art Design Gaven Lee Executive Designer Mao Chang Senior Designer
Getting Data and Power Delivered With Transmission
Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 8F, No.288, Sec. 6, Civic Boulevard, Xinyi District, Taipei City 11087, Taiwan Phone/886 2 8729 1099 Fax/886 2 2747 6617 Website/www.newera.tw.messefrankfurt.com
Corporate Management Thomas Pin Account Manager Chihung Lee IT Manager asmag.com Jessica Yang Project Manager firstname.lastname@example.org Secutech Peggy Wu Trade Fair Manager Veronica Chen Group Manager Jason Cheng Project Manager Michelle Chu Event Marketing Manager International Advertising [Headquarters] Israel Gogol Manager email@example.com Audrey Fang Officer firstname.lastname@example.org [Branches & Representatives] Carolina Pattuelli Europe (Italy) email@example.com Evris Consolos Europe (U.K.) firstname.lastname@example.org Adis Hodzic Southeast Europe email@example.com Manish Gandhi India firstname.lastname@example.org Iris Lai Taiwan email@example.com Carol Guan China firstname.lastname@example.org Y. C. Suh Korea email@example.com Takashi Komori Japan firstname.lastname@example.org Nguyen Thu Ha Vietnam email@example.com Ekaterina Shapovalova Russia firstname.lastname@example.org Mariusz Kucharski Poland email@example.com
Editor’s Note Time to Build Up Your AI Competency Artificial intelligence (AI) still sounds more like a buzzword for security; however, what we can’t deny is the trend to become AI intelligent has been widespread in all kinds of businesses. Industry giants Google, Apple, Amazon, General Electric, Samsung, Twitter and many others all have acquired multiple AI companies to bring AI to their own businesses. In Silicon Valley startups meeting, AI has also become a basic norm, according to KDnuggets. Venture capital and corporate investments now have targeted AI startups and bet on their future development. According to CB Insights, “Nearly 120 AI startups exited for the first time last year, of which 115 were acquired … AI startup acquisitions have been up to 44 percent in 17.” If we look at the new startups for security and business intelligence, some of them combine the deep learning technology with visual images or videos to detect and even prevent crimes, and provide business values. Some are developing their smart solutions, based on biometric technology or thermal sensors. Many innovations are happening in the AI startups also for security. The future development of AI still relies mostly on the key developers of computing processors, algorithms, sensors and platforms. The ecosystems for different industries also need to be built up. However, I would say, no one can escape from the AI trend. How we embrace AI for our business is the next big topic for everyone.
KEEP IN TOUCH WITH...
SOCIAL MEDIA www.facebook.com/ asmagglobal
www.linkedin.com/ company/ asmagglobal
EDITOR-IN-CHIEF JILL LAI
Global Security News Media Platform FOLLOW US:
SENIOR REPORTER WILLIAM PAO
EXECUTIVE EDITOR EMILY LIN
The transmission infrastructure serves as a medium for transferring not only data but power as well. As a result choosing the right transmission equipment to ensure that both get transmitted to the right place is essential for large sites, for example power plants, factories and airports. Meanwhile, using Ethernet-overcoaxial helps ease the migration toward IP for existing analog users.
The number of cyberattacks continues to grow. Initially affecting small targets like end users, these attacks now involve large corporations that may not be that vigilant in identifying and resolving system vulnerabilities. As the data at risk becomes increasingly valuable, it will be foolish for anyone to turn a blind eye to the consequences of not making data security a priority.
Products of the Month
Outdoor IP Video Intercoms For Commercial Buildings The IP video intercom market has grown gradually as a result of the innovation of the internet, video streaming and SIP (session initiation protocol). Nowadays, IP intercoms not only use the internet for data transfer but are also equipped with cameras offering high quality imagery or night vision functionality. The clear viewing allows security staff to identify visitors in a more accurate way. Additionally, in terms of modern commercial management security and safety, it is crucial to operate a comprehensive integration of IP communication systems for everyday security consideration. a&s has compiled a selection of products — a new generation of IP video intercoms.
Jacques Video Entrance Station VES-75K
he Jacques IP video intercom entrance stations with cameras allow for video calling to enter and monitor stations within their integrated IP communications system. Jacques’ IP communication system is suitable for commercial building’s security management as it provides integration with security and building management systems, access control and video surveillance systems. Buildings can successfully manage the protection of patrons and property by communication through an unlimited number of audio and video intercom terminals, including those located in lifts and fire stairs. This ensures a Jacques IP video intercom system transcends client expectations as it seamlessly and stylishly integrates within a large number of applications including commercial, residential, health, public safety and transport. Key Features • Attractive slimline design • Two configurable relays that can control lights, gate/door access, etc. • Insect resistant microphone/speaker • 3.5” LCD screen • Call an unlimited number of master/monitor stations
Supplier: Jacques Technologies URL: www.jacques.com.au/
2N IP Verso Security Intercom
he 2N IP Verso security intercom is configurable to clients’ needs thanks to its modularity. The users can select the specific module, accessories and configurable functions to meet their requirements. Besides, 2N IP Verso provides reliable access control and allows users to easily interface with other systems, achieving even higher site security. It also makes it easy to prevent the entry of unauthorized persons. Other features include Bluetooth technology and touchscreen. The Bluetooth module lets users eliminate access codes, entry cards and key distribution; moreover, the vandal resistant touchscreen is easy to read even in direct sunlight.
Key Features • SIP protocol support with no server needed • Equipped camera with night vision • Email snapshots of the visitor captured by the camera at the time of the call • Call a mobile phone or tablet over the local network via Wi-Fi or over cellular data • A highly sensitive touch keypad reliably records and evaluates every touch and ensures access to the building via the entered PIN
Supplier: 2N Telekomunikace URL: www.2nusa.com
Channel Vision IP Intercom System for Commercial Buildings SIM 8302
ith its functional layout and contemporary design, the new IP intercom system for multi dwelling units and commercial buildings has everything you need for streamlined access control for your residents. The new SIM Series IP intercom is equipped with a built-in IP camera, proximity card reader, keypad and LCD screen for a comprehensive resident directory and status notifications. The SIM Series intercom is compatible with the new IP touchscreen room stations. Touchscreens are available in 7” or 10” screens and feature video communication and control of the front door, basic smarthome automation and control from a smartphone app.
Key Features • Built-in IP camera • Discrete speaker and microphone • Video communication to the front door • Built-in proximity card, RFID 125KHz ID card reader for contact-less card entry • Compatible with the IP touchscreen room station
Supplier: Channel Vision Technology URL: http://channelvision.com/
Comelit Ikall Entrance Panel Digital Version
kall, a new entrance panel design features versatile technology. With their clean, attractive lines, the modular elements guarantee optimal results by offering simple configuration, style and reliability. In addition to offering visual elegance, the anodized steel used in its creation means Ikall metal can withstand the most difficult and stressful of operating conditions, whether these are due to an urban environment or the climate and temperature of the surrounding environment, guaranteeing excellent water resistance (even in very cold conditions of -30°C) and remaining unaffected by saline mist. The panel also includes wide-angle Ikall camera, offering perfect coverage of a 90° field of vision, and a large LCD display (62 x 44 mm) with backlighting, ensuring visual signals are easy to read. Key Features • 2 programmable outputs • Direct power supply via plug • Keypad with Sensitive Touch technology • Audio and visual signals with OSD pictograms • 16 languages available
n Comelit Group Supplier: URL: www.comelitgroup.com/en/
Paxton Net2 Entry – Touch Panel, Surface Mount
et2 Entry is a plug and play solution that comes with a range of panel options and is suitable for a wide variety of sites. The Net2 Entry touch panel comprises a quality 7-inch color touchscreen with personalization options. It has a line-out for use with T-Loop antenna for users with hearing aids and advanced sound processing, for high traffic areas making it suitable for even more sites than ever before. The Net2 Entry standard panel comes in industry recognized anthracite grey, meaning it complements the windows and doors of many new builds. It is a robust external panel for use with Paxton’s door entry system, Net2 Entry.
Key Features • SIP compatible • Pan/tilt camera functionality to capture an angled view • Reads EM, Paxton and MIFARE token technology • Built-in keypad and RFID reader • IP and PoE technology for easy expansion
he IX-DF is an IP addressable stainless steel, flush mount video door station. Its units are weather resistant. It connect to the network using CAT-5e/6 cable. The door stations have a built-in dry contact for door release (24V AC/DC, 500mA). The IX-DF is equipped with a fixed camera, which can be vertically adjusted to three positions. The IX-DF is ONVIF Profile S compliant. The door stations can call up to 20 different master stations (IX-MV). An additional 20 master stations can be called using the contact input. The speaker and microphone allow for two-way communication with a master station. The units are 802.3af PoE compliant.
Supplier: Paxton URL: www.paxton.co.uk
Fermax Digital Extra Duox Video Marine Panel ST3
he Digital Extra door entry panels include a keypad and a graphic display. They allow the visitor to select the tenant from the display and press the bell key directly. The keypad operates as an access control system, opening doors on entry of a predetermined code. The Digital Extra Display with a 3.5” TFT, enables the list of tenants and their assigned door numbers to be displayed (like a telephone directory). It also indicates the communication status. The keys allow the user to move through the menu. Once the door number has been typed in using the keypad, press the button to call the selected room. Furthermore, it stores up to 999,999 addresses for the DUOX system.
Key Features • Vandal Resistant • PoE Powered (IEEE 802.3af Class 0) • Can be surface mounted using the “SBX-ISDVF” • Weather rated for outdoor use; IP55, -40° to 140° F • Fixed color video camera • ONVIF Profile S compliant
Key Features • Back lit Duox Display, 3.5" TFT with high brightness for outdoor use that enhances and improves the panel potential • Electronic directory: lets users look for the names (home owners/ residents) through the display and browser buttons • Incorporates access control functions through the numeric keypad by means of keypad codes (programmed previously • Operating temperature: -10 ºC to 60 ºC
Supplier: Aiphone URL: www.aiphone.com
Supplier: Fermax URL: www.fermax.com
Is AI-Powered Video Search Becoming Inevitable to Security? Advancements in the field of AI-based video search and deep learning neural networks are helping to accelerate searches for specific objects or people when required. BY Prasanth Aby Thomas, Freelancer
iven the increasing affordability of equipment and growing awareness of security requirements, more and more cameras are being installed across the globe every day. While this is a good thing, the sheer volume of footage that come in makes it difficult for operators to find specific objects or people when needed. This is one area where artificial intelligence (AI) is all set to play a key role. Several security companies are already working on this to make searching through videos as simple as using Google. According to Matt Sailor, CEO of IC Realtime that recently introduced a video search solution named Ella, this is the future of video surveillance. “Prior to the introduction of Ella and this technology, within the security and surveillance space, finding the proper video clip that matched up with an incident could only be done over a long period of time and by applying search filters
and parameters to end up shifting through hours of narrowed down video footage,” he said. The advantages of integrating AI-based video search range from efficiency to ease of use. A key benefit that customers would find attractive is that it saves time and money. Stephen Russell, Founder and Chairman of 3VR Security, had said, “Customers report that they are able to do roughly 10 times the work in one-tenth the time.” As for security systems integrators (SI), Sailor pointed out that his company’s solution offers SIs a direct path to easily attainable recurring monthly revenue (RMR). “In installations where a surveillance system does not exist, dealers can easily add the Ella solution without having to swap out the NVRs or surveillance equipment they carry on their trucks and easily add the software solution to the application,” he said.
“The advantages of integrating AI-based video search range from efficiency to ease of use.” While video search is becoming critical to surveillance solutions, the advantages of this solution go beyond this. The power of AI enables software to learn what is important and what is not. It is not enough that operators find certain objects within a video and the system is able to pull up similar objects from other videos. To be truly the Google of video surveillance footage, the solution should be intelligent enough to pick up key incidents by itself. That intelligent video search solutions will become an integral part of video surveillance solutions
APPLICATION CASES Education HID SECURED VISITOR MANAGEMENT SOFTWARE IN SCHOOL DISTRICT The school board and administration of Ballston Spa School District in New York state felt that paper sign-in logs were no longer sufficient to provide the information needed to manage visitors to their schools. They wanted a simple and quick method to issue photo ID badges and compile data on who comes and goes from their buildings. After conducting several demos of visitor management products, the district chose HID Global’s EasyLobby visitor management to solve its problem. EasyLobby can easily change the layout of photo ID badges so staff could identify whether the visitor badge could be matched to the person wearing it. Besides, the systems can keep a comprehensive historical log of dates, times and identification of visitors. The school can now reliably track everyone who visits the school to enhance safety.
is certain. But given the number of companies entering the market with this, the question for systems integrators and end users is which among them provides the best bang for the buck. Advancements in the field of AI and deep learning neural networks is going to push this segment further ahead and it may not be too long before we see more intelligent solutions that can identify incidents, people and objects even more accurately.
56.8 million US K-12 enrollment to reach 56.8 million in 2026.
Source: US National Center for Education Statistics
a&s explores topics that are generating interest in the security industry, offering readers important facts and information relevant to their profession.
How Smart City Projects Help Municipalities Achieve Further Savings Smart city projects can help government and residents achieve cost savings and higher asset utilization rates.
While end users benefit from IP-based access control, both vendors and users should be aware of cyberattacks and take precaution on enhancing the security of their access control.
BY William Pao
mart city has become a popular concept across the world. An increasing number of municipalities have either deployed or are trialing smart city solutions to make themselves more livable. While these solutions play a critical role in raising citizens’ quality of life, they also contribute to further cost savings for different stakeholders. That was the point raised in a whitepaper by ABI Research titled Smart Cities and Cost Savings. According to the whitepaper, smart city cost savings are identified on three levels: city government, residents and enterprises. For the city government, savings can be achieved through various means, including reduced energy consumption by way of smart street lights. “It is important to distinguish between the cost savings accomplished by replacing traditional lights with LED technology and turning street lights into smart, connected systems. While LED lighting on its own results in savings of 50 percent or more, adding connectivity services can yield an additional 30-percent cost saving, the bulk of which is achieved through intelligent, centralized trimming,” the whitepaper said. For residents of smart cities, they can achieve cost savings via various technologies and solutions such as remote healthcare, online universities and smart home and home sharing.
Cybersecurity Critical in the Age of IP-Based Access Control
BY William Pao
A While many of the cost-saving aspects of smart city technologies for citizens also apply to enterprises, a number of specific, additional opportunities exist, the paper added. These include freight transportation, commercial building management and smart manufacturing plants. The paper concluded by saying amid the smart city trend, opportunities for IoT and smart city ecosystems abound. “High concentrations of people and enterprises in a rapidly increasing number of mega cities and an overall shift toward urbanization allows unlocking the power of service and sharing paradigms, achieving higher asset utilization rates, obtaining economies of scale, and ultimately a more sustainable environment on a level never seen before,” it said. “For technology suppliers, this opens up a huge opportunity to position solutions and justify smart city projects and deployments by demonstrating fast return on investment (ROI) driven by direct cost savings.”
Hospitality ASSA ABLOY HOSPITALITY SOLUTION DEPLOYED IN KVIHOTEL Located in Budapest, Hungary, the KViHotel has implemented the ASSA ABLOY Hospitality Mobile Access, VingCard Allure electronic door locks and the Visionline software platform to maximize security and enhance the overall guest experience. With the installation of ASSA ABLOY Hospitality Mobile Access, an advanced solution that allows guests to use their mobile device as a digital room key, and VingCard Allure locks, guests can quickly and conveniently enter their room immediately upon arrival with a quick swipe of their mobile devices. Through the use of the Visionline system, the hotel staff can remotely control who has access to certain areas on property and when. Since the installation, KViHotel has experienced positive feedback from guests enjoying the benefit of being able to bypass the front desk and enter their room immediately upon arrival with their own smartphones.
ccess control has transitioned from a mostly proprietary technology to an increasingly open, networkable solution on the internet. However, this has also brought new challenges for vendors and users. In particular, making sure that access control is secure enough to ward off cyberthreats has become critical. That was the point raised by Axis Communications in a recent blog post. Benefits of IP-based access control are manifold, one of which is ensuring better security at the end-user organization. “Closely integrating an access control solution with video surveillance technology can help verify that the person trying to access your facility is in fact the person on the ID card. Beyond physical security, inter-operation with other systems such as HR software can help organizations detect potential intruders by identifying that the credentials of an employee currently on annual leave are being used to attempt entry,” the post said. However, the biggest challenges of moving access control to the network is cybersecurity. According to Axis, adding any technology to an IT network may offer hackers a backdoor access point to a company’s confidential data, if not deployed correctly. Therefore, cybersecurity becomes a serious issue for firms as IoT technologies becomes more commonly used. In a previous asmag.com article, Genetec offered some tips on how integrators can help enhance the security of their client’s access control. This included swapping out older devices for newer ones which support Open Supervised Device Protocol (OSDP) Secure Channel to provide end-to-end encryption and protection from reader to controllers; proposing proven 13.56 MHz smartcard technology based on iCLASS SEOS or MIFARE DESFire EV1 platform; and choosing access control software with built-in cybersecurity mechanisms such as encryption, multi-layer authentication and authorization for added defense. Meanwhile, the Axis post also stressed that cybersecurity is not just a vendor-driven effort; it’s a process that all stakeholders should get involved in.
ns atio unic m m Co Axis rce: u o ge s Ima
: urce e so g a Im
ns atio unic m m Co Axis
is : Ax urce o s ge Ima
ns atio unic m Com
Integration the Remedy for Best Healthcare Security Access control is a vital part of a healthcare facility’s security solution; however, alone it can only do so much. Integration with other systems, such as video surveillance, location tracking and alarm is helping healthcare mangers provide not only the highest level of security, but also patient care.
BY Eifeh Strom, Freelancer
he global healthcare market is one of the largest and most important in the world economically. Global healthcare spending is projected to increase at an annual rate of 4.1 percent in 2017 to 2021, reaching US$8.7 trillion by 2020, according to the 2018 Global Health Care Outlook published by Deloitte. This number is up from just 1.3 percent in 2012 to 2016. The significance of this sector means the importance of security cannot be underscored enough. Securing healthcare facilities, patients, staff, data and assets are all of paramount interest. To do this requires a comprehensive security solution, one with solid access control, video surveillance and other systems, all put in place to protect and secure everyone and everything within and around a facility.
Importance of Good Access Control
Healthcare professionals face many challenges when trying to secure a facility, which is made even more difficult when needing to maintain an open, welcoming environment. This is no easy task with a constant flow of unknown visitors coming in and out, which is only made more difficult when compounded by the fact that hospitals often have no defined, or obvious, perimeters. This is why a solid access control system must be in place. Nowadays, traditional keys and wired magnetic locks can both fail to meet the healthcare sector’s needs. “Mechanical keys can’t offer the user-friendliness, real-time monitoring and detailed audit trails that sensitive security and proper investigation of breaches demands,” said Thomas Schulz, Marketing and Communications Director of Digital and Access
Healthcare Facilities Adopt
Security Tech Trends In addition to traditional security solutions, healthcare facilities are adopting security tech trends to maximize efficiency.
BY Eifeh Strom, Freelancer
ealthcare is no stranger to cutting-edge technologies — they are often used to save lives, but what about within security? With healthcare budgets often limited for security purposes, yet at the same time requiring a high level of efficiency and effectiveness, adopting some of the latest security technology trends may just help healthcare managers achieve their goals. The global healthcare industry is expected to surpass the US$1.8 trillion mark in terms of manufacturer revenue in 2018, according to Frost & Sullivan. In 2017, digital health investments surpassed $6.5 billion, a 109-percent increase from the previous year. “This growth curve is expected to continue in 2018 as technologies and platform solutions that promote innovation around care quality, outcomes and chronic disease management will continue to rise. High growth opportunities in emerging markets will change the paradigms of product development and geographic rollouts,” the firm stated. We talked to several leading security companies to ask them what trends healthcare facilities are adopting. From video analytics to artificial
intelligence (AI) to the Internet of Things (IoT), healthcare managers are looking to utilize them all.
Video analytics has come a long way, although there is definitely still room for growth. Nonetheless, healthcare facilities are deploying video analytics to more effectively and more efficiently manage their security systems. “Cameras with self-learning video analytics are often selected for their accurate detection of people and vehicles in critical areas,” said Willem Ryan, VP of Global Marketing and Communications at Avigilon. “Combined with the advanced
search capabilities of technology like Avigilon Control Center (ACC) video management software, these cameras allow security operators to effectively monitor and verify surveillance video, helping to save time and effort during critical investigations.” In the event of a missing patient or suspicious individual, video surveillance with video analytics can help security staff to quickly detect, identify and track a person’s whereabouts across multiple locations, improving incident response time, Ryan said. “This evidence can be used to verify events during investigations, helping reduce false liability claims, prevent injury and save operational costs for the hospital.” Video analytics is also being used as a way of reducing the costs of security guards constantly monitoring cameras. “The use of video analytics eliminates the need for continual video monitoring and provides reliable event notification should security operators feel the need to intervene,” said Barbara Johansson, Global Solution Marketing Manager of Education and Healthcare at Axis Communications. To protect areas of the hospital where cameras cannot be installed, like restrooms, or change rooms, Ryan suggested advanced sensors be deployed to enhance situational awareness. “The Avigilon Presence Detector (APD) sensor is a discreet impulse radar device with self-learning radar analytics that scans, learns, and continuously adapts to its environment. It can accurately detect the presence of a person even if they aren’t moving or are hidden. When integrated with Avigilon Control Center (ACC) video management software, APD sensors are designed to alert security operators of a person’s presence while still maintaining privacy.”
Chad Parris, President, Security Risk Management Consultants
Willem Ryan, VP, Global Marketing and Communications, Avigilon
Gaoping Xiao, Director, Sales, APAC, AMAG Technology
improving workflow productivity, automating processes and increasing diagnostic accuracy. “By operationalizing AI platforms across medical imaging workflows that leverage advanced or deep learning capabilities, a 10- to 15-percent gain in productivity will be realized by augmenting the work of radiologists and improving screening outcomes. This is likely to happen over the next two to three years,” stated Frost & Sullivan’s 10 Healthcare Predictions for 2018. From a security perspective, healthcare facilities are increasingly looking to advanced AI technology to meet their security needs, according to Ryan. Solutions like Avigilon Appearance Search technology, a deep learning AI search engine, are being deployed to help operators quickly locate a specific person or vehicle of interest across all cameras on a hospital’s premises. “This technology is designed to dramatically improve incident response time and enhance forensic investigations by allowing operators to build robust video evidence and create a powerful narrative of events. Time is of the essence during an investigation and with the upcoming version of Avigilon Appearance Search technology, operators will be able to search for a person by selecting certain specific physical descriptions, like hair and clothing color, gender, and age and within seconds, find all instances of that person across an entire site,” Ryan added.
The Internet of Things
The Internet of Things is everywhere now, including the healthcare industry. “The IoT is revolutionizing the way we live and the number and variety of connected devices is growing exponentially…IoT-based security and access control devices
Use of Artificial Intelligence
Artificial intelligence has been a popular topic in security the last few years and according to Frost & Sullivan it is also expected to play a major role in the future of medical imaging by
Video surveillance cameras can now be used to deliver continuous, medical-grade contact-free vital signs monitoring.
In this article, a&s explores the features of three smart facial recognition cameras that exemplify the potential of AI and deep learning in this field to enhance accuracy and overall security. BY the a&s Editorial Team
acial recognition refers to the process by which faces are captured and matched to an existing database of face images. In the past, this was limited by software that can only work on still images or certain locations within a capture zone. However, todayâ€™s facial recognition cameras can recognize multiple faces simultaneously in video feeds for real-time monitoring and analysis. Through AI and deep learning models, smart facial recognition cameras show dramatically improved accuracy and performance despite everyday challenges such as long distances, low-resolution videos or situations when the faces are not directed toward the camera. These developments have changed how facial recognition is being viewed â€” from being a specialized tool to a more
as Powered by AI commercialized one, growing increasingly popular among businesses as it can improve operational efficiency and customer service along with protecting assets and people. In this article, we take a look at three facial recognition cameras and provide an overview of important specs, features and applications that can help one evaluate these cameras.
Cameras Under Review
The three cameras we have chosen for this review are the following (listed in alphabetical order): • Dahua Technology DH-IPC-HF8242F-FR Starlight face recognition camera • Hikvision Digit al Technology iDS-2CD8426G0/F-I DeepinView dual-lens face recognition camera • K E DAC O M I P C 2 2 5 5 - G i 4 N h u m a n recognitive HD camera On the surface, these cameras appear to be quite similar. These are 2MP (1920 x 1080 resolution) facial recognition cameras equipped with deep learning/AI processors. The three manufacturers (Dahua, Hikvision and KEDACOM) were also all reported to have used 2 to 200 million photos to train their respective deep learning algorithms. The three AI hardware platforms allow for easy searches and real-time facial recognition of people even
in motion, using facial attribute analysis for better accuracy. On closer examination, however, we see three distinct cameras with features that were incorporated for different applications. Therefore, we will not be comparing these three cameras based on one function or a simple benchmark. This product review will focus more on delving into each camera’s key features and components, highlighting differences that make one stand out from the other. We will do this by focusing on three important aspects: intelligent functions, imaging sensor and low light performance. Before we go further, it’s important to remember that no camera can yield optimal results if the installment is subpar. Proper placement and positioning of the camera itself, along with proper lighting, should be on the top of any systems installers/integrators agenda to minimize issues like motion blur or image noise. The three companies in this review have
Optimized Chips Push Machine, Deep Learning to New Heights The tech worldâ€™s obsession with artificial intelligence (AI) is driving companies to develop better, more optimized solutions for running machine learning and deep learning algorithms. The latest chips are not only making AI more available to various industries, they are also driving better efficiency and increased accuracy. BY Eifeh Strom, Freelancer
hen it comes to artificial intelligence (AI), 2018 is looking to be a year of significant growth. This is largely due to big steps being made in machine learning and deep learning. The deep learning market alone is expected to be worth US$1.7 billion by 2022, growing at a
compound annual growth rate (CAGR) of 65.3 percent during the forecast period 2016 and 2022, according to a report by market research firm MarketsandMarkets. The report cites the major factors driving growth as the robust R&D for the development of better processing hardware and increasing adoption of cloud-based technology for deep learning. When it comes to the hardware market for deep learning, MarketsandMarkets predicts a high growth rate due to the growing need for hardware platforms with a high computing power to run deep learning algorithms. This has also resulted in increased competition among established as well as startup players, leading to new product developments in both hardware and software platforms to run deep learning algorithms and programs, the report stated.
Evolving Chip Options
There are many chip options when it comes to machine learning and deep learning applications. These include, but are not limited to, GPUs, CPUs, VPUs, FPGAs (fieldprogrammable gate array) and ASICs (applicationspecific integrated circuit), all of which have machinelearning-optimized versions developed by the whoâ€™s who
of technology giants. For example, in 2016 Google announced they had developed a proprietary TPU (tensor processing unit) specifically for neural network machine learning. The TPU is an AI accelerator ASIC, specifically designed for Google’s open-source TensorFlow framework. In the second half of 2017, Huawei launched its Kirin 970 processor for mobile use, which has a dedicated NPU (neural processing unit). It seems as though every major tech company has developed its own processing unit, swapping out the the first
letter for new one. In a report titled Technology, Media and Telecommunications Predictions 2018, Deloitte expects GPUs and CPUs to still be the largest part of the machine learning chip market in 2018. However, Deloitte Global predicts that by the end of 2018, over 25 percent of all chips used to accelerate machine learning in the data center will be FPGAs and ASICs. “These new kinds of chips should increase dramatically the use of machine learning, enabling applications to consume less power
and at the same time become more responsive, flexible and capable, which is likely to expand the addressable market,” said the report. As a result, Deloitte predicts chip sales for machine learning tasks to at least quadruple in only two years. Still, though, GPUs are expected to make up the largest portion of chips used in the filed. Deloitte anticipates the market for GPUs will surpass half a million chips sold in 2018, over double that of 2016 which was estimated at 100,000 to 200,000.
Getting Beyond the Obstacles
Finding the right software and hardware components to properly run such data-heavy loads has long been an obstacle of AI. Now, leading companies such as NVIDIA, Arm and Intel are putting considerable resources into deep learning R&D to address these issues. We talked to some of the leading companies about the latest developments in deep learning hardware and how they are overcoming old challenges and breaking new boundaries.
NVIDIA Introduces Comprehensive Deep Learning Platform As a leading developer of GPUs, NVIDIA has taken on the role of producing some of the most advance processors for deep learning and AI applications currently available on the market.
VIDIA has long been a pioneer of GPUs, end-to-end solution for deep learning, which includes investing billions of dollars in R&D for each training and inferencing, that make it easy to develop new processor generation. As a result, and deploy cutting-edge solutions.” the company has enabled the industry to push the The company introduced NVIDIA Metropolis, a envelope of what’s possible with deep learning and comprehensive platform that includes hardware and other parallel computing applications. Today, NVIDIA’s software for the training and deployment of AI capabilGPUs have become a de-facto standard for modern ities for smart and safe city applications. AI and deep learning, currently used by all the major “NVIDIA Metropolis is an end-to-end platform for cloud service providers and system builders. intelligent video analytics that includes hardware and Deepu Talla, VP and GM of Autonomous Machines at software for the training and deployment of deep NVIDIA explained that there are two key characterneural networks. From NVIDIA GPU Cloud and DIGITS Deepu Talla, VP and GM, Autonomous Machines, NVIDIA istics of the NVIDIA architecture that are critical for software running on an NVIDIA DGX supercomputer, deep learning. “First, it must be high performing. The to TensorRT and DeepStream running on NVIDIA Tesla algorithms that do training and inference with neural and NVIDIA Jetson, NVIDIA Metropolis supports all of networks are parallel in nature and they require a parallel architecture to the latest frameworks and includes partner solutions for intelligent video deliver high performance efficiently. Second, it must be general-purpose analytics applications,” Talla said. programmable. Deep learning research continues to move forward, and To address video surveillance needs, Talla offered NVIDIA Jetson, the any architecture that’s not generally programmable will not be able to company’s solution for AI at the edge. “It’s a credit-card sized computing adapt to the latest innovations,” he said. module that operates under 10W, making it suitable for integration In terms of the challenges faced when running deep-learning-based inside an NVR or near a camera,” he explained. “Jetson shares the same solutions, Talla pointed to workflow difficulties. “Deep learning is a GPU architecture as the rest of NVIDIA’s products, and it’s part of the new model for computing, in that the computer effectively writes Metropolis platform. NVIDIA also provides NVDLA, a deep learning its own software through the process of training a neural network, accelerator for interference that is free for all chip companies to integrate and if you don’t use the right tools you get suboptimal results,” he deep learning into their IoT and camera chips. It’s never been easier to explained. “NVIDIA’s GPUs are designed specifically to solve parallel develop and deploy solutions for smart and safe cities all the way to the computing problems, like deep learning, which represent some of the camera.” toughest challenges in computing today. Additionally, NVIDIA builds an
Getting Data and Power Delivered With Transmission Needless to say, transmission is a critical component in the video surveillance system of a large site. Choosing the right transmission equipment, therefore, is of vital importance. With a migration toward IP-based video surveillance, a lot of users find Ethernet-over-coaxial (EoC) solutions helpful and cost-effective. BY William Pao
ransmission plays a critical role in video surveillance. Getting video transmitted from the IP camera to the NVR in an uninterrupted manner is key to large-scale end-user organizations as they maintain situational
awareness and secure their staff and properties. Besides data, the transmission infrastructure also serves as a medium for delivering power. Technologies such as powerover-Ethernet (PoE) and power-over-coaxial (PoC) enable the delivery of
power over the transmission infrastructure, be it IP- or coaxial-based. In particular, PoE has become the primary method of supplying power to the IP camera, which gets its power from Ethernet rather than from an individual power source. With IP
surveillance becoming the mainstream, PoE products and equipment have seen strong growth. A research study by MarketsandMarkets suggested that the PoE solutions market is expected to grow from US$451.1 million in 2015 to reach $1 billion by 2022, at a CAGR of 12.6 percent between 2016 and 2022. “The increasing adoption of the PoE technology for supplying electricity to powered devices due to its advantages such as low cost of installation, high convenience and reliability has led to the rise in the demand for PoE power sourcing equipment and PoE-compatible powered devices, thereby leading to increase in demand for power-over-Ethernet solutions,” the report said. “The power-over-Ethernet solutions market for powered device (PD) controllers and ICs is expected to grow at the highest rate between 2016 and 2022. This market growth can be attributed to the increasing demand for PoE-enabled powered devices, especially VoIP phones, wireless access points and IP cameras.”
By region, the report cited that North America held the largest share of the PoE solutions market in 2015, followed by APAC and Europe. “The high growth of the market in this region can be attributed to the increasing demand for PoE controllers and ICs due to the presence of a large number of PoE power sourcing equipment as well as powered device manufacturers in North America,” it said.
What Users Are Looking For
For large sites such as utilities, airports and solar power plants in deserts, transmission equipment deployed in the field can be miles apart from each other or from the command and control center. Sending individuals to check upon each piece of equipment can be costly and laborintensive. Therefore, allowing operators to check the status of the equipment remotely is important in large installations. “If you can’t remotely monitor it, you need to send people to the site locally, and this requires cost and labor. That’s why many large system operators have moved to a managed environment. For example, if there’s a switch in a site that suddenly changed to receive a lot of data, you need to give more bandwidth to a particular type of data such as video in that switch to avoid data loss. If you can remotely do it, you don’t have to send people over
there,” said Kelvin Chan, Senior Product Manager at OT Systems. “Our solutions not only manage switches remotely, we provide surveillance device management software that is embedded in each switch.It has an intuitive GUI that allows the user with a normal PC to manage, control and monitor the equipment. The user can use PC to monitor or control the system without special training. As a result, technical people or manpower required to maintain the system can be reduced.” Reliability, meanwhile, is another critical element in transmission, as delivering power and critical data seamlessly without any interruption or downtime is heavily demanded by largescale end users, many of whom operate in harsh, inclement weather conditions. In manufacturing facilities, corrosive chemicals are present. Having equipment that is hardened and able to resist these conditions is therefore key. “Operators need transmission equipment with high reliability and stability according to their operating conditions. The equipment should be hardened and may resist hazardous environment, or operate within a harsh environment,” Chan said. “For example in utilities, they may operate in an outside environment, so the equipment should work in a temperature range between -40 to 75 degrees Celsius.”
How to Determine Network Topology for a Particular Project Transmission plays a significant role in the security system for large sites. Not only should the transmission equipment be hardened and reliable, the way transmission is set up to ensure optimal data and power delivery is also key.
hat said, choosing a network topology needs to be factored in during the design process. There are various network topologies, or how devices and transmission equipment are arranged in a security system. The three primary topologies are bus, star and ring, each with strengths and weaknesses. In a bus topology, all nodes or devices are connected to a main cable through which data gets transmitted from one point to another. Since only one cable is involved, it’s relatively easy and inexpensive to install. But then, since there’s only one cable, a failure on one device causes the whole system to fail. A star topology, meanwhile, features a central node — either a hub or switch — that connects to various devices in a point-to-point fashion. All data goes through the switch, which then passes the data to the intended recipient. It is easy to install and expand as the user needs to add just one cable to connect an additional camera to the system. However the star topology can be expensive, as a separate cable is required for each device. Meanwhile, since all data goes through the switch, it is the single point of failure. If it goes down, so does the system. The ring topology is by far the most reliable. All devices are connected in a ring. If one device in the ring fails, the data gets rerouted to a redundant ring and gets to the intended destination. Selecting which topology to deploy is dependent on various factors, including the application itself as well as the user’s budget and reliability requirement. “For the bus technology, the devices are connected in a sequence; examples include highways. The star topology is point-to-point connection, so it will be suitable for devices connected to a single-point location such as the control room,” said Kelvin Chan, Senior Product Manager at OT Systems. “It also depends on the system reliability requirement,” he added. “The bus is simple and costs less, but there is a reliability issue, as the failure of one node causes the whole system to fail. The star topology provides better system reliability. However, if the central point fails, the system still fails. Ring costs less than star and offers the best system reliability — if one device fails, another will pick up the drop.”
Smart City Solutions: Following the
Wireless technologies are an integral part of smart cities. At present, there are several wireless protocols in the market that are either competing or complementing each other. Here is a look at what systems integrators should know when selecting one.
Wireless Protocol Proto G
BY Prasanth Aby Thomas, Freelancer
overnments across the globe are increasingly becoming interested in the concept of smart cities. According to data from MarketsandMarkets, the smart city market will grow to US$1.2 tillion by 2022 from $424.7 billion in 2017 at a CAGR of 23.1 percent as connectivity technologies and telecommunication systems grow rapidly to support hyper-urbanization.
Pankaj Vyas, R&D MD, Telit
Julian Watson, Principal Analyst, IoT, IHS Markit
Understandably, wireless connectivity is an integral part of smart city development and for best results, it is important that solutions are based on the best available wireless protocols. To this end, wireless solution providers are experimenting with various systems to offer customers the best product. At present, there are several major wireless protocols that are gathering interest and customers are still not sure which among them would eventually become a dominant protocol. Perhaps it would be safe to say that we are still in the preliminary stages of smart city development and it would take considerable time before the market is able to point out a single major protocol. However, a closer look may tell you that things are not quite simple as it looks.
The Protocols in the Market
Although there are several promising technologies in the market, some experts have made a list of protocols that could be considered better than the rest. According to a recent research paper published by Gaurav Sarin of the Delhi School of Business, the five key protocols are 6LoWPAN, Zigbee, BLE, CoAP and MQTT. Others add protocols like Z-Wave, Wi-Fi, cellular, LoRaWan, SigFox, NB IoT, etc. The major factors that could decide which among them will gain popularity over the years would range from security and power demands, battery life and data requirements. According to Sarin, among the protocols that he pointed out, 6LoWPAN is the most prominent for city-level usage. Being able to support vast numbers of devices across large areas like cities, this protocol is considered ideal for low-power devices that transmit tiny amounts of data. But while such suggestions are valid when it comes to the larger picture, from a systems integrator’s perspective the question would be what unique roles each of these protocols must play in different applications. The fact that many of these protocols are suited for different applications throws up the question of whether one can actually be more popular than the other.
Would a Single Protocol Dominate?
What to Remember When Selecting Protocol Finalizing on a wireless protocol can be tricky for a systems integrator (SI). Special care must be given to various aspects to ensure that the solution deployed is adequate for the needs. According to Pankaj Vyas, R&D MD at Telit, there are six main points that SIs should keep in mind. They are: Cost: This refers to the expenses of setting up the network. While smart city projects are often government-funded and big-budget, SIs have to ensure that the costs do not get out of hand. Ease of Deployment: In this regard, the questions SI has to ask are whether the set up would require highly skilled personnel to operate, would it be easily programmable, how difficult it would be to access the system over the cloud, etc. “If you are a system administrator, you wouldn’t want to be burdened with finding manpower to just deploy this network,” he said. Maintenance: Close to this factor is the third point, which is how easy it is to maintain the network. Will the administrators need to check through each and every device to know how the status of the network or will it be possible to have a central monitoring and controlling system? This question becomes extremely crucial in the case of smart cities where multiple technologies and devices need to be integrated to work together. Scalability: A network may work well within a limited area, but if it has to be expanded further, would the technologies that are in use support it? Future-readiness: SIs also have to consider how “futureready” the protocol is. “You have to make sure you take care of what would come up in the future,” Vyas said. “Today you may not have many electrical vehicles on the streets and things like drones are yet to become that common. But we know that things are evolving faster than before.” Security: Above all, the single most crucial point that SIs should consider according to Vyas is security. Before going for a particular protocol, careful thought should be given to how secure it is for any application. “As a system administrator, you would not want to get calls in the middle of the night saying someone has accessed the city lighting system or the water distribution system,” Vyas said.
When looking at the various protocols available in the
Whatâ€™s Cooking in the
Smart Tra Industry? The hospitality industry is getting more competitive than ever. Against this backdrop, hotels are seeking to differentiate themselves by offering cutting-edge service to guests. With the arrival of IoT, hotel operators are now able to use connected devices and the data they generate to maximize the guest experience, at the same time achieving further operational efficiency and energy savings.
ith the number of private vehicles continuing to rise in most cities and governments eager to implement concepts such as smart cities to improve operational efficiency, the idea of smart traffic management is rapidly gaining traction. Authorities in several cities are concerned about traffic congestion and traffic avoidance, among other things. Intelligent traffic management solutions are expected to provide an answer to all that. According to the research firm MarketsandMarkets, the global traffic management market is expected to grow to US$ 59.5 billion by 2022 from $23 billion in 2017 at a CAGR of 21 percent. The factors driving this growth include hyper urbanization, especially in developing economies, and a high demographic growth. Smart city initiatives are also expected to boost the growth of the market.
Steve Birkmeier, VP, Sales and Business Development, Arteco
Current Trends Being Seen
Akif Ekin, President, Ekin
Industry experts are quick to point out that safety is a major concern on the roads, not just
affic ? The traffic management market worldwide is expected to grow at 21-percent CAGR over the next four years. Here is a look at the major trends in this industry and how systems integrators should go about strengthening their presence in it. BY Prasanth Aby Thomas, Freelancer
due to accidents but also due to violence in the form of attacks against people traveling in vehicles. While security is probably the major driving factor in this industry, the potential benefits that go beyond offering protection have been becoming popular as of late. “In alignment with the growing popularity of smart cities and intelligent technology, users are looking to simplify and prioritize traffic management,” said Steve Birkmeier, VP of Sales and Business Development at Arteco. “The primary goal of achieving uniform safety for people and assets still exists, especially as we’re witnessing more violence and attacks by vehicles, but the advancements in analytics and big data have driven users to desire in-depth and detailed data that can be used for more than just security.” Birkmeier added that his company is seeing license plate recognition (LPR) technology become a large component of traffic management, as there are many areas in which it can be applied: access control, crime prevention and control of territory, employee time/attendance monitoring, etc. Stakeholders are seeing a reduction in total cost of ownership and increased return on investment (ROI) by choosing to invest in a solution that enhances intelligence, management and flexibility. Speaking on a similar note, Akif Ekin, President of the safe cities solution provider Ekin, pointed out that the Consumer Technology Association projects global spending on smart cities will reach $34.4 billion by 2020, as more cities seek proactive solutions to longstanding issues, such as traffic. “Traffic management is a central component to smart city development and the technology that supports it will continue to dominate the future of the industry,” Ekin said. “Law enforcement agencies tasked with managing traffic flow and safety are seeking more proactive solutions that prevent traffic issues before they happen.” For example, LPR reduces the time and headache of identifying violators who disrupt the flow of traffic, Ekin added. When this technology is coupled with solutions that offer mobility and citywide connectivity, law enforcement has the ability to not only detect a violation but also can
By a&s SMAhome
Mobile App and Intercom Essential in Smart Residential Communities
Smart home is about making lives easier. It’s about connecting home devices, door locks, sensors to the internet so they can talk to one another. But the so-called Internet of Things (IoT) will have various application modes, depending on the type of residence where it is applied.
oT is applied differently in a single house versus in an apartment. In the former, a smart home is set up within a single household. In the latter, there are public spaces, equipment and facilities that are shared among residents in an apartment building. As such, the concept of IoT is implemented with its unique characteristics in a residential community. In order to pool information and make it available for all residents in a community, a mobile app is often used. Smart home enabler Vivint, for example, recently introduced the Streety app that allows homeowners to view video footage from their neighbors’ security cameras. In a standard smart home deployment, users can only watch footage from their own cameras. With the Streety app, however, homeowners can watch footage or live stream from all participating cameras in a community, thus greatly enhancing their visibility. “When something happens like a bike is stolen, sometimes you have a good angle, sometimes you don’t, depending on where your cameras are,” said Colby Winegar, VP of Strategic Business Development at Vivint. “It’s a very cumbersome process if you have to go down the whole neighborhood to get the clips.” Through a network of shared residential cameras, the Streety app allows users in a community to keep an eye on their kids, cars and property
through live video feeds and use recorded video clips to investigate incidents. Sfty, a startup based in Norway, has developed a fire detection system that similarly pools resources in a community. The Sfty system links smoke detectors in every apartment in a building. And when fire is detected in one apartment, alerts are sent to other residents in the building via the Sfty app. Since the residents are notified early, they have sufficient time to evacuate the building, according to Espen Schrøder, COO at Sfty. Because the Sfty system knows exactly from which apartment the fire started, the fire department will know where to go first, Schrøder added. The internet-connected smoke detector also has a motion sensor built-in to detect burglary. When motion is detected in one apartment, a neighbor next door may also be notified through the Sfty app. The neighbor can then verify if there was indeed a burglary by checking if the apartment’s door has been opened. “Sfty’s all-in-one safety device has smoke detector, burglar alarm, temperature sensor and humidity sensor functionalities. You can invite friends, family and neighbors to your network to monitor your device and be notified in case of an alert,” Schrøder added.
App As service portAl in ApArtments A mobile app can also be utilized to manage access control in an apartment. Malaysiabased apartment solution provider i-Neighbor developed an app to turn a resident’s smartphone into an elevator or garage access card. With the app, a resident will only be able to get off on his
or her floor and common areas. The mobile app can also serve as an intercom to speak with visitors at the front door. Also, there is a panic button functionality in the app to instantly contact security or emergency contacts in case of an emergency. In fact, the mobile app has more than 20 functionalities to provide apartment-related services. Among them is facility booking for a gym, badminton court, etc. i-Neighbor also makes hardware like smart locks, which, if installed on a public facility, can be unlocked via the mobile app during the booked period. i-Neighbor’s Business Development Manager Aiden Teh said the company’s competitiveness lies in the hardware development capability enabled by its parent company Fingertec. As an access control solution provider, Fingertec has been selling hardware products for 18 years, Teh said.
intercom As the User interfAce Another device that is commonly deployed in apartment buildings is intercom, which allows residents to talk to neighbors or call the management. In terms of security capability, the intercom also has access control, alarm system and surveillance functions. “Intercom is the user interface to provide apartment services and the portal of smart buildings,” said Joel Liu, VP of Taiwan-based smart building solution provider HomeScenario. HomeScenario’s intercom allows residents to
espen schrøder, COO, Sfty
Aiden teh, Business Development Manager, i-Neighbor
Joel liu, VP, HomeScenario
see and talk with their visitors before unlocking the door. Upon granting access, the elevator will be triggered to go to the first floor for the guest, who may reach only the resident’s floor, Liu said. To offer surveillance, the intercom may be used to view live video feed from a security camera. In addition, HomeScenario’s intercom also has a panic button and can send push notifications to smartphones of loved ones if there is an accident. AmRoad Technology provides a very similar intercom system, which is designed to integrate functionalities from SOS button, camera monitoring, door access, to facial recognition and license plate recognition. “Layers of functionalities may be added one by one per client demand,” said James Su, President of AmRoad. Su pointed out that a fire or life-threatening accident requires much faster response time. The intercom, beside being a smoke detector, can record an SOS voice message to pass to family members. The company uses the SIP protocol, which is used in telephones, to send the SOS message. “A phone call to another country will always connect, but it may not be the case if the call is made via computers,” Su said. Wi-Fi connection may be suitable for public notices in which great amounts of data are broadcast while immediate transmission is not required, he explained.
the proActive cAmerA Cameras play important roles when it comes to maintaining home security. They are deployed in almost all communities. Netherlands-based Amaryllo International offers IP cameras that take a proactive approach to prevent intrusion or burglary, according to the company’s president CT Marcus Yang. The cameras are embedded with high-power CPU to perform visitor auto tracking. The cameras’ AI can distinguish people, animals and different faces instantly. “The camera will say ‘Hello’ when it sees a visitor, recognizes who you are, so that a potential thief or burglar knows he or she is being monitored,” Yang said.
▲ When a fire is detected in one apartment, alerts will be sent to other residents in the building via the Sfty app.
asmag.com PRODUCT FOCUS To view the most updated and complete content for new products, please visit the “Products” section of our website at www.asmag.com. For more information, contact firstname.lastname@example.org
New Products Electronic Locks-VingCard E100
Addressable Fire Alarm Control Panels ES-50X
ASSA ABLOY Hospitality/Sweden Key Features • Supports narrow style doors (down to 40 mm backset) • Rugged stainless steel finish • Suitable for mixed VingCard installation • Cylinder cut-outs for DIN • Quick and easy installation • Fully compatible with Visionline and Lock Service Email: email@example.com
AXIS P1280-E Thermal Network Camera Axis Communications/Sweden Key Features • 208 x 156 resolution • Field of view of 35 degrees • Thermal technology for low rate of false alarm • Functional and highly discreet design • For indoors and outdoors Email: firstname.lastname@example.org
Johnson Controls/U.S. Key Features • Maximize SmartStreaming resources by accepting triple video streams from the camera to the NVR • Save investigation time by accessing alarm-related video and tools in pre-defined layouts with event assess • End-to-end multicast adds the ability to view cameras directly from a victor client when an NVR is undergoing system updates • H.264+ support manages higher resolutions while reducing necessary storage space • VideoEdge TrickleStor provides cost-effective redundancy by storing video on select Illustra cameras when network connection is lost Email: Ryan.P.Nolan@jci.com
iAuthenticate 2.0 OtterBox iOS VideoXpert Enterprise Video Smart Card Reader Identiv/U.S. Management System
COSEC VEGA FAX Biometric Employee Time Tracking System
Matrix Comsec/India Key Features • Multiple connectivity options for communicating with the server: Ethernet/Power over Ethernet (PoE)/built-in Wi-Fi • Multiple interfaces for different applications: door relay and door sense/auxiliary input and output port • Higher capacity for managing up to 50,000 users • Perform applications using device APIs • Proximity and smart card Email: More@MatrixComSec.com
Mobile Network Video Recorder G-Scope 500+
Geutebrück/Germany Key Features • Officially certified for mobile use in and on vehicles (EN50155 and EN50121-3-2) • 3.3 kg and with slim dimensions of 240 x 225 x 79 mm • Reliable at temperatures between -25°C and +70°C and air humidity of 10 to 90 percent • Up to 4 cameras with M12 x-coded connectors or up to 8 cameras with RJ45 connectors can be connected to PoE ports • Has an enormous memory of up to 4 TB Email: email@example.com
Honeywell/U.S. Key Features • Upload/download panel programming database and flash firmware with USB thumb drive • Built-in Class-A capability for all 4 NACs; no optional card required • Pre-installed IPOTS-COM Ethernet IP and POTS (plain old telephone service) central station communicator • Integrated SWIFT display driver and annunciator built-in to panel • Addressable multi-criteria detector (smoke, heat, CO) with programmable response Email: firstname.lastname@example.org
VideoEdge IP Network Video Recorders
Key Features • Ruggedized, physical protection for devices meets strong two-factor authentication and security for data • Enables the use of smart cards to eliminate complex passwords and password management • Doubles up as a desktop CCID smart card reader and can be used with Windows, MacOS and Linux machines via the microUSB port (cable not included) • Reader and card sit behind the iPhone, offering maximum operational convenience for the user • Securely access corporate resources, including email, files and data Email: email@example.com
UHD Intelligent 4K Bullet IP Camera
WAMA/Hong Kong Key Features • Sony 1/2.5" 8 MP CMOS sensor • Triple streams (H.265 / H.264 / M-JPEG) • Built-in video analytic functions • Automatic network replenishment (ANR) • Day/night (ICR), T-WDR (120dB), 3DNR, AGC, defogging Email: firstname.lastname@example.org
IXM TITAN FV Series
Invixium /Canada Key Features • Finger vein patented technology from Hitachi • 1 Million templates (500,000 users) – 1:1 • 2000 templates (1,000 users) – 1:N • Temperature: -25ºC to +75ºC • IP67 and IK10 Email: email@example.com
Pelco by Schneider Electric/U.S. Key Features • Eliminate single points of failure and ensure reliability though faulttolerant software, distributed architecture, and multiple levels of redundancy • Flexible scale with reliable modular architecture • Migration paths for Endura and Digital Sentry systems • ONVIF Profile S compliant • Aggregate VMS networks and manage all video through a single system Email: firstname.lastname@example.org
Cruiser SN673V-C Outdoor PTZ Dome Camera Vicon Industries/U.S. Key Features • High-resolution day/night camera optics • H.264-M-JPEG or MPEG-4 compression • 20X optical zoom; 16X digital zoom • True wide dynamic range (WDR) – 120 db • Triple streaming • ONVIF compliant Email: email@example.com
Barix AG/Switzerland Key Features • Shoutcast / Icecast source capability • Audio level supervision with SNMP trap generation • IP streaming via TCP, UDP, RTP, multicast • Isolated power supply input (PoE or ext) • Microphone input • Amplified output 8W (8 Ohm) Email: firstname.lastname@example.org
Show Calendar Appearance Search Technology
WORLD SECURITY EXHIBITION DIRECTORY
Avigilon /Canada Key Features • A sophisticated deep learning artificial intelligence (AI) search engine for video • Quickly search for a person or vehicle of interest • Search capabilities includes face signatures • Refine searches based on time and camera location • Playback, bookmark and export tools Email: email@example.com
Exhibitions marked with ★ indicate a&s portfolio's scheduled participation. See a&s personally at these shows. Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_ events.aspx.
HE-1101 HDMI/VGA Video Encoder
• Date: 2018/05/14—05/17 • Venue: Santa Clara Convention Center, Santa Clara, CA, U.S. • Tel: +1-646-616-7610 • Email: firstname.lastname@example.org • URL: tmt.knect365.com/iot-world
IDIS/Korea Key Features • Ease integration with third-party system • Supports HDMI and VGA input ports • Supports mouse and keyboard control from remote site • Quadruple streaming • Specialized in DirectIP NVR Email: email@example.com
Fingerprint Smart Lock
Jin Tay Industries/Taiwan Key Features • Fingerprint sensor: capacitive type sensor • Fingerprint capacity: 20 fingerprints (standard) • Battery life: 2 years or 3,000 lock/unlock actions • Power saving: wake-up sensor • Low battery alert: supported Email: firstname.lastname@example.org
TPH 6000-WP Extreme Weather Protection Enclosure
Unitechno/Taiwan Key Features • At -15ºC to -70ºC city power or 24Vac shut down protection device • Super high power 850 nm IR LED • Pressure die-cast aluminum alloy construction with light ivory powder coating and stove finished • 60 mm lens window tempered glass, suitable for indoor/outdoor installation • Equipped with IP68 cable glands, pre-fitted spare terminal and fuse block Email: email@example.com
Smart Door Lock
United Integrated Service/Taiwan Key Features • H.264 Video • Two-way voice • E paper display status • Day/ night version • Connect to gateway (Wi-Fi) • RFID • Battery life: one year Email: firstname.lastname@example.org
2-Port Serial to Ethernet & Wi-Fi Converter KSH INTERNATIONAL/Taiwan Key Features • Two ports RS-232/422/485 auto select • Supports 802.11b/g/n and Ethernet, 2 IPs • Operation modes : TCP server; TCP client; UDP • Built in 15KV ESD protection for signals • Web browser configuration • Online F/W upgrade Email: email@example.com
INTERNET OF THINGS WORLD
IFSEC PHILIPPINES • Date: 2018/05/30—06/01 • Venue: SMX Convention Centre, Pasay City, Metro Manila, Philippines • Tel: +44-03-2176-8788 • Email: Syamsul.Razak@ubm.com • URL: www.ifsec.events/philippines
ADRIA SECURITY SUMMIT • Date: 2018/09/12—09/14 • Venue: Ljubljana Exhibition and Convention Centre, Ljubljana, Slovenia • Tel: +387-33-788-985 • Email: firstname.lastname@example.org • URL: www.adriasecuritysummit. com/index.php/en
SECURITY ESSEN • Date: 2018/09/25—09/28 • Venue: Messe Essen, Essen, Germany • Tel: +49 (0) 201-3101-444 • Email: email@example.com • URL: www.security-essen.de
6 10 11 8 9
• Date: 2018/06/19—06/21 • Venue: Excel, London, U.K. • Tel: +44 (0) 20-7921-5000 • Email: firstname.lastname@example.org • URL: www.ifsec.events/international
• Date: 2018/06/26—06/28 • Venue: Marina Bay Sands, Singapore • Tel: +65-6233-6688 • Email: email@example.com • URL: www.communicasia.com
IFSEC SOUTHEAST ASIA • Date: 2018/10/25—10/27 • Venue: IMPACT Exhibition & Convention Center, Bangkok, Thailand • Tel: +6-03-2176 8788 • Email: firstname.lastname@example.org • URL: www.ifsec.events/sea
• Date: 2018/08/16—08/18 • Venue: Saigon Exhibition & Convention Center, Ho Chi Minh City, Vietnam • Tel: +886-2-8729-1099 ext. 768 • Email: stvn@newera. messefrankfurt.com • URL: www.secutechvietnam.com
• Date: 2018/08/31—09/05 • Venue: Berlin ExpoCenter City, Berlin, Germany • Tel: +49-30-3069-6924 • Email: email@example.com • URL: b2b.ifa-berlin.com
• Date: 2018/11/06—11/08 • Venue: Stuttgart Trade Fair Center, Stuttgart, Germany • Tel: +49-711-18560-0 • Email: firstname.lastname@example.org • URL: www.messe-stuttgart.de/ vision/en
• Date: 2018/11/08—11/10 • Venue: Bangkok International Trade & Exhibition Center (BITEC), Bangkok, Thailand • Tel: +886-2-8729-1099 ext 215 • Email: email@example.com. com • URL: www.secutechthailand.com
Integration the Remedy for Best Healthcare Security