Preview

laser security

Good Essays
Open Document
Open Document
1137 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
laser security
Sagar Institute of Science & Technology, Bhopal

Department of Electronics and Communication Major Project On Laser based security system

STUDENT’S BY Under the guidance of
Satyendra Choudhary Mrs. Deepa Gyanchandani
0187EC101095
Nikhil Solanki
0187EC101066

Contents
Introduction
Objective
Methodology
Block Diagram
Datasheet
Circuit Diagram/Flowchart
Results
Bibliography

Introduction
The Vumii Discoverii security platform is used in border security systems, airports, ports, waterways and nuclear power plants around the world. It has a reputation for reliable security and is also used by the US Department of Energy and the Department of Defense.

Unlike conventional night vision technologies that rely on moonlight, proximity and/or significantly more costly equipment, Discoverii uses continuous wave laser illumination, electro-optics and image processing to provide clear pictures in zero light or full daylight.

"We needed the tools to bring back the image and control the system in the embedded PC," said Dan Russotto, Vice President of Product Strategy at Vumii. "The Python product delivered on, and exceeded, our expectations."

Discoverii provides unprecedented target recognition and identification, with excellent natural contrast image resolution and magnification out to 3000 metres. Unlike with IR thermal imagery, Discoverii produces grayscale video in which people look like people and words and numbers are legible. Discoverii also provides visibility through rain and other inclement weather.

With the assistance of Georgia-based Rep Technology, the engineering team at Vumii selected the VersaLogic Python single board computer (SBC) for its laser-based security system because of its proven versatility in the field and its rugged dependability.

You May Also Find These Documents Helpful

  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Security is embraced by the executive management staff at MJD Electronics. An important task for the Chief Security and Compliance Officer for MJD Electronics is to outline a plan that makes considerations for many of the important aspects of valid security architecture. This discussion presents more detailed information on many topics that should be included in a solid security architecture including border routers, demilitarized zones, proxy firewalls, access control lists and filters, fail-safe equipment, and more.…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    What Is Sentry360?

    • 241 Words
    • 1 Page

    High definition, wide-dynamic range, embedded in al Sentry360 monitoring systems, ensures that you have usable footage at all times, even when visibility conditions…

    • 241 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 9 Lab Report

    • 2537 Words
    • 11 Pages

    International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 3, June 2012 www.ijcsn.org ISSN 2277-5420 On Line Real Time Health Monitoring of ICU Patients using ARM7 1 1 Mrs. Rajashri Patil , 2Prof. Balaji Hogade Electronics Department, Datta Meghe College Of Engg , Airoli , Navi Mumbai , Maharashtra 400708, India 2 Department of Electronics, Terna Engg College, Nerul, Navi Mumbai , Maharashtra , 400708 , India…

    • 2537 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Edweard Muybridge

    • 439 Words
    • 2 Pages

    | |then alongside Marey, shows these photos using a Uchatius lantern and could possibly have acquired picture-motion this way. The Zoopraxiscope has been, albeit rarely, called |…

    • 439 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Securing Military Gear

    • 5047 Words
    • 21 Pages

    The definition of sensitive items is anything that considered classified or a mission essential item. They range anywhere from protective wear, maps, patrol routes, nods (night vision goggles) or simply your weapon. The meaning of securing your sensitive items mainly is maintaining accountability for opsec (operation security), mission success and a soldiers overall readiness. If an item is lost and the enemy gets his/her hands on that item it could compromise the mission at hand or give them intelligence on the items we as soldiers use each day. Using habits and exercising the securing of sensitive items will make it possible for the soldier and his or her team to operate at the top performance. Operational security is process that denied valuable information to an enemy. If an enemy were to obtain the presented it could be used against our forces. Not securing sensitive items increases the risk of loss by being intercepted by unauthorized personnel. Every soldier must maintain accountability and positive control of all sensitive material to allow full use by them and anyone involved with the mission at hand while still maintaining operational security. Operational security can be compromised through the loss of sensitive items due to loss of equipment used for operational planning, or items used for support missions. Also depending on the type of sensitive item that is being classified it could fall under a different level of security as it is deemed so by the U.S. Government. The levels included in the term classified are restricted (public disclosure could have undesirable effects or do some harm), confidential (unauthorized disclosure could damage national security example would be compromising information that indicates the strength of armed forces or disclosure of technical information about weapons), secret (unauthorized disclosure could seriously damage national security) and top secret (unauthorized disclosure could…

    • 5047 Words
    • 21 Pages
    Good Essays
  • Better Essays

    The CBP drone program has tightened its grip to ensure that border security is emphasized. The system supports security relief efforts for its DHS partner by streamlining Federal Emergency Management Agency (FEMA) operations. OAM further expects to employ Predator B drones to all border regions with the command and control from a network of underground stations. Predator B is capable of providing high quality streaming video to first responders, and this is assessed through the proper usage of critical infrastructure. Secure Border Initiative (SBI) focuses on the role of operational requirements to support and document the acquisition efforts to develop, integrate technology and deploy tactical infrastructure to support CBP efforts to gain and maintain effective control of U.S land border areas (Goodyear, 2013, pp.…

    • 1031 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The Army has made drastic improvements towards engineer breaching capabilities throughout the years. From using the most basic of hand tools to mechanical and explosive breaching, the type of method to use is ever changing. Every person has there preferred method, but most prefer to use the explosive breaching method.…

    • 1002 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Fun Facts on Laser

    • 411 Words
    • 2 Pages

    What kids haven’t played with lasers? We have all loved the laser fights in movies like Star Wars. Who wouldn’t want wield a laser around while fighting an enemy. Did you know that the term laser came from an acronym meaning “light amplification by stimulated emission of radiation.”? It should actually be all capitalized but for simplicity it isn’t.…

    • 411 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Kodak vs Fugi

    • 1591 Words
    • 7 Pages

    Article. “Innovations Lead Fujifilm to Two New Technology Awards” 9 October 2012, 3 November 2012.…

    • 1591 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    The infrared and thermal imaging systems market mainly depends on the military sector. But the military budget cuts in the U.S. and Europe, and issues with procurement timings in various defense programs such as soldier modernization programs, have resulted in a market push towards the commercial sector.…

    • 1484 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Air Canada Takes Off with

    • 416 Words
    • 2 Pages

    * Matintenix provides a system platform that is accessible via the Web and easy to deploy to all stations around the world. Mxi claims that their software reduces repetitive tasks and time chasing missing or incomplete information by allowing maintenance, engineering, and finance divisions to easily share information.…

    • 416 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The report “Image Sensors Market Analysis And Segment Forecasts To 2020,” is available now to Grand View Research customers and can also be purchased directly at http://www.grandviewresearch.com/industry-analysis/image-sensors-market…

    • 647 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Date to be pass: July, 2013Reasearch Teacher: Mrs. Norma Lyn GarciaSignificance:This study aimed to develop a laser detector, which is able to detect unexpected visitor to prevent safety on every household. The laser light activated alarm has three main parts: a) laser, b) mirror, c) light activated alarm. This device has been developed to construct a reliable protection system.The study compares the difference of laser light activated alarm to the other commercial detector.There were several test of effectiveness of the device in terms of its ability to warn owners with the loudness of sound, amount of the energy used and percent of accuracy. The cost of the device was also considered for to prove the acceptability of the device.The device was developed to use a light activated alarm which has detecting diode or the photocell, which turns the device on when the photocell (sensor) detects light.The experiment prove that the Laser Light Activated Alarm produces the competitive sound intensity of 90 -100 dB and the cost of energy consumed of P 2.07 an hour. The commercial cost of P 1,000 was proven to have a lower commercial price than the other two commercial detectors. The ideal laser position was traced to complete the whole operation. Data of different commercial alarms were gathered to be compared to the newly developed Laser light Activated Alarm. It was made from the cheapest material, which performs its tasks better than the commercial detection alarms with the same concept.The Laser Light Activated Alarm was proven to be convertible enough to fit on any sizes of…

    • 709 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Load Calculation

    • 1266 Words
    • 6 Pages

    * To have NUE ready fully updated server hardware and server software automation system components with cost effective price.…

    • 1266 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Honeywell Fusion 3 Dvr

    • 1862 Words
    • 8 Pages

    Changes in security environments are simplified by the use of Fusion digital video recorders. All Fusion DVRs use the same software platform, offering compatibility across the entire line. Never has a digital…

    • 1862 Words
    • 8 Pages
    Better Essays

Related Topics