ILLUMINATED INDICATOR BOARD WITH CREEPING LINE «BYUREGH»

«BUREG» is the microprocessing software-controlled equipment with the display, composed of light-emitting elements  blocks(LEEB). Each LEEB is the matrix with 16 lines and 16 elements.The LEEB amount may be from 4 to 512 number, on the customer’s order. It’s can be arranged  in one  or few  lines. On the display is possible to paint the alphabetic-digital information with the punctuation marks and graphic information. It is possible to use Armenian, Russian, English letters and digits of three sizes (8, 13 and16 elements height).

Information to the board  is transferred as static information with given time interval and creeping line:

  • from right to left;
  • from left to right;
  • from up to bottom;
  • from bottom to up;

 The different effects are possible too.

The device has got memory, with autonomy feeding, that  allows to storage the last information at switch off. The entering of information to the board is carried out from the PC, compatible with IBM PC, through triple-core cable with sequence port RS 232.In case of need, entering of information is possible to carry out by phone or wireless communication via telephone modem or radio modem correspondingly.

Three modifications of unicoloured («BYUREGH-U») and two multicolored («BYUREGH-M»)  are produced:

 » BUREG-U   15/5″;   » BUREG-U    7/5″;   » BUREG-U  15/12″;
» BUREG-M    7/5″;   » BUREG-M   15/12″.

 SPECIFICATIONS

Voltage of an alternating current 190…250 V
Power consumption of one LEEB 11 W
Luminous intensity 0,9 mcd
Diameter of LED 5 mm; 10 mm

BIOMETRIC SYSTEM OF STAFF REGISTRATION

The biometric system of staff’s registration is intended for automatic registration of the staff working time and organization of the visitation control at the enterprise, that is one of the most actual problems for management of the companies.

The offered biometric system identifies of employee by fingerprint (finger identification), unlike to traditional systems of the working time’s registration.

Scanning or registration process is carried out at the specified place. The identification time is no more than 5 seconds. The given type of «permit» is really unique:

  • Cannot be forgotten, pilfered, lost or passed to each other ;
  • Does not wearing.

The given system allows to:

  • receive the information about visitors, and also current number of people in each division;
  • prevent the non-authorized passage on the territory;
  • flexibly operate distribution of wages, premium bonus, penalty provision, that gives the opportunity to increase the discipline at the enterprise and therefore the saving rate.
  • competent  official persons accept the necessary information about attendance of employees at any time, and also about number and department attendance of visitors.

 System composition:

  • personal computer (PC);
  • fingerprint device (scanner of fingerprints);
  • software.

Software

Software consists of the program of registration and the organization of  the control of visiting and the program of processing of the information with the further generation of the reports being the basis for accounts department at carrying out of calculations.

 

SYSTEM OF STAFF»S WORK-TIME REGISTRATION

The system of staff’s work-time registration is intended for the automatic registration of the staff’s work time and organization of checking of the visits  to enterprise.
The implementation of this system gives the opportunity to increase access control of enterprise and get the information about  visitors, and also about the current number of people in each department.

System composition:

  • special cards;
  • device  of cards read-out;
  • personal computer.

The special cards are given to employees of company. Clock number and registered a code of employee is indicated on card, corresponding to the department. For company visitors also have stipulated cards, with clock  number of departments, where he is visiting.The visitor gets the cards on the control post of company at enter to the territory and give in after visiting.

The device of cards  read-out is installed at the control post of company and each one should register oneself at coming and going.

The system has provided with lighting and sound alarm, signaling about erroneous actions of card users.
Read-out of cards connect with computer, which dislocate in office,  where to take stock of attendance.
If the LAN is presence in enterprises, then the computer can be connect with LAN and the guide can be informed  attending.

SYSTEM OF CALLS REGISTRATION 

The given system is intended for registration of telephone conversation.

The implementation of the given systems provides protection of unapproved access and enables to:

  • determine automatically call and number of subscriber;
  • carry out automatically registration of date, time and phone conversation duration.

Simultaneous recording of the incoming and oncoming messages up to 8 channels is carried out.
Listening of current conversation and archiving of speech information is carried out.
Has an opportunity to make recording of telephone conversations on a hard disk, to archive and delete earlier recorded conversations.

The main units of the system :

  • IBM PC with monitor;
  • IBM PC with monitor;
  • Digital input /output board;
  • Unit of analogue-digital processing (ADP);
  • Interface cables;
  • Software.

The given system is used in automatic telephone exchange, exchange, banks, air services, security systems, military services, telecommunication systems etc.

SPECIFICATIONS 

Number of telephone channels 8
Bussed interface ISA-16
Clock rate 10 kHz
Frequency range 300…3400 Hz
Dynamic range ,  not less than  65 dB
Infiltration factor between channels minus 70 dB
Input impedance 2,4 kOhm
Power supply of ADC unit 220 V

«PIANO» CRYPTOGRAPHIC SYSTEM

The «PIANO» cryptosystem provides protection safe PC communication, based on a principle asymmetric criptographic. In the “PIANO” cryptosystem,  the length of a confidential session encryption key may be established by the user on a desirable degree of protection: 128, 256, 512, 1024 bits.

At an exchange, the document is encrypted by a confidential key (Diffie-Hellmans algorithm) and the digital signature (RSA algorithm) is added to it according to the chosen degree of protection.