Home

Results 61 - 70 of 845,978 for Alarm Systems. Search took 2.76 seconds.  
Sort by date/Sort by relevance
Thanks to Mifire and NFC technology, public employees, contractors and members of associations with appropriate permits can access buildings with a single card, deactivate alarms in the centres, programme opening hours with the capability of remotely opening the centres, as well as controlling fire alarms. In addition, in the case of educational centres, the intercom system has been integrated with the Wi-Fi telephone concierge system that can open doors remotely. This system comprises more than 22 000 sensors that are connected with the city platform through the SCADA system to control lighting or to ascertain which buildings are the most efficient.
Language:English
Score: 1042992.7 - https://www.itu.int/en/publica...s/files/basic-html/page71.html
Data Source: un
Personal access services include access to mobile phones and personal audio and home services include access to television, radio and alarms. Public services include access to points of sale, public address systems at religious places, theatres, events' and cinema's public announcement systems at airports, stations and other. (...) Audiovisual services for wireless connection to hearing aids · Public address systems (theatre, movies, churches, etc.) · Public announcement systems (airports, stations, theatres, events, etc.) · Public point of sale systems (counter, box-office) · Home television, video and audio systems · Home intercom systems (doorbell, alarms) · Personal and home telephony (landline, mobile) · Personal audio, video, gaming · Personal handheld information devices · Personal computers, tablets and other · Classroom teaching audio systems. (...) In some cases induction loops are also used at schools. FM systems connected to hearing aids are applied most at home (television, radio, alarm) and at schools .
Language:English
Score: 1042952.1 - https://www.itu.int/dms_pub/it...2E/02/T2E020001170001MSWE.docx
Data Source: un
Automatic e-calls from road accident sites are supposed to cut down rescue times and thus save lives. Under the present alarm and rescue schemes time is also a factor in getting the appropriate rescue forces to the site of mass collisions and hazardous goods accidents. (...) Apart from the point of how to finance this, another question is how to avoid false alarms. Indispensable seems to find a set of appropriate parameters to trigger an automatic crash notification. (...) There is an interface for the input of accurate location information and to send out the alarm as well as other vehicle data to the Public Services Answering Points (PSAP) and emergency centres.
Language:English
Score: 1041326.6 - https://www.itu.int/ITU-T/work...act/telecomo_1103_s2p1_abs.doc
Data Source: un
This could happen e.g. during a power -- cut in a small NE which does not have battery backup for the real time clock. reinitialized ProbableCause ::= localValue:158 -- A processing error alarm to be issued after the system has reinitialised. This will indicate -- to the management systems that the view they have of the managed system may no longer -- be valid. Usage example: The managed -- system issues this alarm after a reinitialization with severity warning to inform the -- management system about the event.
Language:English
Score: 1039084 - https://www.itu.int/wftp3/Publ...05/ASN1DefinedTypesModule.html
Data Source: un
This could happen e.g. during a power -- cut in a small NE which does not have battery backup for the real time clock. reinitialized ProbableCause ::= localValue:158 -- A processing error alarm to be issued after the system has reinitialised. This will indicate -- to the management systems that the view they have of the managed system may no longer -- be valid. Usage example: The managed -- system issues this alarm after a reinitialization with severity warning to inform the -- management system about the event.
Language:English
Score: 1039084 - https://www.itu.int/wftp3/Publ...005/ASN1DefinedTypesModule.asn
Data Source: un
[ITU-T H.626.5] Recommendation ITU-T H.626.5 (2019), Architecture for intelligent video surveillance systems. 3 Definitions 3.1 Terms defined elsewhere This Technical Paper uses the following terms defined elsewhere: 3.1.1 customer unit [ITU-T H.626V2]: A device located at the customer part of a visual surveillance system and used to present multimedia information (such as audio, video, image, alarm signal, etc.) to the end user. 3.1.2 intelligent customer unit [ITU-T H.626.5]: The intelligent customer unit (ICU) is the client subsystem within the intelligent visual surveillance system. (...) The M_CU is used to initiate the service and provide customers with video viewing. 3.1.6 premises unit [ITU-T H.626V2]: A device located at the remote part of a visual surveillance system and used to capture multimedia information (such as audio, video, image, alarm signal, etc.) from a surveilled object. 2 FSTP-VS-ECSR (2022-01) 3.1.7 video surveillance system [ITU-T H.626V2]: A telecommunication system focusing on video (but including audio) application technology, which is used to remotely capture multimedia (such as audio, video, image, alarm signals, etc.) and present them to the end user in a friendly manner, based on a managed broadband network with quality, security and reliability ensured. 3.2 Terms defined in this Technical Paper This Technical Paper defines the following terms: 3.2.1 event centre management: A functionality of an event centre server which provides the management services for the event centre server and responds to service requests of the video surveillance system. (...) In video surveillance systems, the connection between devices will generate a large amount of event data, such as device online and offline events, device storage abnormal events, device network connection abnormal events and other alarm events.
Language:English
Score: 1038601.8 - https://www.itu.int/dms_pub/it...pb/tut/T-TUT-VS-2022-PDF-E.pdf
Data Source: un
II.2 Tsunami warning service The tsunami warning system is used to detect tsunamis and issue warnings to prevent loss of life and property. Broadcast system Instant message Warning system Short message NGN Sensor Sensor Sensor Y .2061(12)_FII.2 Figure II.2 – Tsunami warning service configuration As shown in Figure II.2, it consists of two equally important components: a network of sensors to detect tsunamis and a communications infrastructure to issue timely alarms to help evacuation of coastal areas. (...) For a visitor who comes to an unfamiliar area at night, a simple alarm is not enough to escape to a safe place. All tsunami warning systems feature multiple lines of communications (such as SMS, e-mail, fax, radio, text and telex, often using hardened dedicated systems) enabling emergency messages to be sent to the emergency services and armed forces, as well to population alerting systems (e.g., sirens).
Language:English
Score: 1038464.5 - https://www.itu.int/wftp3/Publ.../files/basic-html/page304.html
Data Source: un
For the purpose of the systems contributing to a building, there have been various initiatives. (...) As a result, an infrastructure capable of reaching all parts of any building, can readily be provided and can interface with each of the building's systems. Typically, most of the communication requirements are interpreted as different layers in the "OSI 7‐Layer Communication Model" (Open System Interconnection). (...) Examples of systems which are readily compatible with an IP backbone include:  Audio paging;  Fire alarm systems;  Telephone systems;  HVAC systems;  Surveillance systems;  Access control and intrusion alarms;  Lighting control systems;  Elevator control systems;  HVAC systems.
Language:English
Score: 1038006.2 - https://www.itu.int/en/publica.../files/basic-html/page474.html
Data Source: un
., turn on/off lights, sprinklers, garage door, security alarm, thermostat, pool heater) remotely via a device with a web browser – Scheduling of appliances (e;g. scheduling of lights, water heater, alarm system, heat, and more) via automatically created profiles In these scenarios, as shown in Figure I.1, the gateway has a very important role. (...) Control functions may be implemented through pre-set rules (time-of-day, threshold or alarm driven, etc.) or implemented through commands delivered via a SMS message. (...) For example, in home security scenarios, the gateway usually integrates the inputs coming from different sensors and provides the home owner with a user interface to configure the home security system. Rec. ITU-T Y.4101/Y.2067 (06/2014) 111     120     121     122     123     124     125     126     127     128     129     130          
Language:English
Score: 1036287.4 - https://www.itu.int/wftp3/Publ.../files/basic-html/page125.html
Data Source: un
  A
The Abuse Management main steps are: · Receive the alarm; · Analyze the case and identify appropriate actions; · Notify to Law Enforcement Agencies; · Close the case. (...) In particular, the informatic tool can automate the alarm acquisition (coming from abuse mailbox, abuse forms, etc.) and the following steps of the abuse process: · False positives analysis; · Alarm categorization; · Alarm prioritization; · Acquisition of information regarding the abuse source; · Information organization for Law Enforcement notification; · Form automatic filling; · Abuse activity registration and data storage; · Abuse report creation; · Libraries creation. (...) The alarms are then categorized with pre-assigned priority levels based on a taxonomy referred to national and internal regulatory requirements.
Language:English
Score: 1033386.8 - https://www.itu.int/council/gr...use%20Management%20Process.doc
Data Source: un