The Security system for distant areas and objects surveillance (SDAOS) is design:
1. To collect, process and analyze information from specialized sensors /underground pressure sensor, seismic sensor, microwave barrier, PIR sensor and intelligent camera/ through radio connectivity.
2. To provide in real-time operative procedures according to the chronology of the generated alarms.
3. To provide information for the current state of the monitored object in tabular or graphic representation. The graphic representation must be based on a digital map of the object with markers for the locations of the sensors.
4. To provide functionalities for automatic or manually activated sensors diagnostics.
5. To locally archive all the sensory data as well as the performed system operations.
6. To provide statistics for alarms events and performed system operations based on different criteria.
7. Every local system to be able to connect to a centralized system with functionalities for remote web-based monitoring.

The structure of the system is design to ensure autonomous operation of every local center.
The system can work with up to four radio networks in order to be increased the number of radio-controlled sensors without disturbing the system reliability.
Up to 15 sensors can be attached to a radio network.
The mobile system provides functionalities for scheduled sensor diagnostics as well as temporary shutdown of malfunctioned sensors till full repairs. The access control of the system is based on identification, authorization and authentication with different predefined access levels.

Structure of local mobile center

Fig.1. Structure of local mobile center.

Structure of Security system for distant areas and objects surveillance

Fig.2. Structure of Security system for distant areas and objects surveillance.

The communication between LSDAOS and CSDAOS is carried over TCP specialized protocol. Any change in the LSDAOS structure / switching on or off the sensor; any change of the parameters and definitions in the local database is transmitted to CSDAOS /. The local DB stores a strict history for any change – which ensures sustainability and traceability in the system operation. LSDAOS hardware is realized on the basis of a PC machine or laptop. Management is carried out by a specialized program development institute.

Program main table screen

Fig.3.Program main table screen.

Graphical GIS representation of the command software screen

Fig.4.Graphical GIS representation of the command software screen.

The program consists of three main windows:
1. History of the last 25 events.
History of the last 25 events
2. History of the last 15 commands from the command center to the sensors.
History of the last 15 commands from the command center to the sensors
3. Actual last state of the sensors place on the area showed in tree like form.
Actual last state of the sensors place

If on the guarded perimeter are installed cameras each camera stores the video data on separate disk space.

If a camera is attached to a sensor the generated sensor alarm triggers the video record with duration from seconds before the event to minutes after the alarm event. The stored video information can be later transferred to CSDAOS or reviewed offline form CSDAOS or LSDAOS. TSENSIKO – is an integral part of the overall SDAOS system. CSDAOS integrated the information from all connected LSDAOS. CSDAOS is remotely located from each MOBSIKO and the connection between them is implemented over standard LAN communication channel through-specialized developed for this purpose protocol.

CSDAOS software is implemented on standard PC with medium or high processing capabilities, depending on the design and the expected data volume.

In CSDAOS are installed:

  • WEB Server – on request provides information for an event or a reference to a series of events based on different criteria by WEB Browser – in tabular form.
  • FTP Server – is designed to transfer periodically video files between LSDAOS and CSDAOS.


The Command and Control Software is able to warn in real-time for occurring events in multiple guarded areas. If the malicious event occurs in some of the monitored areas the software signalizes with color change and sound to attract the user attention. The user can observe the current state in details in each of the monitored areas by zooming the map and reading text descriptions. All events incoming and outgoing events are recorded in database. The software contains Advisory System which possesses decision capabilities. According to the incoming data the software analyses the current state and make action proposals according to predefined scenarios, directives, procedures and protocols. The software has also encrypted chat capabilities with all local command posts for direct communication with operators of Local Command Posts.