HSS.2A ALARM SIGNALS AND ALERTS
In radio wave operation mode, an alarm is triggered if an object is identified as potentially dangerous based on the analysis of reflected radio waves. The detected area is highlighted with a red rectangle
Example of an alarm in radio wave operation mode
The photos are stored locally on the device and are not transmitted or processed by third parties. The user can delete them at any time.
The alarm signals are displayed on the operator’s screen. The HSS system detects objects that resemble explosives or IEDs based on their shape and material.
In the metal detection mode, an alarm is triggered if a suspicious metal object is detected inside the inspection zone. The alarm area is highlighted with a violet frame.
Example of a metal alarm on a computer display
Related Articles
HSR.4B Alarm Signals And Alerts
The HSR.4B system is designed to detect potentially dangerous objects on individuals passing through the inspection area. When a threat is detected, the operator’s screen displays photo images with suspicious objects highlighted using different ...
HSS.2A ALARM MONITOR CLIENT- GENERAL OVERVIEW
Alarm Monitor Client (AMC) is software used to receive alarm signals from the HSS system. It can be installed on a PC (Desktop AMC) or a mobile device (Mobile AMC). Main Functions: Displays a photo of the person or object that triggered the alarm. ...
HSS.2A DESKTOP ALARM MONITOR CLIENT
The Desktop Alarm Monitor Client is launched by double-clicking the APSTEC shortcut on the desktop. Shortcut for launching the Desktop Alarm Monitor Client First launch When starting the program for the first time: Enter the server address Enter ...
HSS.2A MOBILE ALARM MONITOR CLIENT
To launch the application, tap the Mobile Alarm Monitor Client shortcut on the tablet. Make sure the tablet is connected to the HSS via Wi-Fi. The connection can be made through the HSS’s internal Wi-Fi module or a Wi-Fi router connected to the HSS ...
HSS.2A PRINCIPLE OF OPERATION
The HSS system uses radio waves and cameras to automatically detect hidden threat objects on a person or in their belongings. It creates an image of the person using radio waves. Detects suspicious items and compares them to known threats (like ...