Inim Electronics Fire detection systems key features Manufactured 100% in Italy with hi quality standard All Inim Electronics products are manufactured in Italy in a modern and efficient facility, supported by latest generation technology equipments. The intensive use of SMT technology, reflow soldering and hi-automated production line reduce to minimum the human error incidence.

The 100% of the production is tested with advanced testing equipment where each single component is measured and checked

Each electronic board is 100% protected by a conformal coating in order to reduce to zero any effect due to moisture or environmental pollution

Detectors are calibrated one by one to ensure always the same response in each sample and guarantee the maximum reliability

Emergency54 – CPU redundancy for hi reliability of the system When an INIM system is combined with “Emergency54” technology, it is without doubt the maximum level of reliability installer companies can expect to find in a fire detection system. An “Emergency54” enhanced system is capable of activating fire alarm signaling even under the improbable conditions of a control panel CPU fault. Emergency54 technology operates at panel level – to ensure signaling during a control panel CPU fault; and at network level – to ensure signaling during a main unit CPU fault. The Emergency54 also extends its functions to telephone communications. In fact, if the system is equipped with a SmartLoopPSTN board, it guarantees an emergency call in the event of an alarm during control panel CPU fault conditions. The “Emergency54” enhancement technology is for those installer companies who wish to shape systems without compromise

Loop MAP – self addressing with wiring map recognition for fast and easy system commissioning LoopMap technology is so new that it seems to have come out of the latest videogame. It is the apex of loop technology. Once the loop is connected to the control panel or loop pilot, you simply start the enrolling process via your computer to obtain the loop layout containing all details and any secondary branches, in the

order in which the wiring was completed. LoopMap is capable of recognizing the wiring order of the loop devices even when the loop has branches. LoopMap technology allows you to reconstruct the exact installation topology and obtain an easy-to-use, interactive loop-layout map which greatly simplifies and speeds up searches relating to faults and maintenance work.

Versa++ Inim has launched a whole new concept into the world of conventional detection: flexibility. In fact, as a result of the revolutionary Versa++ technology incorporated in the IRIS and ENEA detector ranges, you can now configure individual detectors to suit their specific environments. You can also connect to the detector line for a complete diagnosis of each individual detector and thus test its operating capacity, verify real-time values, view the contamination level in the optical smoke chamber and change the sensitivity and operating mode. Each detector has a non-volatile memory which allows you to view the smoke and temperature levels measured in the period prior to the last alarm detected. Versa++ gives you the true feel of the future of fire detection.

EN54 Approvals Each component manufactured by Inim Electronics is approved according all the applicable European standards and certificates are released by the most prestigious notified body

Detectors Water drop immunity Top side completely sealed to avoid dust or water condensation to reach the chamber: One of the most common false alarm or fault reason is the dust coming from the pipes or condensating water dropping from the top side

Metal mash against insect with less than 500um holes diameter One of the biggest problems of optical smoke detectors available in the market is dust or insect entering in the chamber

Burn IN to 100% of the production Each Detector is subjected to a «Burn IN test» of 24 hours: the 80% of electronic components failure occur during the first 24 hours of their life, detectors live their first 24 hours in our burn in test!

Big amount of prestigious installations all over the world

Inim Electronics Fire detection systems key features -

of reliability installer companies can expect to find in a fire detection system. ... it guarantees an emergency call in the event of an alarm during control panel ...

1MB Sizes 4 Downloads 181 Views

Recommend Documents

Inim Electronics Fire detection systems key features -
fault; and at network level – to ensure signaling during a main unit CPU fault. ... LoopMap technology is so new that it seems to have come out of the latest ...

key features for math teachers - Proven Learning
and analyze data, and then automatically transfer grades into any electronic gradebook. GRIDDED ANSWERS. Customize vertical columns with numbers and.

Fire Detection Using Image Processing - IJRIT
These techniques can be used to reduce false alarms along with fire detection methods . ... Fire detection system sensors are used to detect occurrence of fire and to make ... A fire is an image can be described by using its color properties.

Fire Detection Using Image Processing - IJRIT
Keywords: Fire detection, Video processing, Edge detection, Color detection, Gray cycle pixel, Fire pixel spreading. 1. Introduction. Fire detection system sensors ...

Voicing Features for Robust Speech Detection
to greatly varying SNR and channel characteristics and 3) per- formance ..... [3] S. Basu, “A linked-hmm model for robust voicing and speech detection,” in. Proc.

A Saliency Detection Model Using Low-Level Features ...
The authors are with the School of Computer Engineering, Nanyang ... maps: 1) global non-linear normalization (being simple and suit- ...... Nevrez İmamoğlu received the B.E. degree in Com- ... a research associate for 1 year during 2010–2011 ...

Voicing Features for Robust Speech Detection
The periodic characteristic of speech signal makes it a good candidate for searching for .... Phone models that correspond well to voiced speech .... IEEE Conference on Acoustics, Speech and Signal Processing (ICASSP. 2003), 2003, pp.

Key Features of Budget 2014-2015.pdf
Savings rate at 30.1 percent and investment rate of 34.8 percent in 2012-13. Government set up a Cabinate Committee on investment and the Project Monitoring.

Key features of PES schemes in Cambodia_2014-2015.pdf ...
Key features of PES schemes in Cambodia_2014-2015.pdf. Key features of PES schemes in Cambodia_2014-2015.pdf. Open. Extract. Open with. Sign In.

Rapid response to suspected fire ant detection - NSW Department of ...
Dec 2, 2014 - Since then, the Australian, State and territory governments have invested $281 million towards eradicating them from southeast Queensland.

Web Spoofing Detection Systems Using Machine Learning ...
... Systems Using Machine. Learning Techniques ... Supervised by. Dr. Sozan A. .... Web Spoofing Detection Systems Using Machine Learning Techniques.pdf.

Web Spoofing Detection Systems Using Machine Learning ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Web Spoofing ...

RADIO LINK FEATURES IN GSM SYSTEMS NOTES-1.pdf ...
1. Page 3 of 6. RADIO LINK FEATURES IN GSM SYSTEMS NOTES-1.pdf. RADIO LINK FEATURES IN GSM SYSTEMS NOTES-1.pdf. Open. Extract. Open with.

Search features
Search Features: A collection of “shortcuts” that get you to the answer quickly. Page 2. Search Features. [ capital of Mongolia ]. [ weather Knoxville, TN ]. [ weather 90712 ]. [ time in Singapore ]. [ Hawaiian Airlines 24 ]. To get the master li

Intrusion Detection Systems: A Survey and Taxonomy - CiteSeerX
Mar 14, 2000 - the Internet, to attack the system through a network. This is by no means ... latter approach include its reliance on a well defined security policy, which may be absent, and ..... and compare the observed behaviour accordingly.

Improving the Usability of Intrusion Detection Systems - CiteSeerX
The resulting system was tested on two corpora of data: Web access logs ..... 13See e.g. 'http://builder.com.com/5100-6387 14-1044883-2.html', verified ...

Intrusion and Misuse Detection in Large-Scale Systems
G. Grinstein and supported by the US National Institute of ... 7. E.E. Koutsofios et al., “Visualizing Large-Scale Telecommunica- ... lect or analyze any data related to Microsoft- or ... merged the log files for all systems under consideration.

pdf-1490\intrusion-detection-systems-principles-of-operation-and ...
Try one of the apps below to open or edit this item. pdf-1490\intrusion-detection-systems-principles-of-operation-and-application-by-robert-l-barnard.pdf.

Program features - MCShield
Feb 26, 2012 - Hard disk drives – enables initial scan of all hard drives ..... C:\Documents and Settings\All Users\Application Data\MCShield (for Windows XP).

Defending Recommender Systems: Detection of Profile ...
Recommender systems have become a staple of many e-commerce web sites, yet significant vulnerabilities exist in these systems when faced with what have been termed “shilling” attacks [1–4]. We use the more descriptive phrase “profile injectio