Security Services

Intrusion System

We design Intrusion Detection which is a complex commingling of multiple systems that provides advanced warning and threat assessment within a secure perimeter. Through a correlation of multiple alarms and detected threat contacts, the Command and Control Center operator can quickly identify “targets of interest” and dispatch the appropriate response to neutralize the threat.


A.Fiber Optic Fence Sensors System (FOFSS)

Fence and wall-associated sensors are above-ground detection sensors that are attached to an existing fence or wall. In the event that vibration due to cutting or climbing on a metal fabric fence is detected, the detection field is considered compromised and an alarm triggered.Buried Cable Detection Sensor

This type of sensor is a covert outdoor perimeter security intrusion detection sensor that generates an invisible radar detection field around buried sensor cables. If an intruder disturbs the field, an alarm is declared and exact location of the intrusion is identified.

C.Microwave Intrusion Detection System (MIDS)

Microwave sensors, also known as Radar, RF or Doppler sensors, detect walking, running or crawling human targets in an outdoor environment. MIDS has pioneered the development of flexible, reliable microwave links and transceivers for the protection of open areas, gates or entryways and rooftop or wall applications.

D.Volumetric Sensors 

Volumetric sensors generate an invisible detection field that locates and tracks intruders moving through the secure zone. Passive Infrared sensor A Passive Infrared sensor (PIR sensor) is an electronic device that measures infrared (IR) light radiating from objects in its field of view.

Closed Circuit Television (CCTV)

Closed-circuit television (CCTV) is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. MAS has expertise in designing an ideal surveillance system as per the requirement with combination of different types of surveillance cameras with consideration of conditions such as lighting, environment.

The expertise is extended into choosing right solution case by case, either providing IP based system or pure analogous solution or combination of these.

Analogous solution can be either simple way of home-running cables from surveillance cameras to monitors or complex structure with Video Matrix, Digital Video Recorders, Control Keyboard, Multiplexers providing more options in the system. The solution can utilize fiber optic cabling system to transmit the video from far location to the control center.

IP based solution is latest and fast growing technology which can utilize either client’s data network infrastructure or have its own separate network. This provides more flexibility in offering remote viewing, recording and control of surveillance cameras. Moreover, IP based solution provides functions such as Video Analytics, Storage at edge devices which alleviates load on core system and improve overall performance of the system. With extensive knowledge in Security systems along with expertise in Data networking, MAS is able to provide a perfect solution in IP based CCTV technology.

We have outlined major components of a CCTV System based on our experience for easy understanding of the system:

  1. Field Level – Surveillance Cameras
  2. Processing Level – Video Management System
  3. Operator Level – Video displays, GUI

I. Surveillance Cameras

Fixed cameras are installed at locations which require constant monitoring throughout without change in its view.

Pan, Tilt and Zoom camera, as the name implies provides more control to operators to select view of the cameras.

II.Processing Level

Processing Level is defined by below core components:

Performs functions such as Switching, Sequencing, Viewing & Control, Alarm Event Call, and Video Analytics.

The solution can involve either Analogue based Video Matrix or IP based virtual Video Management system based on the requirements.

To store live video either continuous 24×7 or event based post/pre-alarm recording. Recorders can be Digital Video Recorders for analogue based and Network Video Recording for IP based solution.

Intelligent Video Motion Detector (iVMD) is an advanced version of the traditional “Video Motion Detectors” in the market. iVMD analyzes video in real-time and detects valid motion in a scene. It filters out “noise” such as lighting changes, natural tree movements, water movements, small animals, and even small video artifact noise. This vastly improves reliability while suppressing unwanted false alarms.

iVMD can be used for providing real-time alerts and start/stop commands to DVRs, NVRs or other Video Management Systems. iVMD can also track moving objects and display a bounding box around the valid object. Typical uses of iVMD include outdoor and indoor monitoring of secure facilities for government, corporate, industrial, retail, banking, warehouses, stockyards, and access-controlled buildings and spaces.



III.Operator Level

This level is a composed of Graphical User Interface (GUI) linked with the processing level and video displays. The monitors located in the command center displays video and site map in front of operators to provide a synthetic view of the global system status. Operator keyboard can be added at the operator level to provide the ability to control, zoom, pan and switch the cameras on displays.


  1. Security Access Control System (SACS)

Access Control System is typically used for Controlling, Monitoring and Managing access by persons to sensitive facilities and administration areas. We have categorized the Security Access Control System into three layers for proper identification of the requirement.


  1. Readers and Identification.
  2. Access Control Platforms
  3. Mechanical Access Control
  4. Biometric Reader ________                                                                                                                                                              

I. Readers/Identification:

Biometrics comprises methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Biometrics is used as a form of identity access management and access control. Following are the different types of Biometric readers:

  1. Fingerprint
  2. Facial Recognition
  3. Iris Recognition


  1. Proximity Cards & Reader __

Proximity card is a contactless card built with integrated circuit device used for security access.

  1. Long Range Radio Frequency Identification System (RFID)

Radio-frequency identification (RFID) is the use of an object (typically referred to as an RFID tag) applied to or incorporated into a product, Vehicle, or person for the purpose of identification and tracking using radio waves. Tags can be read from several meters away and beyond the line of sight of the reader.


  1. Automatic number plate recognition (ANPR)

Automatic number plate recognition is a surveillance method that uses optical character recognition on images to read the license plates on vehicles. We design ANPR which can use existing closed-circuit television or road-rule enforcement cameras, or ones specifically designed for the task. This can be used as a method of electronic toll collection on pay-per-use roads and monitoring traffic activity, such as red light adherence in an intersection.

II. Access Control Platform

Access Control Platform allows information to be shared or restricted based on user role. Administrators can determine what information that role can access at either a module, view or field level. The platform integrates the Hardware & software’s of the different systems. Typically, this platform has access controllers, ID Database, Alarm displays and brings in Video streams from CCTV System to visualize transactions.

III.Mechanical Access Control

Based on the access grant/deny defined by the Access control platform the output of the system will control the function of the physical access control equipment such as close or open a gate or door. Below are the different kinds of physical access control methods and related equipment’s which MAS possess vast knowledge on and proposed based on requirements:

  1. Electrical Door Locks, used typically for secured rooms.
  2. Electromechanical Gates.
  3. Drop Arm Barriers, for entrances of the secured area.
  4. Turnstiles, is a form of gate which allows one person to pass at a time. It can also be made so as to enforce one-way traffic of people, and in addition, it can restrict passage only to people who insert a coin, a ticket, a pass, or use an access control card.
  5. Crash Barriers, designed especially for entrances where there is a requirement of Access Control system for the entrances of the secured area. If there is a threat of Vehicle attack in addition to the control of vehicle access in high security applications, Crash barriers are one of the best and most secure solution.
  6. Bollards are rigid posts that can be arranged in a line to close a road or path to vehicles above a certain width and to separate traffic from pedestrians. Crash rated bollards are used in the industry where access is restricted.Long 

Range Detection & Assessment System (LRDAS)


Long Range Detection & Assessment System (LRDAS) a class of radar sensors along with long range cameras that monitor activity surrounding or on critical infrastructure areas such as airports, seaports, military installations, national borders, Oil & Gas refineries and other critical industry and the like. The LRDAS is proposed where there is a requirement of surveillance over long range since it has ranges of several hundred meters to over 10 kilometers.

Since intrusion is detected from a long distance, personnel can identify the threat and make a security decision before it reaches the perimeter – increasing the time available to respond to potential threats.

The LRDAS is typically based on two kinds: Ground Based & Marine based.

  1. Inspection Equipment
  2. Under-vehicle inspection system (UVIS), an under-vehicle inspection system generally consists of still or video cameras mounted within a ramp and used at facility access points, particularly at secure facilities. An under-vehicle inspection system is used to detect threats such as explosives that are hidden underneath vehicles. Cameras capture images of the undercarriage of the vehicle for manual or automated visual inspection by security personnel or systems.
  3. X-Ray Machines, to screen Baggage for any potential threats at the facility entrances.
  4. Metal Detector, a device which responds to metal that many not be readily apparent. Typically used in the detection of weapons such as knives and guns.
  5. Chemical and Explosive Detection Systems, are security equipment able to detect explosives of small magnitude.