Legerity Axon
The intelligent video surveillance solution from Legerity Axon identifies attributes, events or patte
For a FREE demo call - 9759850000
This smart camera is capable of taking body temperature within milliseconds to detect if anyone is running a fever.
Tag a Camera Lover.....đđđ
The Intelligent Surveillance System from Legerity Axon identifies attributes, events or patterns of specific behaviour via video analysis and is capable of generating automatic alerts in real time to identify trends, patterns and incidents.
Going beyond âstatic surveillanceâ, this advanced system is capable of delivering great results in real time. Video Analytics uses mathematical algorithms to monitor, analyse and manage large volumes of video. It digitally analyses video inputs; transforming them into intelligent data which help in taking decisions. Some of the classic roles this system can play are:
Detecting Tripwire:
Large campuses like Schools, Colleges, and Hospitals etc. are occupied with hundreds and thousands of people during peak hours but forbidden in night hours. Legerity Axonâs Intelligent Surveillance System can draw âvirtual linesâ during forbidden hours and it can automatically detect any movement in the restricted hours. If the virtual lines are crossed, it will trigger an alarm + send picture of the event to pre-decided mobile phones/computers.
Detecting Abandoned Articles:
The threat of bomb blasts in public places and places of national importance has increased and law enforcement agencies are finding it increasingly challenging to handle the new face of terror. Legerity Axonâs Intelligent Surveillance System can automatically monitor if someone has left an object unattended. If such incident is detected, the smart system will trigger an alarm and send picture of the event to pre-decided mobile phones/computers.
Detecting Missing Articles:
The new face of urban crime is witnessing thefts of highly valuable articles from Museums, Art Galleries and Showrooms. This is becoming a regular news on a daily basis. Legerity Axonâs Intelligent Surveillance System can automatically monitor if an important object is taken-off from its original location. If such incident is detected, the smart system will trigger an alarm and send picture of the event to pre-decided mobile phones/computers.
Detecting Intrusion:
Security staff needs to monitor any unwanted activity in secure areas. Legerity Axonâs Intelligent Surveillance System can detect whenever any intrusion is noticed in the area of interest and will trigger an alarm + send picture of the event to pre-decided mobile phones/computers.
Legerity Axon Barcode Solutions
Legerity Axon is a complete and reliable solution provider in Enterprise Mobility and Automated Identification and data capture. Barcode technology is used for mechanized data capture on to computers and is an essential tool for billing and inventory control applications. Faster and hassle free billing is top priority in retail sector while inventory control is of importance in a wide variety of industries. Legerity Axon is one of the prime solution providers of Barcode technology. The Barcode Solutions offered by Legerity Axon are widely used and acclaimed by the customers for their superior quality and ease of use. We provide barcode printing software, bar-code printers, bar-code scanners including 2D scanners, table top scanners, wireless scanners and portable hand-hled data terminals. We provide turn-key bar-code solutions for library management, retail management and canteen management.
RF-ID Solutions from Legerity Axon
Radio Frequency Identification, popularly known as RF-ID is the cutting edge technology that uses radio waves to automatically identify individual items. The objective of any RF-ID system is to carry data in suitable transponders, generally known as tags and to retrieve data, by machine readable means, at a suitable time and place and to satisfy particular application needs. RF-ID is one of the most innovative technologies being adopted by both Industry and the Academic world.
Modern academic library is a place where millions of books, advanced periodicals, CDs, DVDs and other electronic reading materials are contained. It is a huge challenge to manage for librarians, managing such type of huge collections. RF-ID tags can be active, semi-passive and passive. It is a small device that can store information. Passive tags don't have internal batteries. RF-ID reader is a device that can receive and transmit a radio signal. It is built to encode data stored in the tag's microprocessor. Because of the higher cost, active and semi-passive RF-ID tags are used for valuable asset tracking. The passive RF-ID tags are used in RF-ID library management systems. RF-ID library management, using RF-ID tags is easy and convenient. A RF-ID library management system consists of books, each attached with an RF-ID tag, RF-ID reader, computer network and software. Library staff handle lending, returning, sorting, tagging etc. of books, using RF-ID tags in this library system. A person can locate RF-ID library books marked with a RF-ID tags, using the RF-ID reader which identifies and locates the book. When the book is carried to the counter, the library staff can either activate or deactivate the electronic article surveillance bit in the book's tag. If a book is borrowed, then the surveillance bit is deactivated.
RF-ID LIBRARY MANAGEMENT SYSTEM Using RF-ID in libraries saves library staff's time by automatizing their tasks. An establishment that uses RF-ID library management saves a book reader, precious time that he would have spent, waiting for his turn in a queue for borrowing or returning a book. Taking care of books and making them available to the book readers are important tasks. Most of the library staff's time is spent in recording information of incoming and outgoing books. Borrowing and returning of books can be fully automatized with the help of self-check-in/out systems. A person using this system to borrow books is presented with options on a computer screen. The person has to identify himself with a code, which is preferably a personal identification number, or any form of unique identity code. Books selected by the person are identified by the system's built-in RF-ID reader. And, the surveillance bit in the book's tag is deactivated by the system. When a book is returned, the check-in/out system activates the surveillance bit.
Application in RF-ID Library Management System
1. Book Drops: The Book Drops can be located anywhere, within or outside the library. Possible remote locations outside the library include MRT/train stations, shopping centers, schools, etc. This offers unprecedented flexibility and convenience of returning library items at any time of the day, even when the library is closed.
2. RF-ID Transponder or Tagging: It is the most important link in any RF-ID system. It has the ability to store information relating to the specific item to which they are attached, rewrite again without any requirement for contact or line of sight. Data within a tag may provide identification for an item, proof of ownership, original storage location, loan status and history. RF-ID tags have been specifically designed to be affixed into library media, including books, CDs, DVDs and tapes.
3. Counter Station is a staff assisted station on services such as loan, return, tagging, sorting and etc. It is loaded with arming/disarming module, tagging module and sorting module. Arming/Disarming module allows EAS (Electronic Article Surveillance) bit inside the tag of the library material to be set/reset so as to trigger/not trigger the alarm of the EAS gate.
4. The Patron self-check-out station: It is basically a computer with a touch screen and a built-in RF-ID reader, plus special software for personal identification, book and other media handling and circulation. After identifying the patron with a library ID card, a barcode card, or his personal ID number (PIN), the patron is asked to choose the next action (check-out of one or several books). After choosing check-out , the patron puts the book(s) in front of the screen on the RF-ID reader and the display will show the book title and its ID number (other optional information can be shown if desired) which have been checked out.
5. Shelf Management: This solution makes locating and identifying items on the shelves an easy task for librarians. It comprises basically of a portable scanner and a base station. The solution is designed to cover three main requirements:â˘Search for individual books requested â˘Inventory check of the whole library stock â˘Search for books which are miss-helved
6. Anti-theft Detection: RF-ID EAS Gates is the anti-theft part of the Library RF-ID Management System using the same RF-ID tags embedded in the library items. Each lane is able to track items of about 1 meter and would trigger the alarm system when an un-borrowed item passed through them. The alarm will sound and lights on the gate will flash as patron passes through with the un-borrowed library material.
Why You Need RFID technology in your library?
Which RFID component is attached to the book item for identification?
Smart label or tag (microchip) can be embedded virtually into any object including books and other stock of library individually identifies the book using a unique, unalterable code.
Custom Printed Plastic Identity Cards. . .
Get identified in style now! Legerity Axon provides custom printed photo ID cards for your students, employees and members. These cards can come with any in-built auto identification technology like bar-codes, proximity and smart-chip. With us, you can design ID cards in any color and orientation. We also have an option of printing your ID cards on a single as well as both sides (front & back). We also provide specially crafted card-holders and custom printed neck lanyards.
Click here to claim your Sponsored Listing.
Videos (show all)
Category
Contact the business
Telephone
Website
Address
Dehra Dun
248001
Opening Hours
Monday | 9:30am - 6:30pm |
Tuesday | 9:30am - 6:30pm |
Wednesday | 9:30am - 6:30pm |
Thursday | 9:30am - 6:30pm |
Friday | 9:30am - 6:30pm |
Saturday | 9:30am - 6:30pm |
Dehra Dun, 248001
You can help for reducing global warming by using solar energy products
Graphic Era University
Dehra Dun, 248002
Computer Society of India - Graphic Era University | Student Chapter
Graphic Era University
Dehra Dun, 248002
All the people who live here are Divine and are full of Godliness!! But moving with the times is also necessary. So we intake with us Latest Technology and Apt Guidance! This Group...
Dehra Dun
Metaverse project being built on solana blockchain which offers a ton of utilities and working on reforming education
Dehra Dun, 238011
Construction ⏠Estimation & Costing ⏠Designing ⏠Excel ⏠Civil Softwares
Lane 13, Rajeshwar Nagar Phase-2, Sahastradhara Road
Dehra Dun, 248001
We understand your NEEDS Design it to suit your SPECIFICATIONS & Build according to your DREAMS
DIT University
Dehra Dun, 248009
Mozilla Student Developers is a group of tech-enthusiasts gathered together to eradicate technology
Uttaranchal University
Dehra Dun, 248007
ŕ¤RJA is a Society of ELECTRONICS & COMMUNICATION Engineers. It is under UU-ECSB.
Musoorie Diversion Road, Makkawala
Dehra Dun, 248009
DIT University is a leading private university in North India offering a wide range of programs