• Vandalproof Dome IP Camera in H.264 System 1
Vandalproof Dome IP Camera in H.264

Vandalproof Dome IP Camera in H.264

Ref Price:
get latest price
Loading Port:
China Main Port
Payment Terms:
TT or LC
Min Order Qty:
1 Piece watt
Supply Capability:
5000Pieces per Week watt/month

Add to My Favorites

Follow us:


OKorder Service Pledge

Quality Product, Order Online Tracking, Timely Delivery

OKorder Financial Service

Credit Rating, Credit Services, Credit Purchasing

SPECIFICATION

Model

KS-535

Video Capture(Factory Standard):

Definition

1/3" CCD,480TVl

Min.Lux

0.35 Lux(F1.8)

Optical Zoom

10x

Digital Zoom

10x

Focal Length

4.1-73.8mm

Image Angle

Wide Angle: 47º,Far Angle: 2º

TV Signal System

PAL/NTSC

Pan/Tilt Part: 

Horizontally

360º rotating

Vertically

90º

Preset

128pcs(CMS of IPCMonitor supports 8pcs)

Fan, Heater

Fan and Heater start automatically

High Speed Dome Key Part: Video Coding, Network Transmit and Control

Video Compression Format

H.264

Resolution

D1/CIF/QCIF

Max. Frame Per Second

25fps

Bit Rate

128kbps ~ 2.048Mbps

OSD

support

Audio Compression Format

G.711

Protocol

TCP/IP,UDP/IP,HTTP,SMTP,FTP,DHCP,DDNS,UPNP,NTP

Other protocol

802.11b/g

Mobile Phone View

Provide M-JPEG& H.264 video dual streaming,M-JPEG supports mobile phone view

Two Way Audio

support

Storage

SD card can store capture pictures and alarm video

SD Browsing

Remote browse and download SD content

Motion Detection

Support 4 area motion detection

Alarm

Email/FTP/SD/External Alarm/send message to alarm server

User Setting

3 levels

Time/Date

support

Upgrade

Remote upgrade by Internet

DDNS

Free Manufacturer DDNS

Device Interface:

Ethernet Interface

10Base-T/100base-TX

Storage Interface

SD slot(w/ built-in 8G SD)

Alarm In

1 way

Alarm Out

1 way

Audio In

1 way audio in

Audio Out

1 way audio out

Reset

Reset button

Power

1 way

Physical Index:

Adapter

AC12V2A±5%

Temperature

-10°C-+50°C

Humidity

20%-80%RHG

Watt consumption

<12W

Dimension(length*width*height)

4"

Weight

2.45KGS

Software Support:

Operation System

Microsoft Windows 98/2000/XP/Vista,

Apple Mac OS

Browser

Internet Explorer6.0 and Above or Compatible Browser

Safari,Firefox, etc

CMS (Central Management Software)

IPCMonitor.exe

 

 

Q: What is 3S integration?
Integration of the ground "three S": on-board, shipborne positioning navigation and positioning, tracking, measuring and other real-time operations on ground targets. Four, the application of digital earth in human contact with 80% of the information is related to geographical location and spatial distribution, geospatial information is the goods and vehicles on the information superhighway. Digital earth not only includes the earth's high-resolution satellite images, including digital map, as well as economic, social and demographic information, its application as vice president Gore mentioned in the report are sometimes restricted, because our imagination in other words, the application of digital earth is largely beyond our imagination. Can be optimistic that first Century, the digital earth will enter thousands of households and businesses. Here we can only make some realistic applications of our understanding. 1, the digital earth on global change and sustainable development of society and the role of global change and sustainable development of the society has become an important issue in today's world of concern, said the digital earth provides very favourable conditions for our study on this problem. The use of digital earth in computers can be used to simulate and simulate the processes, laws, impacts, and Countermeasures of global change, thereby enhancing human ability to cope with global change. Digital earth can be widely applied to the monitoring of global climate change, sea level change, desertification, ecological and environmental change, land use change. At the same time, the use of digital earth, can also carry out a comprehensive analysis and prediction, many problems on the sustainable development of society such as natural resources and economic development, population growth and social development, disaster prediction and prevention.
Q: System integration qualification and security qualification can share?
This is not what is not higher than the above, issued by the organization (a MII, a security association) are not the same, the security is mainly in the field of security, integration is mainly in the field of computer network. But it is really the right bigger. I personally feel that there is no express provision can not be shared, that can be shared I have written so tender blows,
Q: How to control invasive traffic surveillance system?
Application requirement is the foundation of building large-scale monitoring system. The comprehensive monitoring system of urban rail transit is based on the specialized subsystems such as PSCADA and BAS, and integrates several professional information in accordance with the urban rail transit operation requirements, so as to realize the comprehensive monitoring function. The application needs are directly reflected in the monitoring system of the data display layer, namely all levels of operator workstation HMI, through HMI, the monitoring system provides rich functions to meet the needs of users, support operations personnel especially in emergency situations of daily monitoring, and through a number of projects in the accumulation and operation mode of the in-depth study, explore and form decision support system, provide the application functions required for the operation of the.
Q: Does weak current project belong to IT industry?
Weak current engineering is a classification of power applications, including: entrance and exit control system, fire protection system, cable signal distribution, sound reinforcement and sound system, integrated wiring engineering, security monitoring system, etc..
Q: System integration, video surveillance, security
System integration with monitoring security should have a lot of similar places, but also before the general sale will involve.
Q: What are the requirements of video security monitoring system design?
4.1 system should be the integrity of the original and real-time image information and voice information, regardless of how to deal with the intermediate process, should make the final display / record / playback of video and audio and the original scene is consistent, namely reducibility reducibility, image contour in color (gray level) and subsequent events, sound characteristics to the scene to maintain maximum similarity (subjective evaluation), and the delay time between real-time display and live events back images and sounds occur should be in a reasonable range.
Q: Assembled computer, integrated graphics card, a security monitoring system, open monitoring software, the computer will spend the screen. How to solve?
Flower screen, the software will not lead to flower screen. Hardware screen generally look at the host is independent of the machine, or set display machine. If it's a stand alone machine. Pre test graphics card. Another is to display the machine to test memory. There is also a display screen. Display screen, you can not open the machine. This exclusion. If it is to monitor the machine, it is recommended to change the acquisition card! Or change the acquisition card to another PCI slot
Q: How to make monitoring system
You just need to buy 5 cameras, then you have 4 wide-angle lenses and a standard lens. Then buy a video card, plug into the CPU slot of the desktop host, and install the software and drive. All you have to do is wiring. You can take two lines, one power, one video, and a video line on each video camera. Remember to buy the 4 way video card at the 4 point. 5 point, buy 8 road! This is simple! Just do it, OK!
Q: Is the transformer in the monitoring system in the power supply?
Transformer (Transformer) is a device that uses the principle of electromagnetic induction to change AC voltage. The main components are primary coil, secondary coil and core (magnetic core). In the electrical equipment and wireless circuit, often used for lifting voltage, matching impedance, security isolation, etc..
Q: What is the difference between integration of weak current system and security system?
Security system is an integral part of the weak current system, generally subdivided into the following systems:1 、 monitoring system. 2 、 burglar alarm system. 3 、 perimeter guard system. 4, building intercom system. 5, public broadcasting, background music system. 6. Parking management system. 7 、 entrance guard attendance system. 8, one card system (that is, the security system in a number of subsystems centralized management)
Our company continues to enhance technical force and improves product quality. At the same time, we constantly develop new products that meet the market needs. With particular emphasis on after-sales service, we have set up a special after-sales team and after-sales service hot line. We take users' suggestions seriously. "High quality, good price, fast delivery and sincere service" are our values and promises to our customers.

1. Manufacturer Overview

Location Guangdong,China
Year Established 2011
Annual Output Value
Main Markets North America
South America
Eastern Europe
Southeast Asia
Africa
Oceania
Mid East
Eastern Asia
Western Europe
Central America
Northern Europe
Southern Europe
South Asia
Domestic Market
Company Certifications ISO 9001:2000;ISO 9001:2008;CE Certification

2. Manufacturer Certificates

a) Certification Name  
Range  
Reference  
Validity Period  

3. Manufacturer Capability

a) Trade Capacity
Nearest Port Guangzhou
Export Percentage 31% - 40%
No.of Employees in Trade Department 3-5 People
Language Spoken: English, Chinese
b) Factory Information
Factory Size:
No. of Production Lines
Contract Manufacturing
Product Price Range

Send your message to us

This is not what you are looking for? Post Buying Request

Similar products

Hot products


Hot Searches

Related keywords