Vandalproof Dome IP Camera in H.264
- Loading Port:
- China Main Port
- Payment Terms:
- TT or LC
- Min Order Qty:
- 1 Piece watt
- Supply Capability:
- 5000Pieces per Week watt/month
OKorder Service Pledge
OKorder Financial Service
You Might Also Like
SPECIFICATION | |
KS-535 | |
Video Capture(Factory Standard): | |
1/3" CCD,480TVl | |
Min.Lux |
0.35 Lux(F1.8) |
Optical Zoom |
10x |
Digital Zoom |
10x |
Focal Length |
4.1-73.8mm |
Image Angle |
Wide Angle: 47º,Far Angle: 2º |
TV Signal System |
PAL/NTSC |
Pan/Tilt Part: | |
360º rotating | |
Vertically |
90º |
Preset |
128pcs(CMS of IPCMonitor supports 8pcs) |
Fan, Heater |
Fan and Heater start automatically |
High Speed Dome Key Part: Video Coding, Network Transmit and Control | |
H.264 | |
Resolution |
D1/CIF/QCIF |
Max. Frame Per Second |
25fps |
Bit Rate |
128kbps ~ 2.048Mbps |
OSD |
support |
Audio Compression Format |
G.711 |
Protocol |
TCP/IP,UDP/IP,HTTP,SMTP,FTP,DHCP,DDNS,UPNP,NTP |
Other protocol |
802.11b/g |
Mobile Phone View |
Provide M-JPEG& H.264 video dual streaming,M-JPEG supports mobile phone view |
Two Way Audio |
support |
Storage |
SD card can store capture pictures and alarm video |
SD Browsing |
Remote browse and download SD content |
Motion Detection |
Support 4 area motion detection |
Alarm |
Email/FTP/SD/External Alarm/send message to alarm server |
User Setting |
3 levels |
Time/Date |
support |
Upgrade |
Remote upgrade by Internet |
DDNS |
Free Manufacturer DDNS |
Device Interface: | |
10Base-T/100base-TX | |
Storage Interface |
SD slot(w/ built-in 8G SD) |
Alarm In |
1 way |
Alarm Out |
1 way |
Audio In |
1 way audio in |
Audio Out |
1 way audio out |
Reset |
Reset button |
Power |
1 way |
Physical Index: | |
AC12V2A±5% | |
Temperature |
-10°C-+50°C |
Humidity |
20%-80%RHG |
Watt consumption |
<12W |
Dimension(length*width*height) |
4" |
Weight |
2.45KGS |
Software Support: | |
Microsoft Windows 98/2000/XP/Vista, | |
Apple Mac OS | |
Browser |
Internet Explorer6.0 and Above or Compatible Browser |
Safari,Firefox, etc | |
CMS (Central Management Software) |
IPCMonitor.exe |
- Q: What is 3S integration?
- Integration of the ground "three S": on-board, shipborne positioning navigation and positioning, tracking, measuring and other real-time operations on ground targets. Four, the application of digital earth in human contact with 80% of the information is related to geographical location and spatial distribution, geospatial information is the goods and vehicles on the information superhighway. Digital earth not only includes the earth's high-resolution satellite images, including digital map, as well as economic, social and demographic information, its application as vice president Gore mentioned in the report are sometimes restricted, because our imagination in other words, the application of digital earth is largely beyond our imagination. Can be optimistic that first Century, the digital earth will enter thousands of households and businesses. Here we can only make some realistic applications of our understanding. 1, the digital earth on global change and sustainable development of society and the role of global change and sustainable development of the society has become an important issue in today's world of concern, said the digital earth provides very favourable conditions for our study on this problem. The use of digital earth in computers can be used to simulate and simulate the processes, laws, impacts, and Countermeasures of global change, thereby enhancing human ability to cope with global change. Digital earth can be widely applied to the monitoring of global climate change, sea level change, desertification, ecological and environmental change, land use change. At the same time, the use of digital earth, can also carry out a comprehensive analysis and prediction, many problems on the sustainable development of society such as natural resources and economic development, population growth and social development, disaster prediction and prevention.
- Q: System integration qualification and security qualification can share?
- This is not what is not higher than the above, issued by the organization (a MII, a security association) are not the same, the security is mainly in the field of security, integration is mainly in the field of computer network. But it is really the right bigger. I personally feel that there is no express provision can not be shared, that can be shared I have written so tender blows,
- Q: How to control invasive traffic surveillance system?
- Application requirement is the foundation of building large-scale monitoring system. The comprehensive monitoring system of urban rail transit is based on the specialized subsystems such as PSCADA and BAS, and integrates several professional information in accordance with the urban rail transit operation requirements, so as to realize the comprehensive monitoring function. The application needs are directly reflected in the monitoring system of the data display layer, namely all levels of operator workstation HMI, through HMI, the monitoring system provides rich functions to meet the needs of users, support operations personnel especially in emergency situations of daily monitoring, and through a number of projects in the accumulation and operation mode of the in-depth study, explore and form decision support system, provide the application functions required for the operation of the.
- Q: Does weak current project belong to IT industry?
- Weak current engineering is a classification of power applications, including: entrance and exit control system, fire protection system, cable signal distribution, sound reinforcement and sound system, integrated wiring engineering, security monitoring system, etc..
- Q: System integration, video surveillance, security
- System integration with monitoring security should have a lot of similar places, but also before the general sale will involve.
- Q: What are the requirements of video security monitoring system design?
- 4.1 system should be the integrity of the original and real-time image information and voice information, regardless of how to deal with the intermediate process, should make the final display / record / playback of video and audio and the original scene is consistent, namely reducibility reducibility, image contour in color (gray level) and subsequent events, sound characteristics to the scene to maintain maximum similarity (subjective evaluation), and the delay time between real-time display and live events back images and sounds occur should be in a reasonable range.
- Q: Assembled computer, integrated graphics card, a security monitoring system, open monitoring software, the computer will spend the screen. How to solve?
- Flower screen, the software will not lead to flower screen. Hardware screen generally look at the host is independent of the machine, or set display machine. If it's a stand alone machine. Pre test graphics card. Another is to display the machine to test memory. There is also a display screen. Display screen, you can not open the machine. This exclusion. If it is to monitor the machine, it is recommended to change the acquisition card! Or change the acquisition card to another PCI slot
- Q: How to make monitoring system
- You just need to buy 5 cameras, then you have 4 wide-angle lenses and a standard lens. Then buy a video card, plug into the CPU slot of the desktop host, and install the software and drive. All you have to do is wiring. You can take two lines, one power, one video, and a video line on each video camera. Remember to buy the 4 way video card at the 4 point. 5 point, buy 8 road! This is simple! Just do it, OK!
- Q: Is the transformer in the monitoring system in the power supply?
- Transformer (Transformer) is a device that uses the principle of electromagnetic induction to change AC voltage. The main components are primary coil, secondary coil and core (magnetic core). In the electrical equipment and wireless circuit, often used for lifting voltage, matching impedance, security isolation, etc..
- Q: What is the difference between integration of weak current system and security system?
- Security system is an integral part of the weak current system, generally subdivided into the following systems:1 、 monitoring system. 2 、 burglar alarm system. 3 、 perimeter guard system. 4, building intercom system. 5, public broadcasting, background music system. 6. Parking management system. 7 、 entrance guard attendance system. 8, one card system (that is, the security system in a number of subsystems centralized management)
1. Manufacturer Overview
Location | Guangdong,China |
Year Established | 2011 |
Annual Output Value | |
Main Markets | North America South America Eastern Europe Southeast Asia Africa Oceania Mid East Eastern Asia Western Europe Central America Northern Europe Southern Europe South Asia Domestic Market |
Company Certifications | ISO 9001:2000;ISO 9001:2008;CE Certification |
2. Manufacturer Certificates
a) Certification Name | |
Range | |
Reference | |
Validity Period |
3. Manufacturer Capability
a) Trade Capacity | |
Nearest Port | Guangzhou |
Export Percentage | 31% - 40% |
No.of Employees in Trade Department | 3-5 People |
Language Spoken: | English, Chinese |
b) Factory Information | |
Factory Size: | |
No. of Production Lines | |
Contract Manufacturing | |
Product Price Range |
Send your message to us
Vandalproof Dome IP Camera in H.264
- Loading Port:
- China Main Port
- Payment Terms:
- TT or LC
- Min Order Qty:
- 1 Piece watt
- Supply Capability:
- 5000Pieces per Week watt/month
OKorder Service Pledge
OKorder Financial Service
Similar products
Hot products
Hot Searches
Related keywords