Port Security

Port Security

security checks

With the overwhelming amount of data that has to be reviewed during border security checks, as well as limited budgets and resources in governments,...

The world's vast oceans and seas offer seemingly endless spaces in which adversaries can maneuver undetected. The U.S. military deploys networks of manned and...
early detection

Flight safety solutions available today, such as radars for early detection, are not sufficiently effective in preventing collisions with birds, due to their technological...

The threat posed by drones against critical infrastructure has become more and more widespread. The recent attack against Russian forces in Syria is only...
Sensors

China is a rising power in today’s reality, there's no doubt about that. We in i-HLS.com have wrote extensively about the country’s efforts of...
sensor

A “quantum material” that mimics a shark’s ability to detect the minute electric fields of small prey has been tested. with potential applications from...
yemen rebels

Yemen's Houthi forces have threatened to shoot down Saudi vessels found anywhere near Red Sea ports controlled by the rebels with the newly launched...
maritime simulation

Maritime simulation has undergone a transformation over the last three years, largely as a result of computer processing speeds and the ability to create...
video analytics

Video analytics can be used for various purposes - motion detection for security, facial recognition & license plate reading, people counting for retail stores...
video analytics

Innovative video analytics solutions complemented by optical tools can bring about a robust surveillance system. Canon Group's imaging capabilities, network image processing technology and...
port security

India’s paramilitary force CISF has been selected to provide security to ports and also ensure an airport-like facility for travelers of luxury ships, as...
dirty bomb

The Port of Charleston, South Carolina, has been evacuated early June 15th as US federal authorities investigate a reported threat on a container ship...
perimeter security

Fiber optic sensing solutions have been used for some time in a wide array of perimeter security applications to detect suspected intrusions. The slightest deviation...
offshore installations

The discovery of oil and gas in Israel and the continuous operation of the offshore installations, which have a considerable economic and strategic importance...
patrol surface vehicles

  New indigenous unmanned surface vehicles (USV systems) were recently showcased by Zhuhai Yunzhou Intelligence Technology (Yunzhou-Tech), a Chinese company specializing in the design and...

Strategic installations and economic infrastructures along the borders, at sea and underwater have been a target of hostile states, terrorist organizations, and other elements....
offshore security

The Israeli Air Force (IAF) is replacing its manned Sea Scan maritime patrol aircrafts, with Israel Aerospace Industries' (IAI) maritime version of the Heron...
waterside security barrier

Various solutions have been developed to protect ships in naval bases from hostile attacks. HALO Maritime Defense Systems has won a $3.4 million two-year contract...
border security

A new data-driven technology will detect border security risk. Two companies will collaborate in the development of an advanced data analytics solution for automated...
port security

The US DHS has approved a new technology for port security. idSoftware, an identification software company with offices in Jacksonville, Florida, has earned approval...
situational awareness

Advanced marine electronics systems will be supplied to the US Coast Guard for enhancing situational awareness and navigation capabilities. FLIR Systems has been awarded...
unmanned

InnoCorp, LLC has introduced the SubMurres, an unmanned underwater vehicle (UUV) and an unmanned aerial vehicle (UAV) drone. It transitions from water to air...

iHLS Events