FAIL (the browser should render some flash content, not this).

Newsletter

Name:

Email:



iOmniscient Hospitality
Print Email
       
 

iQ - 

 Hospitality

 
   
       
  Applications:        
 

Security
• Theft prevention system to identify missing objects instantly even in a crowded environment
• Graffiti and Vandalism detection
• Perimeter protection to prevent intrusion in restricted areas or after hours
• Prevent unauthorized access with tailgating and Face Recognition system to heighten people access
• Loitering detection and the use of License Plate Recognition system to heighten security in the car park
• Detection of suspicious behaviour (e.g. running, skateboarding, loitering, wrong way, man-down, attack)
• Surveillance system health check to prevent camera tampering or sabotage

Operations
• Adhere with fire and safety regulations by understanding building and area capacity
• Better customer services and resource planning with the use of people counting and Queue Management
system to understand occupancy and the average waiting time
• Better car park management with the use of Counting, License Plate Recognition, Tailgating, Parking and
Violation Detection systems
• Efficient Lost and Found process with timely identification for any left or unattended objects
• Better housekeeping process (e.g. the use of iQ-140/180 to clear up the left trays, trash in a timely manner)
• Identification of VIPs using Face Recognition system

Safety
• Smoke and Fire detection (conventional smoke and fire detection in not effective in areas with high ceilings)
• Crowd management and control particularly during special events
• Detection of skateboarding and running in certain areas
• Detection of water spill
• Detection of slip and fall for public liability or man-down detection

And many more...

   

The hospitality industry consists of a range of organizations, such as hotels, casinos, restaurants and private clubs. In the hospitality industry, a key issue is the theft of inventory, particularly alcohol. The management of these businesses is usually focused on the front of the organization - the cooking, serving, customers, ambience and marketing. Many hospitality organizations also need to keep large amounts of cash on the premises so it is important for these organizations to be protected from trespassers. A large part of hospitality requires good customer service. To ensure this, many organizations have a VIP list to keep a record of important customers' details and preferences so they can personalize their service to the customers.

Why iOmniscient's iQ-Hospitality?
iQ-Hospitality is a comprehensive portfolio of applications that that can fulfill each of the specific security, safety and operations requirements, while operating as a single integrated system to ensure quick distribution of information to all concerned when any event occurs. To prevent inventory theft, iQ-Hospitality has an event based recording system which can be set up at the back door to capture an image of every person that enters and leaves the premises via that point. This system only captures an image of the person's face rather than archiving large amounts of footage, which saves huge amounts of storage. This is necessary as it may be 3 months before any stock is discovered missing by the organization. iQ-Hospitality has a many-to-many face recognition application which can be used to enhance customer service through a VIP list to identify and personally greet customers. This application can also be used to create a black list so unwelcome patrons are not allowed access to the premises.

Automated Surveillance Action Platform (ASAP):
iQ-Hospitality is armed with iOmniscient's unique Nuisance Alarm Minimization System (NAMS) which can cope with the complex and crowded scenes that exist in the real world, thus ensuring reliable results. Coupled with iOmniscient's patented iQ-Hawk technology, which simultaneously detects events and identifies people and vehicles on the same camera, iQ-Hospitality can deliver an automated response system which can then be tightly linked into the user's own processes.