X-rays with a local touch

November 2016 Editor's Choice, Access Control & Identity Management, Asset Management, Security Services & Risk Management

Roteck is an international company operating from South Africa that designs and manufactures a range of security products, from bag scanners through to access control technologies and people scanners, among others. The latest innovation from the company is its own branded baggage X-ray scanner, with a few additional features and a new business concept.

Günther Wockelmann heads up the company and demonstrated Roteck’s scanners to Hi-Tech Security Solutions. The locally manufactured baggage X-ray scanner functions much the same as any other scanner one finds at an airport or at the entrance to certain buildings. A bag of some sort passes through the machine, is scanned, and an image is displayed on a screen.

Roteck has taken this concept a step further with the introduction of an automated conveyor belt. The conveyor belt remains motionless until an object is placed on it, at which time it starts up and moves the object through the X-ray scanner, stopping once the object reaches the other side. This requires no operator input and no buttons need to be pressed to make the system work. Additionally, the system is bi-directional.

Wockelmann explains that not only will this save energy as the belt only moves when there is something to scan, it will also prolong its lifespan as it reduces the wear and tear considerably. Another benefit is that there no longer needs to be a roller table for people to put their goods on and push them into the scanner, reducing the overall space the X-ray system consumes.

The image of the X-rayed object is sent to a monitor (as expected), but in Roteck’s case, the signal is sent via a Wi-Fi network. This means the monitor can be further away from the scanner than normal if required, but also that anyone with the correct authorisation and the application can view what is on the monitor. Providing a second set of eyes will ensure that mistakes are minimised, while even allowing supervisors to view the images on a tablet – via the company’s app – as long as they are in range of the Wi-Fi signal (normally a maximum of 100 metres).

Roteck has also invented a simple solution to the issue of missing trays. People often put personal items in a tray to be scanned, but trays seem to always be on the other side of the scanner. Roteck’s tray holder allows trays to be slotted into it once they have been used and automatically feeds used trays back to the front of the machine, without requiring any electrical power or human interference.

Other products

Roteck also offers a bag scanner using white and UV light sources to scan smaller bags. The system delivers no radiation as there are no X-rays, but has four cameras onboard. Three cameras are used to view the object, while one is used to cover the person putting the bag into the scanner. The images are displayed on a split screen, and an operator can zoom in on an image if something suspect is found.

Roteck has built a metal detector into the scanner as an additional check against firearms. The bag scanner is also equipped with an automated conveyor belt which only operates when an object is placed on it.

The bag scanner runs on 12 volts, which means it can be used in remote areas where there is no electricity, or inconsistent power.

A range of people scanners is also available from the company, as well as a mobile scanning unit – designed to be used temporarily for security at remote locations. The technology in the mobile unit also runs on 12 volts, making its portability much simpler.

The mobile unit has two passages running through the trailer with doors on each end. People enter from one side, put their bags and other goods on a scanner, which starts automatically, before walking through the people scanner and out the other door.

A new marketing concept

To differentiate itself from its competitors, Roteck has made its various scanners available in a multitude of colours. Customers can have their own colour scheme and/or logos on the scanners, or they can advertise products and services on the devices.

Roteck has also come up with a new business model for companies that require these scanners but don’t want to spend the capex required to purchase them. In high traffic areas, such as shopping centres, Roteck will provide the scanners free of charge while selling advertising on the machines to pay for the running and maintenance costs. People are naturally forced to slow down and stop at these checking points, which means they are prime advertising targets. More information can be found on http://theroteckway.co.za

For more information contact Roteck South Africa, +27 (0)11 024 7322, info@roteck.co.za, www.roteck.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Visual Intelligence for driver and vehicle safety
News & Events Asset Management Transport (Industry)
Webfleet, Bridgestone’s fleet management solution, and Peregrine.ai, a Berlin-based startup transforming mobility through AI-powered vision systems, announced the launch of a next-generation driver assistance solution.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Global hub for predictive road safety intelligence
News & Events Asset Management Transport (Industry)
One year since its formation, Netstar’s advanced Global Fleet Bureau is more than an operational facility for international fleet management, it has become a big-data nerve centre delivering unprecedented value to clients.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.