In Part 1 and Part 2 of the series on Situational Awareness Management System SAMS, the author introduces details of the situational awareness and sensor management systems, as well as SAMS key equipment and components. In Part 3, the author goes deeper into the advanced functions of SAMS.

Advanced functions of SAMS

SAMS also has the following functions:

  • Arrange alarm events.
  • Automatically open an incident with all relevant information for an event selected by an operator, when the operator or target rating system is at risk at a predetermined level.
  • There are options to allow employees to manually operate input information of the event into the alarm queue through a menu of the
  • Automatically show menu, allowing security personnel to be able to open an event
  • Showing menu, allowing operators to open an event on their own.
  • Automatically assign priority based on the types of problem.
  • Allow security operators to manually assign priority.
  • Store all events.
  • Show options to manage events.
  • Data from SAMS is updated in real time and displayed on the workstation.
  • Provide instructions to operators for each type of incident.
  • Fully integrated into a Resource Management System (RMS).
  • Allow different parties to update an issue by access level and record updates.
  • Allows operators to attach documents such as pdf, word, excel, jpeg to the problem
  • Allow supervisors to know all incidents in his operation
  • Be able to send messages via SMS or email.
  • Instruct operators and show the related procedures for the types of incident.
  • Allow operators to open the problem easily by clicking a tab on the list.
  • Increase the alert if a problem is not updated or closed for a predetermined period of time.


Software supporting SAMS includes all translation, edition, debugging, paths, libraries, references, hardware diagnostics, and other utilities required for creating, maintaining, and modifying all software and hardware of the system. SAMS is provided with software and hardware maintenance tools and system diagnostics tools.

Operating system

SAMS is designed to allow system operators to connect with SAMS at the same time without reducing system performance.

Processing capacity

At least SAMS can simultaneously handle an average of 100 events or maximum 1000 events per second. SAMS data receives data faster than 1000 events per second. No data is lost and SAMS processes all events in the sequence or based on the priority of the event.

SAMS can allow all system operators to use the system without affecting its performance or affecting other operators.

Function control

Monitoring the system can be performed simultaneously with the operating system thanks to a separate monitor. Available functions are used to monitor and manage the system. Using these functions is delegated by authorized persons along with the software password. Authorization and password make limitation to programming or system configuration. The performance of the system is not impaired by these controls.

Access rights and permissions

SAMS is compatible with MS Windows Active Directory for user approval and password.

The system supporting an access authorization mechanism allows many features in the system to be provided or retrieved to/from a user depending on the settings. Hence a manager can configure the system in which users and groups will have the access right to the data related to their role.

Tracking data belongs to each activity. The system can be configured so that the tracking data will be filtered into corresponding operations and appear in the display screen. In addition, the system can divide the area into smaller parts corresponding to each operator’s house, the operator will be responsible for that small area. By applying a geographic filter, track data for each region will appear in that activity area.

For example, an employee will be responsible for monitoring the operation of ships in the area where he/she is assigned. Operators are granted access right to the areas for which they are responsible and therefore only see tracking data in that area. In case there is an incident in both areas, the manager can change access right allowing the temporary operator to see more areas.

Access authorization mechanism can reduce the complexity of the user interface. For example, if access rights to configure input data are revoked, this menu will be removed from the user interface. Therefore, it is easier to use and reduces the training burden for each role in the system.

  • SAMS allows designated individuals (System Administration) allocating and changing the authorization system to restrict access rights to each designated individual.
  • SAMS has the ability to restrict users from accessing a specific function (redefining access right of user). Each user has a pre-set of rights to access the data and programs in the system.
  • Through the security/access control system, users are decentralized so that certain system commands and instructions can not be made without the corresponding authority level. Accessing to data and files is controlled separately by the system’s decentralized function.
  • Individuals with differentiated rights include:

O Managers

O Supervisor

O System maintenance staff

O Executives

O Viewers

 Check and store

Testing is defined as logging in a series of related events. A category with detailed information of checking all activities of the system is maintained by the system including all system logins and attempts to log into the system which are saved by date and time, ID number and ID of the login machine.

Change data stored

All alarms, action commands and system status which are posted are recorded in the test file. The test file is sized to hold the activity for at least a month.

Data from the audit file will be deleted after it has been copied to disk, tape, or other storage devices.

A system monitor has the ability to print different types of reports generated from the audit file. If the audit file is full, a message is displayed to alert the operator that the audit file needs to be transferred to the repository.

Part 1:

Part 2:

Song Phuong – FPT IS

Related posts: