Please fill out the form to request a quote. We’ll contact you shortly.


Under Train Inspection Surveillance System

Under Train Scanning Imaging System MDRS-UTIS-2000; They are used for automatic detection of prohibited substances hidden under the train and for transmitting the detected image to a distant point. Our under-train scanning systems used for the purpose of combating smuggling and terrorism. It consists of parts such as Linescan and areascan camera system installed between the train tracks, Computer and software part, Number reader camera system and software on the trains, Solar panels, Inverters, Battery kits, Satellite-controlled antenna system that transmits images to the far point.

Trains in the new era, long-distance drugs, arms smuggling, explosives and so on are at risk of being used by terrorist organizations and drug dealers in transportation. The search and scanning areas that our country's security forces have set up on inter-city roads have left no chance to open their eyes to traders and terrorist organizations. These networks which use different methods set their eyes on trains to realize their new transports. Before the trains depart for a long distance, the packages they want to carry are placed under the train by networks traders and organizations in the parking area where they are located with a strong magnet. Quantum type magnets used because the train consists of a complete steel structure adhere very tightly to the bottom of the train. And it is sent to its destination without falling on the ground. Our security forces determined how they were sent and took the necessary precautions. One of these measures is the under-train scanning system.

MAdoors Manufacturing UTIS-2000, which belongs to our company in its R&D studies is 100% USA made, it is the product of our country. Our scanning system which is placed on the rails at certain distances records the image of the train bottom. It automatically detects if something is placed under one of the routes it switches between certain distances. Automatically detects the banned substance. Signs give audible warning. It transmits the image via satellite to the remote point wirelessly.

These organizations place old iPhone phones on packages. And with the Find iPhone application, they try to find the materials they put with their hands at a distant point as they put them again. But our country's security forces have taken their precautions. When each train arrives at the stop it is automatically activated with the Jammer trigger mounted on the train. Our security forces capture the crime material before they get their deliveries.

Our solar panels systems generate the energy required for UTIS-2000. And it provides the necessary energy to our under-train scanning system without interruption. Inverters 12 volt dc. the energy is 220 volts ac. It inverts to voltage and camera systems work with this energy. Our plate reading camera automatically reads the numbers and letters numbered on the train. And it records simultaneously with the under-train scan image. Image transmission is made via satellite to a remote point. Our systems also have a sabotage alarm system, a perimeter camera and an image detection recording system. In case of emergency, information is transmitted to the remote point. Generally, our systems are installed in the entrance or exit areas of stations and train stations because it is easy to control security. For more detailed information, please contact our engineers.

Key Features:

System Designation:

  • Model: MDRS-UTIS-2000
  • Under Train Scanning Imaging System
  • R&D developed product
  • Domestic production

Primary Purpose:

  • Automatic detection of prohibited substances
  • Hidden contraband detection under trains
  • Combating smuggling
  • Counter-terrorism operations
  • Security force support

System Components:

Camera Systems:

  • Linescan camera system
  • Areascan camera system
  • Installed between train tracks
  • Number reader camera system
  • Perimeter camera
  • Image detection recording

Computer & Software:

  • Computer processing unit
  • Specialized software
  • Automatic detection algorithms
  • Image analysis software
  • Train number reading software

Power System:

  • Solar panels
  • Inverters (12V DC to 220V AC)
  • Battery kits
  • Uninterrupted power supply
  • Self-sufficient energy generation

Communication:

  • Satellite-controlled antenna system
  • Wireless image transmission
  • Remote point connectivity
  • Satellite data transmission
  • Long-distance communication

Threat Detection:

Contraband Types:

  • Drugs and narcotics
  • Arms and weapons
  • Explosives
  • Prohibited substances
  • Smuggled materials

Detection Method:

  • Automatic detection
  • Image recording
  • Comparison analysis
  • Anomaly identification
  • Real-time monitoring

Operational Principle:

  • Packages attached with strong magnets
  • Quantum type magnets used
  • Adheres tightly to steel train structure
  • Placed in parking areas before departure
  • Sent to destination without falling

Security Countermeasures:

  • Under-train scanning detection
  • Jammer trigger activation at stops
  • Automatic jammer activation
  • GPS tracking prevention (iPhone Find My)
  • Material capture before delivery

Installation:

  • Placed on rails at certain distances
  • Between train tracks
  • Station entrance/exit areas
  • Train station locations
  • Strategic checkpoints

Automatic Functions:

  • Automatic detection
  • Automatic recording
  • Automatic plate reading
  • Automatic audible warning
  • Automatic satellite transmission

Warning Systems:

  • Audible warning signals
  • Visual alerts
  • Remote notification
  • Sabotage alarm system
  • Emergency information transmission

Image Processing:

  • Train bottom recording
  • Simultaneous plate reading
  • Image comparison
  • Anomaly detection
  • Archive recording

Plate Reading System:

  • Automatic number reading
  • Letter recognition
  • Train identification
  • Simultaneous recording
  • Data correlation

Power Conversion:

  • 12 volt DC input
  • 220 volt AC output
  • Inverter technology
  • Camera system power
  • Continuous operation

Remote Monitoring:

  • Satellite image transmission
  • Wireless connectivity
  • Remote point access
  • Real-time viewing
  • Centralized monitoring

Security Features:

  • Sabotage alarm system
  • Perimeter security camera
  • Image detection recording
  • Emergency transmission
  • Multi-layer protection

Installation Locations:

  • Station entrance areas
  • Station exit areas
  • Train station checkpoints
  • Strategic rail positions
  • Security control points

Energy Independence:

  • Solar panel generation
  • Self-sufficient power
  • Battery backup
  • Uninterrupted operation
  • No external power dependency

Detection Process:

  1. Train passes over cameras
  2. Bottom surface scanned
  3. Image recorded automatically
  4. Plate number read simultaneously
  5. Anomaly detected if present
  6. Audible warning triggered
  7. Image transmitted via satellite
  8. Remote monitoring notified

Counter-Smuggling Features:

  • Magnetic attachment detection
  • Hidden package identification
  • GPS tracker neutralization (jammer)
  • Pre-delivery interception
  • Evidence capture

Jammer Integration:

  • Mounted on train
  • Automatic activation at stops
  • iPhone/GPS signal blocking
  • Find My app neutralization
  • Material recovery before pickup

Modern Smuggling Methods:

  • Strong magnet attachment
  • Quantum type magnets
  • Parking area placement
  • iPhone GPS tracking
  • Remote pickup attempts

System Advantages:

  • Self-powered system
  • Wireless operation
  • Automatic detection
  • Real-time transmission

Recording Capabilities:

  • Train bottom images
  • Plate/number reading
  • Timestamp correlation
  • Synchronized recording
  • Archive storage

Alarm Systems:

  • Sabotage detection
  • Perimeter breach alert
  • Emergency notification
  • Remote transmission
  • Multi-level warning

Applications:

  • Railway security
  • Train station security
  • Border rail crossings
  • Inter-city rail lines
  • Strategic checkpoints

Combat Targets:

  • Drug trafficking
  • Arms smuggling
  • Explosive transport
  • Terrorist operations
  • Organized crime networks

Security Force Support:

  • Material evidence capture
  • Pre-delivery interception
  • Intelligence gathering
  • Operational support
  • Crime prevention

System Intelligence:

  • Automatic anomaly detection
  • Image comparison
  • Pattern recognition
  • Threat identification
  • Alert generation

Installation Strategy:

  • Easy security control locations
  • Entrance/exit positioning
  • Strategic placement
  • Optimal coverage
  • Security maximization