Audio Analyzer measuring device Laboratory Information software system

61 SPEKTEK ALAT LABORATORIUM PENGEMBANGAN INDUSTRI TEKNOLOGI KEPOLISIAN KSA T.A. 2011. 53 Must have Supporting letter from principal and supporting letter from local support Distributor in indonesia

m. Audio Analyzer measuring device

1 Male BNC to male BNC cable, 1.2m, jade gray, 10 Hz to 100 kHz 2 Male BNC to male RCA cable, 2m, black 3 Male XLR to female XLR, 2m, black 4 Cable, digital serial interface, BNC Accesoory Kit 5 Audio analyzer 2 channel with 2 in 1 digital audio card, AES3-SPDIF and DSI 6 Frequency Range : 10 Hz - 100 kHz accuracy : 5 ppm 7 ±1 amplitude accuracy for generator and analyzer 8 -101dB analyzer residual distortion + noise at 20 Hz to 20 kHz 9 ±0.01dB signal flatness 10 AES3SPDIF and DSI standard digital audio formats 11 Test a variety of current components and applications with a logic level input range of 1.2 V to 3.3 V DSI. 12 Analyze a wide range of applications with multiple DSI formats: I2S, Left Justified, Right Justified and DSP. 13 Select generator, analyzer, graph and sweep modes with one-button access. 14 Characterize signal-to-noise ratios, SINAD, IMD, DFD, THD+N ratio, THD+N level, crosstalk and more. Apply weighting functions, standard filters and custom filters 15 Stimulate the device with high-quality signals and arbitrary waveforms 16 View numerical and graphical displays of measurement results 17 Connect to a PC through GPIB, LANLXI C and USB interfaces, LIMS Integration 18 Audio analyzer 2 channel with 2 in 1 digital audio card, AES3-SPDIF and DSI 19 Cables included 20 Analog and Digital Audio Analysis 21 numerical and graphical displays of measurement results 22 2 in 1 screen generator and analyzer in the same display screen 23 Must have Supporting letter from principal and supporting letter from local support Distributor in indonesia

n. Laboratory Information software system

1 Application Server – 2 units a Well known brand with world class supports and already established in the market for quite long time b Supported by any popular Operating Systems with ease of use and ease of maintenance c Work well with any local specific environment such as electricity standard, environments condition such as temperature, humidity, and any connection standard d Using standard protocol such as IP for interconnectivity and SIP for interfacing between peripheral and central system e Processor Minimum for the server is 2.5 GHz f Standard Memory : 16 GB g NIC : 2 Port h Chassis Form Factor : 1U 2 U 3U 4U Rack mount 62 SPEKTEK ALAT LABORATORIUM PENGEMBANGAN INDUSTRI TEKNOLOGI KEPOLISIAN KSA T.A. 2011. 2 RFID Card Visitor Card – 500 units a Protocol: EPCglobal® Gen 2 and ISO18000-6C\ b Frequency: Worldwide operation in the UHF RFID frequency bands 860- 960MHz c Read Range: Up to 50 feet depending on application and environment d Memory: 128 bits of EPC memory, 512 bits of USER memory, 96 bits of read- only TID memory e ISOIEC-7810-2002 compliant f Passive operation no battery required g Ultrahigh-frequency technology h Multi-application card available with and without magnetic stripe 3 RFID Metal Mount Tag Equipments – 3000 units a Material: .002” thick polypropylene. Optional materials include polyester and poly-carbonate. b Standard Adhesive: 316” closed cell polyolefin foam adhesive is standard. Optional adhesives available. c Construction: RFID inlay encapsulated between .002” thick polypropylene d Styles:One-Color, Two-Color, Three-Color, Four-Color e Numbering Options: No Numbers Copy Only, SerializedUnserialized Numbers, Bar Code with Human Readable Numbers RFID inlay programming included f Standard Sizes: No. 917 – 4 ½ x 1”No. 1067 – 4 ¼ x 4 ¼ Additional sizes available g Standard Colors: black, red, yellow, green and blueCustom colors available h Read Range: between 5-6 feet. i Standard RFID Inlay: standard. Optional inlays available. j Environment: Mild and moderate. Resists moderate solvents and causticsacids. 4 System Software a Operating System, Database, Third Party Tools 1 The operating system must be able to utilize entire capacity of Processors, RAM and Storage and running in the best performance 2 The operating system shall support scalability, redundancy, and expandability 3 The operating system must be able to implement security hardening to ensure the maximum security level without compromising 4 Database should provide capability for complex SQL query, store procedure, backup and recovery, roll back and fault tolerant 5 Database should provide ability to process transactions without degrading performance 6 Database should provide high level of security and provide ability to control the access right in all layer of database schema 7 Any third parties required to enhance the Operating System, Database or Application Development shall be seamlessly integrated without any impact on the performance, security, and availability and must be verified by the related OS or Database being used 8 The third parties selected must not be provide any chance for security breaches such as virus, worm and malware intrusion, or hack attack 63 SPEKTEK ALAT LABORATORIUM PENGEMBANGAN INDUSTRI TEKNOLOGI KEPOLISIAN KSA T.A. 2011. b Application 1 Must be developed using Object Oriented Modeling and Programming to ensure the modularity and expandability Service Oriented Architecture is preferred 2 Must be able to be customized easily and fast 3 Able to run the application in any kind of browser at least IE, Chrome, Mozilla, and opera. 4 Should provide interface with external system using Web Service, XML, or API. Any integration via database connection must be established through intermediate database. Direct connection to production database is not recommended 5 Provide facility to importexport using txt or csv file. 5 Laboratory Measurement System a Module Initialization 1 This module is used during installation and configuration. Before being used any parameters required shall be prepared or created as required by the application. Parameter such as numbering system for applicants, devices, naming convention, device classtype, any meta data related as to master data must be prepare in the first place 2 Setting passing criteria for certification 3 This module is setup by administrator and later will only be changed or added by administrator as well. 4 User management is also configured during Initialization. The access right control is not only for the modules in the application and toward database but also the physical location can be entered by applicant, or other users such as operator during measurement of the device being proposed for certification 5 This module also provide facilities for importing files for usersmaster data. If there are existing application there should be a migration plan and execution to ensure that all working data are available in the new application 6 This module also used for initializing the RFID Card and RFID Tag to be ready for use. b Module Measurement 1 This module will provide interface to measurement tool instrument using serial or TCPIP connection or any other. Any specific protocol will be allowed as long as the communication software is provided. The communication software should be easily configurable and parameterized to make sure that the software may adopt any changes during implementation. This Module has to provide manual input. 2 The module will fetch all data during measurement process and stored directly the result in the database for further processing. Fetching data from measurement tools that don’t have any TCPIP or Serial Connection 64 SPEKTEK ALAT LABORATORIUM PENGEMBANGAN INDUSTRI TEKNOLOGI KEPOLISIAN KSA T.A. 2011. is done by manually input from user. There for the module should provide connection options for user. User able to choose how the data should be fetched TCPIP ,Serial connection, USB flash storage, etc. 3 The module should be able to anticipate any condition such as redo the measurement without any duplication, and start and stop measurement based on schedule. c Module Generate Certificate 1 This module will match the passing criteria with the result of measurement and generate scoring. If meeting the minimum score for passing the criteria then the device is obliged for certification 2 The score and copy of certification can be sent via email to applicant. The printed version must be taken from the Certification Office 3 The Certification Service is supported via internet if provided. The applicant may check historically what of devices and how many of them had been applied for certification. The history all certification process such as how long the process taken, was there any delay or mistakes during application process, all can be accessed via internet if provided. d Module Reporting 1 Provided with standard and ad hoc reporting during certification 2 Provided with queryfilter facilities where operator end user select their own field to be queried and exported to excel, CSV for further processing such as statistic analysis, etc. e Provided with dashboard to provide users with the overall summary of certification process. The dashboard should be able to configure to present any information required by any specific users. 6 Document Management System a General Specification To support the organization’s document management needs by providing a broad set of document management capabilities that enable to do the following: 1 Store, organize, and locate documents. 2 Ensure the consistency of documents. 3 Manage metadata for documents. 4 Help protect documents from unauthorized access or use. 5 Ensure consistent business processes workflows for how documents are handled. b Detail Specification 1 Store and organize documents in the Document sites The Document site can be used to create sites that are optimized for creating, using, and storing large numbers of documents. Sites that are created from the Document site have specialized document management features such as 65 SPEKTEK ALAT LABORATORIUM PENGEMBANGAN INDUSTRI TEKNOLOGI KEPOLISIAN KSA T.A. 2011. required check-out and major-and-minor document versioning, which are turned on by default. Required check-out helps prevent conflicts and confusion over changes, because only one user can change a file at a given time. Versioning allows you to track changes to documents, and it helps you manage content as you revise it. Versioning is especially helpful when several people work together on projects, or when information goes through several stages of development and review. 2 Use content types to manage documents consistently Provide Content types capability to enable organizations to organize, manage, and handle content in a consistent way across a site collection. It defines a content type for each type of document or information product that your organization creates to ensure that these different types of documents are handled in a consistent way. 3 Manage document properties. Provide a capability to manage document properties by browsing or searching for the metadata document properties that is saved along with files. The application should be able to help people to create and update metadata for documents. Whenever open or edit a document that is saved, it can automatically edit the server properties for that document. If custom columns are added to the content type for that document or to the library where that document is saved, these column values are displayed as property fields in the Document Property 4 Help protect documents. Provides several ways for organizations to help protect documents that are saved to a SharePoint site from unauthorized access or use. Organizations can apply Information Rights Management IRM to an entire document library to protect an entire set of documents. IRM enables you to limit the actions that users can take on files that are downloaded from SharePoint lists or libraries. IRM encrypts the downloaded files and limits the set of users and programs that are allowed to decrypt these files. IRM can also limit the rights of the users who are allowed to read files, so that they cannot take actions such as printing copies of the files or copying text from them. IRM can thus help your organization to enforce corporate policies that govern the control and dissemination of confidential or proprietary information. The Application should also enable to protect files in other ways. To prevent people from reading drafts of documents in progress, you can set up a document library with major and minor versioning and then specify which groups of people are allowed to read minor versions drafts. Drafts are the minor versions of files or list items that are not yet approved as major. If you set up that library to require content approval, then drafts are not published as major versions until someone with the appropriate permissions approves the document for publication as a major draft. Another way to help protect documents is by configuring permissions for individual folders, list items, or documents. If there are only one or two files in a document library to which 66 SPEKTEK ALAT LABORATORIUM PENGEMBANGAN INDUSTRI TEKNOLOGI KEPOLISIAN KSA T.A. 2011. you want to restrict access, you can edit the permissions for these individual items to change who has the permission to view or edit them. 5 Manage document-related processes with workflows To support common document-related business processes, the Application should provide built-in workflows that organizations can use to manage tasks such as document review, approval, and signature collection. Workflow is defined as the automated movement of documents or items through a sequence of actions or tasks that are related to a business process. Workflows help organizations manage document-related business processes more efficiently, because they automatically track and manage the human tasks involved in these processes. 6 Provision users in Active Directory, Exchange Server, Office Communications Server and Microsoft Lync server 7 Easily access data and processes from line of business and external systems using web services, SQL, LDAP, XML, BizTalk and other common middleware and open interfaces 8 Provides a tool for drag-and-drop workflow designing, connectivity and advanced workflow features to the Microsoft SharePoint platform and it is empowered to quickly and easily automate business processes; from a simple leave approval request, to complex integration across external applications and data sources 9 Delegation allows ad hoc delegation of workflow tasks or delegation to another user for a set period of time 10 Scheduled and timed workflows for repeated processes 11 Rich workflow notifications using email, instant messenger and SMS 12 Control which actions users can access 13 Process diagram annotation and print view 14 Change approval process for published workflows 15 Provide workflow designer tool that Integrate to Microsoft Sharepoint component such as Business Connectivity Services, Excel Services, InfoPath forms, Reusable workflows, Site workflows, Content Type workflows, and Document sets

O. Electronic equipment tools