Remote - Fall 2013 - (Page 14)
Feature Article
Combining Sensors for More Efficient Perimeter Protection
Eric Olson, Vice President of Marketing
PureTech Systems
Protecting critical facilities and perimeters is a critical accountability
faced by security professionals. It is the security professional’s job to have
a system in place to manage security situations in an effective manner,
within the constraints of a limited budget. Fence intrusion systems and
camera enabled video analytics systems are two popular forms of perimeter
protection for critical facilities. Historically, facilities have often chosen either a fence system or an intelligent camera system to provide their primary
perimeter protection. In many cases the choice of one or the other may be
insufficient, when the combination of these sensor technologies can result in
a more efficient and effective perimeter solution.
Fence Intrusion Systems
Fence Intrusion Detection Systems (FIDS) fall into a category of sensors that provide linear type protection perfect for following a defined
perimeter. The systems range greatly in style and technology. The most
popular systems in today’s market are the ones that measure a disturbance
of the fence electrically over a coax or fiber and then analyze and report
relative information about that disturbance, including location. They also
have the ability to tune out typical nuisance events like wind or vibrations from items such as nearby roads or taxiways. In many cases, these
products mount physically to a fence, but in other cases they may be buried
along the perimeter.
ingly select and accept the decision that favors a visual input. The visual
aspect of VCA solutions, including set up, detection and notification all
plays to our comfort as humans, and security personnel, to base decisions
on visual data.
Another advantage
is the vast amount of
information that can
be utilized. Video
has many dimensions,
many of which can be
used in detecting and
reporting. This includes attributes such
as distance, proximity,
color, time, texture,
and contrast. This
Video Analytics can alarm on predictive behavior, such as loitering
allows video analytnear the perimeter.
ics systems to be very
specific in their alarm
criteria and reported alarm data. Setting a VCA alarm to detect a specific
threat or safety issue such as “large trucks entering an area traveling at
excessive speeds during working hours” is easily accommodated.
Complementary Sensors
Fence Intrusion Systems can follow varied terrain, while a video-based system may encounter
blind-zones and require additional sensors for coverage.
These intrusion systems have several capabilities that make them attractive for perimeter protection. One of these is their immunity to some
weather conditions. With the exception of very deep accumulating snow,
fence intrusion systems continue to detect in rain, fog, snow and wind,
albeit with potentially higher false alarm rates under such conditions. These
systems have been deployed in a vast array of climates and continue to
perform as intended.
A condition that is often overlooked, or perhaps “under budgeted,” is
detection capabilities in low light conditions. This type of system shines in
these situations, as it requires no illumination to detect.
Finally, fence sensors adapt well to varied terrain and jagged perimeters.
Since they attach to the fence, or follow its base, the varied direction and
elevation has no impact on detection capabilities. Of course, the fence must
be maintained in good working order to avoid false alarms from excess
fence movement.
Video Analytics/Cameras
The use of intelligent imaging sensors is also a popular and effective
perimeter protection choice. Intelligent cameras come in many forms, analytics may be embedded in the camera, in a nearby edge-device or it may
reside as a software function in a DVR/NVR.
Video Analytics or Video Content Analysis (VCA) goes well beyond
motion detection. Most systems provide a much higher level of detection, discrimination and identification. These systems analyze image pixels to understand what constitutes the scene and what is considered an object of interest.
An obvious advantage of VCA systems is the ability to actually see the
object of interest. Studies show that vision is the dominant sense for humans. When placed in conflict with other senses, humans will overwhelm14
www.RemoteMagazine.com
Although both types of sensors, Fence Intrusion Detection and Video
Analytics, are excellent choices for perimeter protection, using them together provides for a very complementary solution.
One of the most obvious benefits is performance in low visibility weather conditions. Video systems must be able to “see” the intrusion. In cases
where this is not possible, the system cannot provide alarms as it is not
receiving images. Of course, the use of thermal cameras with video analytics enhances detection in weather conditions that affect visibility. On the
other hand, the fence system, although not being able to provide as robust
target information, can continue to detect even when visibility is impaired.
Fence systems are very linear in nature and discrete in their alarm
capabilities. In most cases, the alarm indicates an intrusion. But they
cannot provide an early warning (i.e. approaching the perimeter), nor do
they afford a post mortem analysis. Video Analytics offer an area-based
sensing capability, not merely a singular line. This affords the ability to
create many zones of interest and look for various suspicious activities such
as loitering, speeding, crowding or classes of vehicle. Likewise, adding a
video based component helps to provide the “how” factor. For future prevention it may be nice to know how the fence was breached. A video based
component can complement a fence system with this type of predictive and
post-mortem analysis.
It is often easier for a facility to obtain funds for a non-recurring purchase versus asking for an increase in yearly operating budget. Of course
this varies by organization. The combination of a Fence System and Video
Analytics system can help minimize those recurring costs.
One “recurring cost” that can be mitigated by combining sensors is the
ability to efficiently respond to the perimeter system. Often time facilities,
such as utilities, may have site locations that are separated by many miles.
Some locations may be unmanned. The combination of fence and video
sensor technology can decrease the recurring cost of validating alarms.
Video analytics can help to automatically validate the fence alarm, automatically follow the intruder with a PTZ camera and provide video alarm
information. The security professional now has cost saving options. When
the system alarms due to kids jumping the fence, but doing no damage, the
flexibility to verify the event and track it to confirm no harm was done, may
save valuable time and fuel costs by not needing to immediately react.
http://www.RemoteMagazine.com
Table of Contents for the Digital Edition of Remote - Fall 2013
Editor's Choice
Instrumentation for Produced Water Applications
Multi-touch SCADA Technology: Intuitive Functionality Advances Automation
The Use of Machine-to-Machine Communication in Environmental Impact Monitoring
Monitoring Electrical Properties of Pumps and Water Treatment Systems
Combining Sensors for Efficient Perimeter Protection
Building Flexibility
SCADA
Remote Conference Update
Networking
Security
Onsite Power
Industry News
Application Feature
Remote - Fall 2013
https://www.nxtbook.com/nxtbooks/webcom/remote_2016winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2016fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2016
https://www.nxtbook.com/nxtbooks/webcom/remote_2016spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2015fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2015m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2015spring
https://www.nxtbook.com/nxtbooks/webcom/remote_industrialnetworking2014
https://www.nxtbook.com/nxtbooks/webcom/remote_2014fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2014m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2014spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2013winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2013m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2013fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2013summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2013spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2012winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2012m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2012fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2012summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2012scada
https://www.nxtbook.com/nxtbooks/webcom/remote_2012spring
https://www.nxtbook.com/nxtbooks/webcom/remote_201112
https://www.nxtbook.com/nxtbooks/webcom/remote_201110
https://www.nxtbook.com/nxtbooks/webcom/remote_201108
https://www.nxtbookmedia.com