Perimeter protection in Ghana

October 2019 Mining (Industry), Perimeter Security, Alarms & Intruder Detection

Protecting the perimeter of a mine is difficult, primarily because of the size of the property and subsequently the length of the perimeter. Due to these constraints and the difficulty associated in verifying alarm conditions, protecting large perimeters effectively is a difficult and expensive process.

On the other hand, it is more feasible and practical to protect strategic sites and process areas where perimeters are more manageable and security personnel can verify and respond to alarms in a reasonable time.

This concept has been implemented at a gold mine in Ghana where the client has erected a dual fence with AcoustAlert PIDS fence detection on both inner and outer fence lines. The fence has been split into eight zones of up to 300 metres each, affording detection of an intrusion into their critical processing plant area. The dual perimeter fence is approximately 2400 metres long and the AcoustAlert field processors are housed in specially manufactured steel kiosks around the perimeter, between the two fence lines in the dead-man’s zone.

One concern from the client was our initial proposal to use fibre-optic cable around the site in order to LAN link all AcoustAlert field processors. The difficulty in a place like Ghana is getting technical guys to splice and maintain the fibre LAN network infrastructure. To solve this problem, AcoustAlert used two-wire copper Ethernet extenders which can extend Ethernet over many hundreds of metres over a normal two core cable. This removed the difficulty around maintenance. Specific lightning protection was implemented for the two-wire copper connection along with lightning protection on the incoming mains.

All field processors are linked over the two-wire Ethernet infrastructure back to a central control room. All field processors are managed by the AcoustAlert site manager software, which besides handling and managing the AcoustAlert field processor can also monitor alarm input conditions and switch outputs which are mapped to inputs in the software.

The operator also has several soft outputs which can be controlled on the user interface to open or close gates, or switch lights on and off, manually or automatically. This I/O control makes linking alarm inputs (from AcoustAlert or other devices or conditions) to CCTV and other alarm/access systems to switch cameras, and so on.


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

An end to complexity and frequent false alarms
Issue 6 2020, Dallmeier Electronic Southern Africa , Mining (Industry)
The right camera technology and the right artificial intelligence (AI) systems provide for smarter perimeter protection with almost no false alarms.

Vehicle and driver identification
Residential Estate Security Handbook 2020, Protoclea Advanced Image Engineering , Products, CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection
Detecta features vehicle identification (make and model), automated number plate recognition (ANPR), vehicle colour recognition, driver identification, high speed and free flow detection.

Wide-area surveillance with early detection
Residential Estate Security Handbook 2020, Protoclea Advanced Image Engineering , Products, CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection
Being aware of a threat beforehand allows landowners to implement the necessary steps and alert security personnel, and thereby prevent threats from reaching the property.

Perimeter security design
Issue 6 2020, XtraVision , Mining (Industry)
XtraVision offers some tips on designing the right perimeter security solution and selecting the appropriate technology.

Wireless networks ideal for mines
Issue 6 2020, MiRO , Mining (Industry)
Wireless networks provide reliable and secure communications for mines and other environments where coverage is required over extended areas.

Easing the tension of perimeter security
Issue 6 2020 , Mining (Industry)
Gallagher has different solutions, both standalone and integrated, for securing the perimeters of mines and most other environments.

Introducing the JUKA 614
Issue 6 2020, Veracitech , Mining (Industry)
Providing the best possible image at the lowest health risk in the shortest time, by making use of the smallest footprint at the lowest cost.

Connectivity vital to mines’ IoT success
Issue 6 2020 , Mining (Industry)
Inmarsat research finds 85% of organisations struggle to access reliable connectivity for IoT projects across their mine sites.

The end of blind alarms
Issue 3 2020 , Security Services & Risk Management, Perimeter Security, Alarms & Intruder Detection
Today’s alarms should be supplemented by visual verification to ensure that guards are not dispatched to false alarms, wasting time and money.

Securing perimeters of secure locations
November 2019, Axis Communications SA, Modular Communications, Hikvision South Africa, Nemtek Electric Fencing Products, Technews Publishing, Stafix , Government and Parastatal (Industry), Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
Hi-Tech Security Solutions asked a number of companies offering perimeter security solutions for their insights into protecting the boundaries of national key points.