Perimeter protection

November 2010 Perimeter Security, Alarms & Intruder Detection, CCTV, Surveillance & Remote Monitoring

Interview with Andreas Wolf from Dallmeier.

Perimeter protection is an extensive area of application. It includes installations such as lighting, access barriers and enclosures as well as detection sensors for monitoring property lines. We spoke to Andreas Wolf, product manager intelligent video surveillance at Dallmeier, about advanced video detection on the perimeter.

How can video surveillance contribute to perimeter protection?

Video technology used in perimeter protection has two important functions. For one thing video recordings can be used to visually verify alarms that were triggered by detectors on a fence, for example. Additionally, video can actively detect events along property lines or within a defined area.

In principal, three things are needed: Firstly you need cameras that will provide good quality images, even with little residual light in order to be able to carry out an analysis. Secondly, one needs a video analysis system with recording capability, and thirdly, a video and alarm management system. Apart from that there should be suitable locations for installing the cameras.

From the point of view of a manufacturer of video analysis systems, what needs to be taken into account when planning such a system?

First of all the customer’s requirements need to be clarified. For every project, those requirements are individual and decisively influence the positioning of the cameras and the processing of alarms.

How do the cameras have to be installed?

With conventional perimeter protection, the cameras are installed in close vicinity to the property line. For this purpose, masts are usually used that also carry the lighting. The cameras should be installed high enough so that movements towards the camera can be reliably detected. Generally, installation heights of four to six metres are required. It is important to make sure that the mast is resilient to get judder-free images even in windy conditions. The lighting should be as far away from the camera as possible in order to have a homogenous illumination and reduce disturbances caused by insects in front of the camera.

What is detected by video?

In principle, a video analysis detects the moving parts in the video. Those moving objects can be people and vehicles but also branches, grass, animals or shadows. The detected objects are subject to a comprehensive validity check. Depending on the analysis system a certain number of alarms are triggered.

A validity check evaluates whether or not a given object is something that fits the alarm grid. Important criteria are the minimal size, which limits the depth of detection, and the maximal size of an object. A further criterion is the behaviour of the object ie, how it is moving and where to.

What triggers an alarm?

An alarm as in the sense perimeter protection can be defined as follows: “There is a (valid) object in a defined area, within the perspectively defined dimension, for longer than a minimum period of time, with a minimal movement in a defined direction.” If those criteria are met, an alarm is triggered. That is the case for example when a person climbs over a fence which is detected by a video analysis.

What happens to the alarm then?

When an alarm is triggered, two important steps are initiated. The alarm is sent to the video server which uses it as a recording trigger. The video server stores a parameterisable time period prior to and after the alarm and associates the alarm with the alarm image. The alarm is saved in a database and can be investigated at any time.

The second step deals with forwarding the alarm to the alarm management system. The management system decides how the alarm is to be processed. With video surveillance applications the standard reaction would be to display on a monitor. Further actions depend on the demands of the customer.

Does it actually work, too?

Video analysis is not like a light bulb that either gives light or does not. Video analysis rather varies between being ‘problematic’ and being ‘really good’. Assessing how good video analysis works in a specific application requires expert knowledge.

The most important step in realising a satisfying perimeter protection is and remains professional planning. Professional installers should rely on support by the manufacturers, while the end customer needs to be thoroughly consulted regarding his demands. A sound solution can only be worked out in close exchange and communication with the customer.

For more information contact Dallmeier Southern Africa, +27 (0)11 979 4540, dallmeiersa@dallmeier.com, www.dallmeier.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Matt De Araujo joins Ajax Systems
Ajax Systems News Perimeter Security, Alarms & Intruder Detection
Matt De Araujo has joined Ajax Systems as Head of Sales in sub-Saharan Africa with a goal to strengthen the local team and exceed expectations.

Read more...
Elvey partners with HALO
Elvey Security Technologies News CCTV, Surveillance & Remote Monitoring
Elvey Group has partnered with HALO Europe to provide Africa’s first body-worn solution with zero upfront costs. This includes an IP68-certified body camera and a 4G-connected device.

Read more...
RDC expands its production capabilities
Radio Data Communications Perimeter Security, Alarms & Intruder Detection Products
Local electronics manufacturer, RDC, recently acquired a new SMT (surface mount technology) machine to boost its manufacturing output and meet the needs of its global customer base.

Read more...
Invisible connection and tangible protection via cloud
Dahua Technology South Africa Perimeter Security, Alarms & Intruder Detection CCTV, Surveillance & Remote Monitoring Products
Dahua Technology has launched its AirShield security solution that uses advanced, stable and reliable RF communication technology and cloud services, integrating alarm hubs, various detectors and accessories, with several software apps.

Read more...
The importance of the operator’s frame of reference
Leaderware Editor's Choice CCTV, Surveillance & Remote Monitoring Security Services & Risk Management Mining (Industry)
The better the operator’s frame of reference and situational awareness, and the more informed they are in dealing with CCTV surveillance in the mining industry, the more successful they are likely to be in surveillance.

Read more...
Protecting perimeters and open spaces
XtraVision Perimeter Security, Alarms & Intruder Detection
XtraVision provides some insight into the use of drone technology with the SAMM Fotas fibre detection systems to secure perimeters and other remote assets and locations.

Read more...
Enhancing surveillance on mines
Avigilon Technews Publishing Axis Communications SA Forbatt SA Hikvision South Africa Bosch Building Technologies Editor's Choice CCTV, Surveillance & Remote Monitoring Integrated Solutions Mining (Industry)
Smart Security approached a number of surveillance vendors to find out what the latest in surveillance technology is that can make a difference to security operations in mines, as well as general operations.

Read more...
Surveillance to improve worker safety
Axis Communications SA Mining (Industry) CCTV, Surveillance & Remote Monitoring Integrated Solutions
With substantial deposits of mineral resources, mining is critical for South Africa’s economic growth and prosperity; however, mining can be dangerous, especially for the people working on the ground and in the shafts.

Read more...
Centralised VMS for multiple sites
Mining (Industry) CCTV, Surveillance & Remote Monitoring
Dispersed mining operation relies on AxxonSoft for centralised video management as well as device health monitoring and the reliable distribution of analytics to various camera brands.

Read more...
Perimeter intrusion detection
Dark Horse Distribution Perimeter Security, Alarms & Intruder Detection Mining (Industry) Products
Dark Horse Distribution offers Senstar’s, above and below ground perimeter protection solutions, incorporating advanced algorithms to reduce false alarms while providing early warning of intrusion attempts.

Read more...