Perimeter protection

November 2010 Perimeter Security, Alarms & Intruder Detection, Surveillance

Interview with Andreas Wolf from Dallmeier.

Perimeter protection is an extensive area of application. It includes installations such as lighting, access barriers and enclosures as well as detection sensors for monitoring property lines. We spoke to Andreas Wolf, product manager intelligent video surveillance at Dallmeier, about advanced video detection on the perimeter.

How can video surveillance contribute to perimeter protection?

Video technology used in perimeter protection has two important functions. For one thing video recordings can be used to visually verify alarms that were triggered by detectors on a fence, for example. Additionally, video can actively detect events along property lines or within a defined area.

In principal, three things are needed: Firstly you need cameras that will provide good quality images, even with little residual light in order to be able to carry out an analysis. Secondly, one needs a video analysis system with recording capability, and thirdly, a video and alarm management system. Apart from that there should be suitable locations for installing the cameras.

From the point of view of a manufacturer of video analysis systems, what needs to be taken into account when planning such a system?

First of all the customer’s requirements need to be clarified. For every project, those requirements are individual and decisively influence the positioning of the cameras and the processing of alarms.

How do the cameras have to be installed?

With conventional perimeter protection, the cameras are installed in close vicinity to the property line. For this purpose, masts are usually used that also carry the lighting. The cameras should be installed high enough so that movements towards the camera can be reliably detected. Generally, installation heights of four to six metres are required. It is important to make sure that the mast is resilient to get judder-free images even in windy conditions. The lighting should be as far away from the camera as possible in order to have a homogenous illumination and reduce disturbances caused by insects in front of the camera.

What is detected by video?

In principle, a video analysis detects the moving parts in the video. Those moving objects can be people and vehicles but also branches, grass, animals or shadows. The detected objects are subject to a comprehensive validity check. Depending on the analysis system a certain number of alarms are triggered.

A validity check evaluates whether or not a given object is something that fits the alarm grid. Important criteria are the minimal size, which limits the depth of detection, and the maximal size of an object. A further criterion is the behaviour of the object ie, how it is moving and where to.

What triggers an alarm?

An alarm as in the sense perimeter protection can be defined as follows: “There is a (valid) object in a defined area, within the perspectively defined dimension, for longer than a minimum period of time, with a minimal movement in a defined direction.” If those criteria are met, an alarm is triggered. That is the case for example when a person climbs over a fence which is detected by a video analysis.

What happens to the alarm then?

When an alarm is triggered, two important steps are initiated. The alarm is sent to the video server which uses it as a recording trigger. The video server stores a parameterisable time period prior to and after the alarm and associates the alarm with the alarm image. The alarm is saved in a database and can be investigated at any time.

The second step deals with forwarding the alarm to the alarm management system. The management system decides how the alarm is to be processed. With video surveillance applications the standard reaction would be to display on a monitor. Further actions depend on the demands of the customer.

Does it actually work, too?

Video analysis is not like a light bulb that either gives light or does not. Video analysis rather varies between being ‘problematic’ and being ‘really good’. Assessing how good video analysis works in a specific application requires expert knowledge.

The most important step in realising a satisfying perimeter protection is and remains professional planning. Professional installers should rely on support by the manufacturers, while the end customer needs to be thoroughly consulted regarding his demands. A sound solution can only be worked out in close exchange and communication with the customer.

For more information contact Dallmeier Southern Africa, +27 (0)11 979 4540, [email protected], www.dallmeier.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Re-imagining business operations with the power of AI
AI & Data Analytics Surveillance
inq., a Convergence Partners company, has introduced a range of artificial intelligence (AI) solutions to assist organisations across industry verticals in optimising business operations and improving internal efficiencies.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
ASSA ABLOY acquires Amecor in South Africa
Amecor Editor's Choice Perimeter Security, Alarms & Intruder Detection News & Events
ASSA ABLOY has signed an agreement to acquire Amecor, a well-known South African manufacturer of security communication equipment in the South African security market and beyond.

Read more...
Hikvision’s top seven trends for the security industry in 2024
Hikvision South Africa News & Events Surveillance AI & Data Analytics
As we embrace technological innovation, and adapt to evolving societal needs, we are witnessing the convergence of advanced technologies like artificial intelligence (AI), the Internet of Things (IoT), and big data.

Read more...
inq. SA unveils AI, IoT solutions for the digital age
AI & Data Analytics Surveillance
inq. has announced the launch of an extensive Edge Artificial Intelligence (AI), Internet of Things (IoT), and the Edgedock data insights value proposition to transform business operations across various sectors.

Read more...
Hik-Connect for Teams released
Hikvision South Africa Products & Solutions Surveillance
Hikvision has released an update for its security management platform; Hik-Connect for Teams not only meets the specific needs of individual users, but also caters to various medium-sized businesses (SMBs) and multi-site management scenarios.

Read more...
The human factor side of video management systems
Leaderware Editor's Choice Surveillance Security Services & Risk Management
A video management system (VMS) is central to, and the most vital element to any control room operation using CCTV as part of its service delivery, however, all too often, it is seen as a technical solution rather than an operational solution.

Read more...
Different fences for different farmers
Gallagher Perimeter Security, Alarms & Intruder Detection Agriculture (Industry)
Far beyond the simple delineation of boundaries, fencing serves as a dynamic solution to address various needs, from ensuring the security of farms and protecting livestock to defining property lines and enhancing aesthetic appeal.

Read more...
Revolutionise your security with integrated solutions
Secutel Technologies Products & Solutions Surveillance
By merging the capabilities of SecuVue and Secutraq, Secutel has forged a robust system empowering users to fine-tune analytics and harness facial recognition, pose detection, and XFS, among other features.

Read more...