Perimeter protection

November 2010 Perimeter Security, Alarms & Intruder Detection, Surveillance

Interview with Andreas Wolf from Dallmeier.

Perimeter protection is an extensive area of application. It includes installations such as lighting, access barriers and enclosures as well as detection sensors for monitoring property lines. We spoke to Andreas Wolf, product manager intelligent video surveillance at Dallmeier, about advanced video detection on the perimeter.

How can video surveillance contribute to perimeter protection?

Video technology used in perimeter protection has two important functions. For one thing video recordings can be used to visually verify alarms that were triggered by detectors on a fence, for example. Additionally, video can actively detect events along property lines or within a defined area.

In principal, three things are needed: Firstly you need cameras that will provide good quality images, even with little residual light in order to be able to carry out an analysis. Secondly, one needs a video analysis system with recording capability, and thirdly, a video and alarm management system. Apart from that there should be suitable locations for installing the cameras.

From the point of view of a manufacturer of video analysis systems, what needs to be taken into account when planning such a system?

First of all the customer’s requirements need to be clarified. For every project, those requirements are individual and decisively influence the positioning of the cameras and the processing of alarms.

How do the cameras have to be installed?

With conventional perimeter protection, the cameras are installed in close vicinity to the property line. For this purpose, masts are usually used that also carry the lighting. The cameras should be installed high enough so that movements towards the camera can be reliably detected. Generally, installation heights of four to six metres are required. It is important to make sure that the mast is resilient to get judder-free images even in windy conditions. The lighting should be as far away from the camera as possible in order to have a homogenous illumination and reduce disturbances caused by insects in front of the camera.

What is detected by video?

In principle, a video analysis detects the moving parts in the video. Those moving objects can be people and vehicles but also branches, grass, animals or shadows. The detected objects are subject to a comprehensive validity check. Depending on the analysis system a certain number of alarms are triggered.

A validity check evaluates whether or not a given object is something that fits the alarm grid. Important criteria are the minimal size, which limits the depth of detection, and the maximal size of an object. A further criterion is the behaviour of the object ie, how it is moving and where to.

What triggers an alarm?

An alarm as in the sense perimeter protection can be defined as follows: “There is a (valid) object in a defined area, within the perspectively defined dimension, for longer than a minimum period of time, with a minimal movement in a defined direction.” If those criteria are met, an alarm is triggered. That is the case for example when a person climbs over a fence which is detected by a video analysis.

What happens to the alarm then?

When an alarm is triggered, two important steps are initiated. The alarm is sent to the video server which uses it as a recording trigger. The video server stores a parameterisable time period prior to and after the alarm and associates the alarm with the alarm image. The alarm is saved in a database and can be investigated at any time.

The second step deals with forwarding the alarm to the alarm management system. The management system decides how the alarm is to be processed. With video surveillance applications the standard reaction would be to display on a monitor. Further actions depend on the demands of the customer.

Does it actually work, too?

Video analysis is not like a light bulb that either gives light or does not. Video analysis rather varies between being ‘problematic’ and being ‘really good’. Assessing how good video analysis works in a specific application requires expert knowledge.

The most important step in realising a satisfying perimeter protection is and remains professional planning. Professional installers should rely on support by the manufacturers, while the end customer needs to be thoroughly consulted regarding his demands. A sound solution can only be worked out in close exchange and communication with the customer.

For more information contact Dallmeier Southern Africa, +27 (0)11 979 4540, [email protected], www.dallmeier.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

2025 video surveillance market set for improved fortunes
News & Events Surveillance
Novaira Insights has unveiled its latest report, World Market for Video Surveillance Hardware and Software – 2025 Edition, forecasting a healthy growth rate of 8,1% until 2029, excluding China.

Read more...
Next generation of AI-powered video telematics
IoT & Automation Surveillance Transport (Industry)
Webfleet, Bridgestone’s fleet management solution in South Africa, has launched Webfleet Video 2.0, an AI-powered solution designed to enhance fleet safety, security, compliance with local regulations and operational efficiency through real-time video insights.

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...
How intrusion protection helps secure O&G operations
Surveillance Perimeter Security, Alarms & Intruder Detection Industrial (Industry)
For O&G operators in Africa, physical security remains one of the biggest considerations, particularly when it comes to perimeter protection and the ability to mitigate intruder-related incidents.

Read more...
Advanced surveillance storage from ASBIS
Infrastructure Surveillance Products & Solutions
From a video storage solutions perspective, SkyHawk drives, designed for DVRs and NVRs, offer high capacity, optimised firmware, and a reliability workload rating of hundreds of terabytes per year.

Read more...
CCTV control room operator job description
Leaderware Editor's Choice Surveillance Training & Education
Control room operators are still critical components of security operations and will remain so for the foreseeable future, despite the advances of AI, which serves as a vital enhancement to the human operator.

Read more...
Platform to access data and train AI models
Milestone Systems AI & Data Analytics Surveillance
Milestone Systems has announced Project Hafnia to build services and democratise AI-model training with high-quality, compliant video data leveraging NVIDIA Cosmos Curator and AI model, fine-tuning microservices.

Read more...
AI means proactive surveillance
DeepAlert Technews Publishing SMART Security Solutions AI & Data Analytics Surveillance
SMART Security Solutionsasked DeepAlert for some insight into how AI is transforming video surveillance, even to the extent of it being taught to protect the privacy of those in the cameras’ view.

Read more...
Camera Selection Guide 2025
Camera Selection Guide Surveillance
The Camera Selection Guide 2025 includes a range of IP, thermal and speciality cameras aimed at a broad range of surveillance functions.

Read more...
New AI perimeter app package
Dallmeier Electronic Southern Africa Perimeter Security, Alarms & Intruder Detection
With the new AI Perimeter App Package, Dallmeier has extended the application range of its neural AI perimeter network. Previously only available for the Panomera S4 Perimeter camera, this technology is now also available for additional models.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.