Multiplexer products updated recently
Critical infrastructure facilities that must secure large areas with extended outer boundary and numerous entry points, present a particularly difficult challenge when it comes to perimeter protection. As such, true end-to-end perimeter protection calls for the utilization of a sophisticated, multi-layered solution that is capable of defending against anticipated threats. Integrated systems that incorporate thermal imaging, visible cameras, radar and strong command and control software are crucial for covering the various potential areas of attacks. Let’s look at these technologies and the five key functions they enable to achieve an end-to-end solution that provides intrusion detection, assessment and defense for the perimeter. 1. Threat Recognition The first step in effectively defending against a threat is recognizing that it’s there. By combining state-of-the-art intrusion detection technologies, facilities can arm themselves with a head start against possible intruders. An exceptionally important aspect of effective perimeter protection is the ability to conduct 24-hour surveillance, regardless of weather conditions, environmental settings, or time of day. Visible cameras do not perform as well in low light scenarios and inclement weather conditions. However, thermal imaging cameras can provide constant protection against potential intruders, regardless of visual limitations, light source or many environmental factors. In fact, facilities such as power stations located near bodies of water can use thermal cameras to create what is known as a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool Critical infrastructure applications require not only continuous video surveillance and monitoring, but also a solution that yields highly reliable intrusion detection, with fewer false alarms. This need makes advanced video analytics a must for any adequate surveillance system. Features like dynamic event detection and simplified data presentation are game changing in supporting accurate intrusion analysis and facilitating a proactive response. Advanced analytics will provide multiple automated alarm notification options, including email, edge image storage, digital outputs or video management software (VMS) alarms. Incorporating high quality, unique and adaptive analytics can virtually eliminate false alarms, allowing security personnel to respond more efficiently and effectively, while also lowering overall cost for the end user. While surveillance technologies such as radar, thermal imaging and visible cameras, or video analytics work well on their own, utilizing all of these options together provides an advanced perimeter detection system. For example, ground surveillance radar can detect possible threats beyond the fence line as they approach and send a signal to pan-tilt-zoom (PTZ) cameras, triggering them to slew to a specific location. From there, embedded analytics and visible cameras can further identify objects, notify authorized staff, and collect additional evidence through facial recognition or high-quality photos. 2. Automatic Response Systems Once an intrusion attempt is discovered, it is important to act fast. Organizing a response system that can initiate actions based on GPS location data, such as the slewing of PTZ cameras, automated intruder tracking or activated lighting sensors, greatly increases staff’s situational awareness while easing their workload. For instance, thermal imagers deployed in conjunction with video analytics can be used to generate an initial alarm event, which can then trigger a sequence of other security equipment and notifications for personnel to eventually respond to. Having all of this in place essentially lays the entire situation out in a way that allows responders to accurately understand and evaluate a scene. Power stations located near bodies of water can use thermal cameras to create a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall 3. Deterring Suspicious Activity After the designated auto-response mechanisms have activated and done their job, it is time for responders to acknowledge and assess the situation. From here, authorized personnel can take the next appropriate step toward defending against and delaying the threat. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool. Often, control room operators can diffuse a situation by speaking over an intercom, telling the trespasser that they are being watched and that the authorities have been notified. This tactic, known as ‘talk down’, also allows officers to view the intruder’s reaction to their commands and evaluate what they feel the best next step is. If individuals do not respond in a desired manner, it may be time to take more serious action and dispatch a patrolman to the area. 4. Delay, Defend, Dispatch And Handle The possible danger has been identified, recognized and evaluated. Now it is time to effectively defend against current attacks and slow down both cyber and physical perpetrators’ prospective efforts. Through the use of a well-designed, open platform VMS, security monitors can manage edge devices and other complementary intrusion detection and response technologies, including acoustic sensors, video analytics, access control and radio dispatch. A robust VMS also enables operators to control functions such as video replay, geographical information systems tracking, email alerts and hand-off to law enforcement. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level The primary purpose of the delay facet of the overall perimeter protection strategy is to stall an attempted intrusion long enough for responders to act. Access control systems play a key role in realizing this objective. When a security officer sees a non-compliant, suspicious individual on the camera feed, the officer can lock all possible exits to trap them in one area all through the VMS. 5. Intelligence: Collect Evidence And Debrief More data and intelligence collected from an event equals more crucial evidence for crime resolution and valuable insight for protecting against future incidents. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level. One innovative resource that has become available is a live streaming application that can be uploaded to smart phones and used for off-site surveillance. This app gives personnel the power to follow intruders with live video anywhere and allows operators to monitor alarm video in real-time. Geographic Information System (GIS) maps are computer systems utilized for capturing, storing, reviewing, and displaying location related data. Capable of displaying various types of data on one map, this system enables users to see, analyze, easily and efficiently. Multi-sensor cameras, possessing both visible and thermal capabilities, provide high-contrast imaging for superb analytic detection (in any light) and High Definition video for evidence such as facial ID or license plate capture. Integrating these two, usually separated, camera types into one helps to fill any gaps that either may normally have. Still, in order to capture and store all of this valuable information and more, a robust, VMS is required. Recorded video, still images and audio clips serve as valuable evidence in the event that a trial must take place to press charges. Control room operators can use data collection tools within their VMS to safely transfer video evidence from the field to the courtroom with just a few clicks of their mouse. More advanced video management systems can go a step further and package this data with other pertinent evidence to create a comprehensive report to help ensure conviction.
Technology is changing the look and function of today’s security control rooms. Old-school CRT (cathode-ray tube) monitors are giving way to the thinner, flat screen monitors in the control room environment, but the transition is gradual. Randy Smith of Winsted still sees many control rooms that need to make the conversion, which is a boon to his company’s business. Furniture today is designed differently to accommodate the thinner monitors, often with larger screens. Need For Integrated Rack Systems With the increase of IP-based systems comes the need for integrated rack systems that include advanced functionality such as cable management, adds Jim Coleman, National Sales Manager, AFC Industries. Server rooms are environmentally controlled by cooling systems and power systems monitored on the IP network. Low-profile flat screens allow centers to utilize space vertically, thus creating a smaller footprint for the consoles. Additionally, with IP-based systems, workstations will have a smaller footprint because there is less cumbersome equipment. In most cases the servers are stored in a secured, climate controlled environment to eliminate overheating of the servers and maintain their security, says Coleman. This environment also helps with cable and power management. AFC builds technical furniture racks that adhere to the precise needs of computer network server room operators. The company designs and fabricates LAN workbenches with versatile functionalities, and server room workstation racks that are scalable. There is a complete line of IT workbenches, IT computer racks and computer server rack mounts with flexible mounting options. In most cases the servers are stored in a secured, climate controlled environment to eliminate overheating of the servers and maintain their security Flexible Control Room Designs Matko Papic, Chief Technology Officer of Evans Consoles, says the transition from bulky CRT equipment to flat-screen (lower profile) monitors was a major disruption in control room design; it changed the whole dynamic. Another evolution is the use of IP video streaming, which allows more flexibility in manipulation of audio-video content, and requires more flexible control room designs. Another shift, driven by larger, higher-definition monitors, is a shift to fewer monitors that display more information. Instead of a smaller monitor for each information stream, larger monitors now consolidate that information into “dashboard” displays. Looking ahead, control rooms will need to be more flexible, both in the initial design and the ability to adapt to changing technology, says Papic. Legacy customers who are currently using PCs may be moving to more remote applications. Sit-stand equipment will continue to be increasingly prevalent. “There will be more emphasis on flexibility, technology integration, and the ability to change over the life of the system,” says Papic. Consolidation Of Multiple Operations Into A Single System A trend in security is consolidation of multiple physical operations into a single system, says Papic. As a result, more customers are taking more interest in alarm management and situational awareness. How is the technology being used in terms of alarm triggers? How can the systems react rapidly and provide information to a larger audience in the control room? These questions impact how control rooms are designed, and Evans Consoles can adapt lessons learned from other markets to these trends in the security arena. Greater use of technology is inevitable, says Coleman of AFC Industries. “It is virtually impossible for humans to monitor all security data at the street level in our cities,” he says. “As computers become more powerful and their programs more all-encompassing, we will see a greater shift to robotic and technology uses that will provide enhanced monitoring capabilities and safety reactions.” Read our Control Rooms series here
Selecting the optimum power supply for a system is critical to an installation When it comes to selecting power supplies, knowledge is power. Determining the power requirements of every systems product, taking into account their integration with one another is critical to ensure that you are selecting and installing the power solutions most appropriate for your installation. Such information will enable you to select the power supplies that will be required to keep your security system running efficiently in the long run. Paul Rizzuto, Technical Sales Manager, Altronix Corp outlines some of the key factors to consider when choosing the right power solution for security installations - including those of video surveillance systems and access control systems - and fire alarm systems. Questions to consider when selecting the optimum power supply Before commencing the evaluation and selection process, three fundamental questions/issues need be addressed:Approvals and conformance to norms: Are there any specific agency approvals that the installation must conform to?Each state, county and even municipality has their own requirements regarding agency approvals. There are a variety of compliance issues such as UL listings for video, access control and fire/life safety that need to be adhered to along with specific local codes. It's imperative that you check with the local AHJ (Authority Having Jurisdiction) to find out what agency listings you must conform to during the design process to assure your security system is in compliance before installing any components and power supplies. Features required: What are the application specific features required for the installation? Selecting power supplies for a security or fire alarm system is a complex process due to a number of variables Before starting the design process, a comprehensive analysis of the facility's security systems are required to determine feature sets of the power supplies. Up until recently, selecting power supplies often required the need to combine various components to deliver the functionality desired. For example, does the system need battery back-up in case of a power failure? All that has changed with the introduction of a new breed of integrated power solutions that deliver both cost and installation advantages. Quantity, location and power requirements of the security system componentsWhat is the number of devices in the system, the power requirements for each, and their physical location?This information is necessary to determine the size and quantity of the power supplies, how many security devices they will run, and where they will be physically located. It is always a good rule of thumb to add 20% more power to your calculations as a safety factor. Alarm signal generation is a key consideration when dealing with power consumption in fire alarms systems Dealing with power consumption issues in fire alarm systems Power consumption is a primary issue when configuring fire alarm systems. One of the most critical considerations revolves around how alarm signals are activated. When an alarm condition exists, Notification Appliance Circuits (NAC) are output from the Fire Alarm Control Panel (FACP) to activate notification appliances such as strobes and horns commonly used to indicate an emergency situation. The number of notification appliances to be activated, along with the current draw for each device and its distance from the FACP, sometimes makes the deployment of NAC Power Extenders a necessary system component. For example, in large commercial installations or multi-tenant buildings, the total current draw of the notification appliances may well exceed the power output of the FACP. In these instances, one or more NAC Power Extenders need to be installed for those notification appliances where the wire runs are too long for the FACP to deliver sufficient power. Features to consider when selecting a NAC Power Extender: Number of Class A or Class B indicating circuits.Total power rating (ex. 6.5 amp, 8 amp or 10 amp).Number of Aux. power outputs with or without battery backup.Programmable outputs: SynchronizationTemporal Code 3Input to output follower mode.Enclosure capacity: Room for battery backupAmple knockouts and room for wiringAgency approvals UL, MEA, CSFM and FM.NAC Power Extenders are available with programmable features that maintain horn/strobe synchronization by either producing internally generated sync protocols utilized by major signal manufacturers, or by electronically repeating these sync protocols from the FACP outputs. Power supply requirements for access control systems - key standards to follow To ensure safety any device designated to lock or unlock an exit must be connected to the fire alarm systemAccess control systems manage entry and exit points at a facility by means of controlled locking devices. NFPA (National Fire Protection Association) requires that any device or system intended to actuate the locking or unlocking of exits, must be connected to the facility's fire alarm system so that all doors will release when an alarm signal is generated.To comply with NFPA requirements, there are two classifications of locking devices that need to be addressed: Fail-Safe and Fail-Secure. Fail-Safe locking devices such as magnetic locks release when they lose power. Fail-Secure locking devices such as electric strikes unlock when power is applied and may be manually released from inside a secured area. This determines the manner in which your power solution removes or provides power and the sequence and timing of each action.Access control power supplies come in both AC and DC versions and some provide multiple voltages simultaneously. Features include independently trigger controlled Fail-Safe/Fail-Secure outputs, power supervision, battery charging and fire alarm interface. Wall and rack mount models are also available.To comply with NFPA requirements, there are two classifications of locking devices that need to be addressed: Fail-Safe and Fail-Secure Some systems may also require the installation of panic hardware devices. Upon activation, the devices' high current power demand can reach up to 16amps, but not all power supplies can handle these high inrush currents. As a result, you need to specify a power supply designed for this type of application. Some operate a single panic hardware device and require optional modules to add features like timing functions, output relays, fire alarm disconnect, or power for additional panic hardware devices. Therefore, these "base" models almost always require additional modules to deliver the functionality you need and may not be cost effective. More advanced models offer integrated features and supply a comprehensive solution. In addition to the convenience of these integrated devices, they are highly cost efficient with respect to total cost of ownership and installation. Video surveillance systems - typical power consumption guidelinesVideo surveillance systems typically run 24/7/365 placing high demands on power supplies. These video power supplies need to deliver a clean and consistent source of 24VAC or 12VDC power to assure uninterrupted operation. Depending on the video component's specific power requirements and its location, there is a wide selection of power supplies to select from. They can be wall or rack mounted, designed for use indoors or outdoors, and feature AC or DC outputs. Configurations typically range from 1 to 32 outputs and some models offer additional features like 115 or 230VAC input with current ratings as high as 25 amps, power LED indicators, and PTC or fused protected outputs. Certain models provide both 24VAC and 12VDC to power both types of surveillance cameras simultaneously. Environmental conditions can affect the performance of video components and the power supply when situated outdoors A few additional variables to consider when selecting video surveillance power supplies include: Environmental conditions: Temperature differences due to change of seasons, day or night, can often be extreme and can have a direct affect on the performance of both the video components and the power supply when located outdoors. Enclosures for outdoor power supplies should be rated to withstand the elements.Ground Isolation: In some cases, the surveillance cameras are not equipped with internal electrical isolation. Should this be the case, it's important to specify a power supply with this feature. Video Transmission Systems: For years, the use of structured cable has been an inexpensive method for transmitting video and data between head end equipment and camera systems. The introduction of UTP transceiver hubs with integral camera power make it possible to transmit both video and data via structured cable along with the power needed for the cameras. This is accomplished via video balun/combiners which pass the power and data to the camera and send the video back to the head end equipment. New highly versatile devices with integral power provide system designers with a highly integrated solution. This new breed of integrated device greatly reduces the time and expense of configuring and installing separate components while helping to minimize bandwidth requirements for large security systems. Paul RizzutoTechnical Sales Manager Altronix Corp
Intelligent solutions, such as those derived from artificial intelligence, help critical infrastructure organizations make sense of vast amounts of data. These integrated applications, such as advanced video analytics and facial recognition, can automatically pinpoint potential breaches and significant events, and send alerts to the appropriate personnel, departments, and agencies. These solutions can be powerful in unifying disparate command center technologies, fusing critical data input from emergency calls and responder activity to enhance situational awareness. Electrical substations are particularly vulnerable (and in need of extra security) due to their role in power distribution and the nature of their equipment. The challenge power utilities worldwide are facing is finding an affordable solution, which can help detect, deter and facilitate an informed response to a substation security event. Data capture form to appear here! U.S. regulations In the United States, this need is furthered by the physical security mandate CIP-014 issued by the North American Electric Reliability Corporation (NERC), calling for identification of security issues, vulnerability assessments and deployment of appropriate processes and systems to address. CIP-014 identification of security issues, vulnerability assessments and deployment of appropriate processes and systems to address CIP-104 specifically calls for implemented security plans that include measures to deter, detect, delay, assess, communicate, coordinate and respond to potential physical threats and vulnerabilities. Manufacturers of video and other systems are designing products to serve the critical infrastructure market. For example, Dahua Technology offers explosion-proof cameras with a combination of rugged reliability and superior optics that is a fit for surveillance of explosive and corrosive environments, including chemical plants, refineries, and other facilities in the oil and gas industry. This explosion-proof series of cameras are housed in enclosures that are certified to the ATEX and IECEx standards for equipment in explosive atmospheres. Each explosion-proof camera features Dahua’s Starlight technology for ultra low-light sensitivity and high-definition sensors that deliver clear images in real-time. They are IP68-rated to prevent water and dust ingress. Each explosion-proof camera features Dahua’s Starlight technology for ultra low-light sensitivity and high-definition sensors that deliver clear images in real-time Video footage in extreme temperatures Another manufacturer, Videotec, offers a range of cameras and housings that provide video footage regardless of aggressive external factors, such as ice cold, scorching heat, desert sand, the force of sea or wind, total darkness, pollution, corrosion and even explosive agents. SightSensor thermal systems enable a utility to detect and respond to substation security incidents across multiple sitesSightLogix smart thermal camera systems have been deployed to protect substations for electric utilities and other critical infrastructure facilities. SightSensor thermal systems enable a utility to detect and respond to substation security incidents across multiple sites, ranging from copper theft to vandalism while also meeting regulatory compliance. At each substation facility, Thermal SightSensors are positioned along the perimeter, and are paired with a high-resolution pan-tilt-zoom camera for alarm assessment. When a Thermal SightSensor detects an intruder, the target’s location information is sent over the network to a SightTracker PTZ controller, which automatically zooms and steers PTZ cameras to follow the intruder. The target’s location is also displayed on a topology site map to provide real-time situational awareness. Alarms are sent to the utility’s 24-hour security operations center, which will contact law enforcement in real time when unauthorized intrusions are detected. Integrated intrusion detection and lighting systems The Senstar LM100 hybrid perimeter intrusion detection and intelligent lighting system is simplifying security at one U.S. electrical utility company. For years, the utility company had integrated its perimeter intrusion detection and lighting systems. The company has now installed the Senstar LM100 which provides detection and lighting in one product and saves them over $80,000 per site. The savings are a result of the reduction of electrical requirements, conduit, grounding, and associated labor, as well as the removal of certain equipment from project scope that are required for the two-system integration. The Senstar LM100’s perimeter LED-based lighting acts as an initial deterrent. If an intruder persists and an attempt to cut, climb or otherwise break through the fence is detected, the closest luminaire begins to strobe, and an alert is sent via a security management system. The intruder knows immediately they have been detected and that their exact location is known by security and others in the vicinity.
Building Information Modelling (BIM) can be described as the ‘use of shared digital representation of a built object (including buildings, bridges, roads, process plants, critical infrastructures, etc.) to facilitate design, construction and operation processes to form a reliable basis for decisions’. The National Institute of Building Sciences (NIBS) defines it simply as the “digital representation of the physical and functional characteristics of an object”. Understanding BIM Construct BIM is neither a product nor software but rather is a “cache of building information” to which graphic data (such as drawings) and certain technical attributes (such as technical data sheets and associated characteristics) that are also related to the foreseen life cycle can be added. BIM represents a collaborative planning method as it allows for the integration of useful information for every phase of planning in a single model What BIM represents therefore is a collaborative planning method as it allows for the integration of useful information for every phase of planning – architectural, structural, plant design and installation, energy, management – into a single model. Project Functionality And Performance While CAD allows a project to be designed with 2D or 3D drawings, BIM also specifies the functionality and performance of each BIM object in the project or in the entire building process. A BIM object can hold any information pertaining to the building as a whole, or its parts. The most common information collected in a BIM is geographic location, structure, the properties of the materials/components/systems and technical elements, construction phases and maintenance procedures. Fields Of Application Building Information Modelling is used both in the construction sector, for design and installation (architecture, engineering, technical installations…) as well as in facility management. BIM supports the general improvement of a project along the entire life cycle of the construction process The role of BIM within the construction industry (by means of participants such as architects, engineers, surveyors, experts, builders, consultants and clients) is to support communication, cooperation, simulation and the general improvement of a project along the entire life cycle of the construction process. Advantages Of BIM Technology BIM technology offers a great number of advantages, such as greater efficiency and productivity, fewer errors, less downtime, reduced costs, greater interoperability, maximum information sharing, and more accurate and consistent control over a project. Generally, a BIM object is saved in .ifc (Industry Foundation Class) format. These IFC files are classed as 3D image files that also contain other technical information and are compatible with any software that works with BIM technology. Standard Process And Regulation BIM will become the standard process for all buildings and is currently being integrated into public contracts legislation across Europe. With Directive 2014/24/EU, the European Union has introduced a few guidelines to member countries on using the BIM system in the design and construction of public works. The BIM system is therefore strongly supported as a means of increasing the effectiveness and transparency of procurement procedures. Comparable BIM tools are necessary in order to allow the various softwares to ‘read’ the relevant data to manage all different parts of the construction sector Mandatory Use Of BIM Process In Public Works In terms of the BIM process spreading to European operators (planners and companies), the leading nations are the Netherlands followed by the United Kingdom, whose government is bringing in a plan to make the use of BIM mandatory for public works. Even in Northern Europe and the United States, BIM technology has been used since 2000. Since the construction sector varies so widely (plants, structures, energy), it has become evident that no software exists that can manage all these different parts. Instead, comparable BIM tools are necessary in order to allow the various softwares to “read” the relevant data. BIM technology makes it possible to ascertain exactly how the cameras will fit into a building’s layout, reducing the risk of unexpected blind spots BIM And Video Surveillance Security has now become an integral part of the design process of any new large building. To provide the highest levels of security and avoid any blind spots that might constitute a security breach, the video surveillance system has to be planned in conjunction with other essential services, such as the electrics and hydraulics. BIM allows security system designers to interactively understand camera coverage, making it easier to identify the required models and to optimize the system layout. Reducing Camera Installation Risks In actual fact, the technology makes it possible to ascertain exactly how the cameras will fit into a building’s layout (both internally and externally) and to determine whether the view of any camera is blocked by columns, lighting posts, trees, etc. This reduces the risk of unexpected blind spots. It is therefore possible to see how the cameras will be configured before they are installed, and which areas will be covered by the surveillance system after installation.
The term ‘marine’ comes from the Latin mare, meaning sea or ocean, and marine habitats can be divided into two categories: coastal and open ocean. Video surveillance (VS) applications can cover both types of marine environment with system for ships, maritime ports, onshore and offshore installations, etc. We should want to further analyze VS for ships and try to explain the types of ships on which it can be used, the ways in which VS can be used on ships, the typical certifications in use and what features a camera station must have to be installed on a ship. Starting with ships that have a minimum tonnage, around the world we have: liquefied natural gas (LNG) tankers, passengers ships, chemical tankers, crude oil tankers, container ships, general cargo ships and bulk carriers.As the LNG market grows rapidly, the fleet of LNG carriers continues to experience tremendous growth, offering more opportunities for VS Video surveillance for all marine vessels An LNG carrier is a tank ship designed for transporting liquefied natural gas. As the LNG market grows rapidly, the fleet of LNG carriers continues to experience tremendous growth. A passenger ship is a merchant ship whose primary function is to carry passengers by sea. This category does not include cargo vessels which have accommodation for a limited number of passengers, but rather includes the likes of ferries, yachts, ocean liners and cruise ships. A chemical tanker is a type of tank ship designed to transport chemicals in bulk. These ships can also carry other types of sensitive cargo which require a high standard of tank cleaning, such as palm oil, vegetable oils, tallow, caustic soda and methanol. An oil tanker, also known as a petroleum tanker, is a merchant ship designed for the bulk transport of oil. There are two basic types of oil tankers: crude tankers and product tankers. Crude tankers move large quantities of unrefined crude oil from its point of extraction to refineries. Product tankers, generally much smaller, are designed to move refined products from refineries to points near consuming markets. Container ships are cargo ships that carry their entire load in truck-size intermodal containers: a technique called containerization. They are a common means of commercial intermodal freight transport and now carry most seagoing non-bulk cargo. Today, about 90% of non-bulk cargo worldwide is transported by container. A cargo ship or freighter ship is any sort of ship or vessel that carries cargo, goods and materials from one port to another. Cargo ships are specially designed for the task, often being equipped with cranes and other mechanisms to load and unload, and come in all sizes. Bulk carriers make up 15%–17% of the world's merchant ships and they are specially designed to transport unpackaged bulk cargo such as grains, coal, ore and cement in its cargo holds. For all these ships the protection of vessels, cargo and crew is a priority, that’s why the adoption of VS technology plays a key part in terms of security and safety. Human error is regularly named as a major factor in ship accidents, and one way to avoid it is to aid seafarers by providing them with technology and equipment that is reliable and easy to use in all weather and sea conditions. Marine VS encompasses liquefied natural gas (LNG) tankers, passengers ships, chemical tankers, crude oil tankers, container ships, general cargo ships and bulk carriers Emergency security solutions on ship One of the most important applications for camera stations is during “docking”. Mooring is the securing or confining of a vessel in a particular location with a fixed or a floating object (jetty, pier, ship, barge, buoy, etc.) as various cargo operations are carried out. Docking is the final stage of mooring operations when the ship docks to the jetty. This is a very delicate operation and cameras are very helpful in making sure docking is done without accidents.'Man overboard’ is an emergency in which a person has fallen off a boat or ship into the water, and can happen at any time during the day or night Another important application for camera stations is the Man Overboard detection system (MOB). ‘Man overboard’ is an emergency in which a person has fallen off a boat or ship into the water. Man overboard events can happen at any time during the day or night, in all types of weather and sea conditions, and from almost any location on the ship, ranging from a few tens of feet above the water, to over 180 feet. When these events occur, the immediate availability of important data is crucial. Accurate confirmation of the event including time of occurrence, location on the ship and location in the sea is critical. A proactive detection system must immediately and accurately detect man overboard events and provide prompt, actionable data to response personnel. A typical man overboard detection system can report a MOB event in under 1 second. VS on a vessel can also monitor the engine room at all times and provide a good view of people working on dock, machinery and stowed equipment. But what are the most important features that a camera station must have to work in one of the most aggressive environments in nature? Ruggedized reliability in surveillance First of all, and perhaps it’s obvious, but it’s extremely important to have camera stations with amazing reliability. Housing units manufactured from AISI 316L stainless steel, passivated and electropolished, makes the cameras completely impervious to air, water, rusting and corrosion, therefore offering excellent weather protection and increased reliability.Housing units manufactured from AISI 316L stainless steel, passivated and electropolished, makes the cameras completely impervious to air, water, rusting and corrosion Sometimes ships also use cameras constructed entirely from technopolymer, which guarantees high impact resistance and superior protection from external weather agents. Keeping the camera glass clean at all times is another essential feature, and it can be done via a wiper/wash system that greatly reduces the need for maintenance. In the case of PTZ cameras, the best option would be a great pan and tilt speed (up to 100°/s). What is the operative temperature range for the cameras? Sea is everywhere and therefore ships go everywhere, from the Arctic Ocean to the Mediterranean, so we need cameras that have to be fully operational across a wide temperature range. -40°C to +65°C covers almost all areas. Analog or IP Cameras? Actually, both options can be used, especially for applications like docking where it’s important to avoid image delay (as can happen with IP cameras due to the natural latency of data communication over a network). Marine certifications Last but not least, the certifications: Certifications guarantee the quality and reliability of camera stations. There is no compromise! One important certification is the Lloyd’s Register Type Approval which subjects cameras to rigorous testing for performance, vibration (critical on ships), humidity, etc. The application field of the LR Type Approval is VS in public places (e.g. passenger ships), open decks, enclosed spaces that are subjected to heat generated from other equipment, and technical premises. Often, VS cameras used in specific areas of ships, such as hazardous areas, are required to have ATEX and IECEX certifications.
Combining Systems Intelligence And Human Insight For Superior SecurityDownload
3 Ways To Increase Workplace Safety And Resource EfficiencyDownload
Mobile Access- What You Need To Know (Part 1)Download
- Bosch Video Surveillance Solution Installed At PETCO Park In San Diego, California
- Vicon’s Surveillance System Provides Retail Security At The Bullring Shopping Center
- Panasonic CCTV Solution Enables Constant Crowd Monitoring At Portsmouth FC
- Siemens Secures Istanbul Airport's "New Gateway To The World"