Abstract

Perimeter detection systems detect intruders penetrating protected areas, but modern solutions require the combination of smart detectors, information networks and controlling software to reduce false alarms and extend detection range. The current solutions available to secure a perimeter (infrared and motion sensors, fiber optics, cameras, radar, among others) have several problems, such as sensitivity to weather conditions or the high failure alarm rate that forces the need for human supervision. The system exposed in this paper overcomes these problems by combining a perimeter security system based on CEMF (control of electromagnetic fields) sensing technology, a set of video cameras that remain powered off except when an event has been detected. An autonomous drone is also informed where the event has been initially detected. Then, it flies through computer vision to follow the intruder for as long as they remain within the perimeter. This paper covers a detailed view of how all three components cooperate in harmony to protect a perimeter effectively, without having to worry about false alarms, blinding due to weather conditions, clearance areas, or privacy issues. The system also provides extra information of where the intruder is or has been, at all times, no matter whether they have become mixed up with more people or not during the attack.

Highlights

  • In recent years, intrusion detection sensing systems have expanded significantly to meet the growing demand for improved security

  • Blue and green are raw and filtered CEMF signals, pink is a preventive threshold of the traditional algorithm, and the yellow rectangle highlights the time while the device detected the threat

  • A data set was created using a combination of downloaded public datasets and multiple images of people acquired by our drone at different heights, with a camera tilt of approximately 45◦ pointing towards the ground

Read more

Summary

Introduction

Intrusion detection sensing systems have expanded significantly to meet the growing demand for improved security. Camera systems tend to be the preferred solution for the security systems of critical facilities They present high costs in both operation and maintenance, while having a low probability of preventing threats. The CEMF technology comes into play with a more extended detection range (20 m/sensor) and reduced false alarms (

System
CEMF Secured Perimeter
Architecture
Algorithms
Autonomous Drone System
21. DJI Matrice
22. Autonomous architecture
Algorithm
24. Software
CEMF Results
27. Overview the CEMF sensor validation’s
29. Image validating of a CEMF event
Vision Results
Conclusions
Background
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call