Radar technology enhances surveillance

30th August 2013

  

Font size: - +

Reutech Radar Systems (RRS), a stellenbosch- based radar and radar- based solutions developer, recently launched a perimeter and wide area intrusion detection system. The Perimeter Intrusion Monitoring System (PIMS) integrates traditional technologies used for asset protection, such as cameras, with ground surveillance radar.

The system is targeted at addressing the increasing need for both the persistent monitoring of perimeters and the persistent monitoring of strategic areas for industrial and residential asset protection.

“Traditionally, sensor systems use physical barriers, closed-circuit television (CCTV) cameras and fibre-optic sensors to detect intrusion. The traditional sensor systems all have an important role to play in the security market; however, they can be faulted. They often provide inadequate advanced warning and a limited field of view; [there is an] absence of automatic alarms, and [they] depend on operator efficiency,” says RRS.

The PIMS solution provides the facility to define warning and alarm zones within its surveillance area. A georeferenced visual map interface along with pan-tilt-zoom CCTV cameras can be used to locate and assess potential intruders, notes RRS.

Further, wireless fidelity (WiFi) technology allows for multiple sensor/camera com- binations to be deployed to make coverage along an extended perimeter line possible.

The control room in which the monitoring takes place may either be local or take place remotely using a Web-based operator interface.

While the radar does provide a larger coverage zone, RRS says, it is unable to classify the type of intruder and, thus, relies on the camera to inform the operator of the nature of the intrusion. For example, some environments may have intruders present that do not necessarily pose a threat, such as when wildlife enters the surveillance zone.

Therefore, while cameras are able to inform the operator when the perimeter is breached, the radar allows an operator to establish the intent to breach, thereby increasing available reaction time, explains RRS.

Edited by Tracy Hancock
Creamer Media Contributing Editor

Comments

The content you are trying to access is only available to subscribers.

If you are already a subscriber, you can Login Here.

If you are not a subscriber, you can subscribe now, by selecting one of the below options.

For more information or assistance, please contact us at subscriptions@creamermedia.co.za.

Option 1 (equivalent of R125 a month):

Receive a weekly copy of Creamer Media's Engineering News & Mining Weekly magazine
(print copy for those in South Africa and e-magazine for those outside of South Africa)
Receive daily email newsletters
Access to full search results
Access archive of magazine back copies
Access to Projects in Progress
Access to ONE Research Report of your choice in PDF format

Option 2 (equivalent of R375 a month):

All benefits from Option 1
PLUS
Access to Creamer Media's Research Channel Africa for ALL Research Reports, in PDF format, on various industrial and mining sectors including Electricity; Water; Energy Transition; Hydrogen; Roads, Rail and Ports; Coal; Gold; Platinum; Battery Metals; etc.

Already a subscriber?

Forgotten your password?

MAGAZINE & ONLINE

SUBSCRIBE

RESEARCH CHANNEL AFRICA

SUBSCRIBE

CORPORATE PACKAGES

CLICK FOR A QUOTATION