Complete Perimeter Solution

Complete Perimeter Solution

Radar and deep learning technologies finally come together

An alarm is triggered in the middle of the night at a remote power plant. An offsite security patrol officer receives the alert via the video management system and springs into action, driving more than 30 minutes to the remote location in hopes of mitigating the threat before the situation escalates. Upon arrival, the security guard realizes the alert was simply an animal at the fence line that triggered a nuisance alarm. This scenario plays out all too often, whether it be at a utility substation or commercial business. False alarms are detrimental to security efforts, wasting both time and money.

This is just one of many instances where artificial intelligence (AI) and deep learning have become critical for security solutions to function optimally. While practically everyone in the security industry has been talking about AI and its possibilities, some are still unclear on how this technology works and what it has to offer.

A key trend for 2018 has been the integration of AI with various security systems. AI-enabled surveillance cameras, facial recognition software, and fingerprint authentication scanners are just a few examples. One unique AI technology pairing gaining traction in the perimeter security sector is radar. Thanks to its superior reliability and wide field of coverage, radar has emerged as a prime candidate for integration. Taking the most dependable radar sensors and optical sensors and merging these with deep learning programs via advanced video management software, enables higher-performing analytics and enhanced perimeter security. Before discussing this dynamic technology combination, let’s look at radar and its uses for the security industry.

Radar Technology

Radar stands for “Radio Detection and Ranging,” and uses radio frequency waves to identify and track targets. In simple terms, radar is an object detection system that sends out radio waves to determine the range, direction, speed, and altitude of an object. Unlike video or thermal imaging cameras, radar performance is not adversely affected by weather, lighting, or other external forces. Radar provides continuous coverage of any protected site in all weather and lighting conditions, allowing for volumetric perimeter protection while keeping power consumption to a minimum.

Radar has been commonly used in government and military applications, giving the misconception that it is only meant for highlevel deployments. However, radar’s wide coverage capabilities make it an ideal system for a variety of perimeter applications including, data centers, oil and gas refineries, logistic centers and education campuses.

With the ability to reach up to 120-degrees in azimuth and 30-degrees in elevation, a single radar is able to optimally cover an area despite changing topography. When radar is placed around the perimeter of a site, targets that approach the “fence line” will be automatically detected and tracked. For security forces using traditional video cameras alone, detecting humans or vehicles at far ranges can be near impossible, allowing threats to come dangerously close to protected assets. On the other hand, radar can detect humans or vehicles up to 1,000 meters away, alerting security forces long before they reach the boundary.

Integrating this technology with PTZ cameras enables slew-to-cue capabilities, allowing security personnel to have eyes on exactly what the radar is tracking for maximum situational awareness. New technology advancements have made radar even more effective. Here’s an overview behind the AI technology driving this enhancement.

AI and Deep Learning

The lines between artificial intelligence and deep learning can be unclear for many consumers. The easiest way to think of these technologies is in concentric circles, with AI being the largest or the umbrella concept, and deep learning in the center as it is the technology that enables AI’s abilities. Artificial intelligence refers to systems that perform tasks that identify patterns objects. In security, AI capabilities translate to greater data analysis and business intelligence.

For example, AI security systems can now detect and even recognize faces stored in a database, adding a whole new layer to duel-authentication access control and management. License plate recognition is another common AI function.

Deep learning is the recent breakthrough within the field of AI that allows for machines to classify objects and make decisions based upon what they have “learned.” Deep learning algorithms that are already being deployed can not only enable AI devices to learn and perceive their environments but can also learn to differentiate everyday occurrences from abnormalities. This pattern recognition may seem simple, but it is a huge victory for analytics software. By giving machines “brains” to match their “eyes,” these offerings allow for higher levels of accuracy and reliability in both object and behavior classification.

The Merging of Radar and Deep Learning

While still a relatively new integration, the concept of enhancing perimeter systems, featuring radar and other video technologies, with deep learning is taking hold in the security industry. The idea is simple, combine the best technology for target detection with the best technology for target classification and merge them to create a fused engine that yields the lowest possible number of false alarms. Some AI software work only off of a radar signal, but more advanced solutions are extending the AI to the accompanying video stream to analyze data from both sources to get the most accurate results.

In the latter scenario, it all begins with radar detection. Once the radar filters out false alerts, it sends the validated target tracks detects to the VMS, which in turn, cues an integrated PTZ camera to follow the movements of said target. As the PTZ camera follows the intruder, deep learning software analyzes the video stream and tracked movement from the radar to classify the object. Once the target has been classified and validated, which takes less than a single second, a verified alert is generated, and the system will log and record the event.

To better illustrate the point, take a large tech company with data centers in various geographic areas. One of the greatest challenges faced by these facilities is the fact that many are in remote areas with wildlife surrounding the perimeter. While the complexes must be protected from vandalism and physical intrusion, these sites are regularly plagued by nuisance alarms. The largest companies own tens of data centers. Even if the number of daily false alarms is below five, the company could receive dozens a day from all the data centers combined. This inundates security systems.

Many times, security guards or law enforcement will end up responding to erroneous alarms, which take their attention away from true threats. By utilizing a deep learning target classifier that analyzes data from both the radar and video stream, the nuisance alarm rate (NAR) can be significantly reduced. In fact, for successful deployments, the system can replace physical guards, heavily reducing security operating costs.

There is a clear demand for perimeter security solutions that are effective in all conditions, and that reduce the NAR. While the integration of radar, video and deep learning technologies are still in its infancy, development has been rapid and there is no doubt that this will continue. This new integrated solution enables security to run at maximum efficiency while keeping costs minimal, simply by marrying the most reliable sensors with the most advanced analytics software available.

This article originally appeared in the October 2018 issue of Security Today.

Featured

  • Impact on Digital Transformation

    A 2023 Statista report projects that by 2030 there will be 30 billion Internet of Things (IoT) devices in use. That is three times as many as there were in 2020. The numbers continue to grow because connecting sensors and systems, especially across a business, promises big efficiency gains and new insights. As such, the IoT and IIoT (Industrial Internet of Things) have become a launching pad for digital transformation -- not only for individual organizations but for entire industries. Read Now

  • Optimizing Security and Business Performance with Clarity and Control

    In recent years, the security sector has experienced a significant influx of innovative technologies that have fundamentally transformed how organizations design, implement, and oversee their security programs. The widespread adoption of cloud-based infrastructure, edge processing, and AI or machine learning (ML) driven analytics has brought about revolutionary changes in applications such as access control, video surveillance and emerging areas like threat detection and drone identification. Read Now

  • Father of Georgia School Shooting Suspect Charged in Connection With Attack

    Colin Gray, the father of the 14-year-old Georgia school shooting suspect, has also been charged in connection with the attack. The 54-year-old father was charged with four counts of involuntary manslaughter, two counts of second-degree murder and eight counts of cruelty to children. More charges are expected. Read Now

  • Enhancing Security and Business Intelligence

    From border security to parking lots, ALPR has gained traction across multiple use cases as the technology becomes more accurate and affordable than ever. I spoke with Jason Cook, business development director at Vaxtor, a leader in ALPR AI-based analytics, and Rui Barbosa, category manager, Surveillance Products at i-PRO, a maker of AI-enabled security cameras, to delve into the latest advancements and applications of ALPR technology. Automated License Plate Recognition (ALPR) has transformed significantly over the years, evolving from a niche technology into a powerful tool for a wide range of applications, particularly in border security. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3