Complete Perimeter Solution

Complete Perimeter Solution

Radar and deep learning technologies finally come together

An alarm is triggered in the middle of the night at a remote power plant. An offsite security patrol officer receives the alert via the video management system and springs into action, driving more than 30 minutes to the remote location in hopes of mitigating the threat before the situation escalates. Upon arrival, the security guard realizes the alert was simply an animal at the fence line that triggered a nuisance alarm. This scenario plays out all too often, whether it be at a utility substation or commercial business. False alarms are detrimental to security efforts, wasting both time and money.

This is just one of many instances where artificial intelligence (AI) and deep learning have become critical for security solutions to function optimally. While practically everyone in the security industry has been talking about AI and its possibilities, some are still unclear on how this technology works and what it has to offer.

A key trend for 2018 has been the integration of AI with various security systems. AI-enabled surveillance cameras, facial recognition software, and fingerprint authentication scanners are just a few examples. One unique AI technology pairing gaining traction in the perimeter security sector is radar. Thanks to its superior reliability and wide field of coverage, radar has emerged as a prime candidate for integration. Taking the most dependable radar sensors and optical sensors and merging these with deep learning programs via advanced video management software, enables higher-performing analytics and enhanced perimeter security. Before discussing this dynamic technology combination, let’s look at radar and its uses for the security industry.

Radar Technology

Radar stands for “Radio Detection and Ranging,” and uses radio frequency waves to identify and track targets. In simple terms, radar is an object detection system that sends out radio waves to determine the range, direction, speed, and altitude of an object. Unlike video or thermal imaging cameras, radar performance is not adversely affected by weather, lighting, or other external forces. Radar provides continuous coverage of any protected site in all weather and lighting conditions, allowing for volumetric perimeter protection while keeping power consumption to a minimum.

Radar has been commonly used in government and military applications, giving the misconception that it is only meant for highlevel deployments. However, radar’s wide coverage capabilities make it an ideal system for a variety of perimeter applications including, data centers, oil and gas refineries, logistic centers and education campuses.

With the ability to reach up to 120-degrees in azimuth and 30-degrees in elevation, a single radar is able to optimally cover an area despite changing topography. When radar is placed around the perimeter of a site, targets that approach the “fence line” will be automatically detected and tracked. For security forces using traditional video cameras alone, detecting humans or vehicles at far ranges can be near impossible, allowing threats to come dangerously close to protected assets. On the other hand, radar can detect humans or vehicles up to 1,000 meters away, alerting security forces long before they reach the boundary.

Integrating this technology with PTZ cameras enables slew-to-cue capabilities, allowing security personnel to have eyes on exactly what the radar is tracking for maximum situational awareness. New technology advancements have made radar even more effective. Here’s an overview behind the AI technology driving this enhancement.

AI and Deep Learning

The lines between artificial intelligence and deep learning can be unclear for many consumers. The easiest way to think of these technologies is in concentric circles, with AI being the largest or the umbrella concept, and deep learning in the center as it is the technology that enables AI’s abilities. Artificial intelligence refers to systems that perform tasks that identify patterns objects. In security, AI capabilities translate to greater data analysis and business intelligence.

For example, AI security systems can now detect and even recognize faces stored in a database, adding a whole new layer to duel-authentication access control and management. License plate recognition is another common AI function.

Deep learning is the recent breakthrough within the field of AI that allows for machines to classify objects and make decisions based upon what they have “learned.” Deep learning algorithms that are already being deployed can not only enable AI devices to learn and perceive their environments but can also learn to differentiate everyday occurrences from abnormalities. This pattern recognition may seem simple, but it is a huge victory for analytics software. By giving machines “brains” to match their “eyes,” these offerings allow for higher levels of accuracy and reliability in both object and behavior classification.

The Merging of Radar and Deep Learning

While still a relatively new integration, the concept of enhancing perimeter systems, featuring radar and other video technologies, with deep learning is taking hold in the security industry. The idea is simple, combine the best technology for target detection with the best technology for target classification and merge them to create a fused engine that yields the lowest possible number of false alarms. Some AI software work only off of a radar signal, but more advanced solutions are extending the AI to the accompanying video stream to analyze data from both sources to get the most accurate results.

In the latter scenario, it all begins with radar detection. Once the radar filters out false alerts, it sends the validated target tracks detects to the VMS, which in turn, cues an integrated PTZ camera to follow the movements of said target. As the PTZ camera follows the intruder, deep learning software analyzes the video stream and tracked movement from the radar to classify the object. Once the target has been classified and validated, which takes less than a single second, a verified alert is generated, and the system will log and record the event.

To better illustrate the point, take a large tech company with data centers in various geographic areas. One of the greatest challenges faced by these facilities is the fact that many are in remote areas with wildlife surrounding the perimeter. While the complexes must be protected from vandalism and physical intrusion, these sites are regularly plagued by nuisance alarms. The largest companies own tens of data centers. Even if the number of daily false alarms is below five, the company could receive dozens a day from all the data centers combined. This inundates security systems.

Many times, security guards or law enforcement will end up responding to erroneous alarms, which take their attention away from true threats. By utilizing a deep learning target classifier that analyzes data from both the radar and video stream, the nuisance alarm rate (NAR) can be significantly reduced. In fact, for successful deployments, the system can replace physical guards, heavily reducing security operating costs.

There is a clear demand for perimeter security solutions that are effective in all conditions, and that reduce the NAR. While the integration of radar, video and deep learning technologies are still in its infancy, development has been rapid and there is no doubt that this will continue. This new integrated solution enables security to run at maximum efficiency while keeping costs minimal, simply by marrying the most reliable sensors with the most advanced analytics software available.

This article originally appeared in the October 2018 issue of Security Today.

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.