Home 2022 (Page 15)

Explosion-protected cameras: 4 things to know about them

In industrial settings, sparks from electrical devices, IP cameras included, have the potential to trigger explosions. Having explosion-protected cameras, then, becomes critical. These disasters incur heavy damage to the manufacturer, not to mention casualties. According to statistics by the National Fire Protection Association, between 2011 and 2015 municipal fire departments in the U.S. responded to an estimated average of 37,910 fires at industrial or manufacturing properties each year, with annual losses from these fires estimated at 16 civilian deaths, 273 civilian injures, and US$1.2 billion in direct property damage.

There are many causes to fires and explosions in industrial settings. A blogpost by Nilfisk cited the following five major causes: combustible dust, hot work, flammable liquids and gases, equipment and machinery, and electrical hazards. According to the post, electrical fires can occur due to one or a combination of the following factors: wiring that is exposed or not up to code, overloaded outlet, extension cords, overloaded circuits and static discharge.

IP cameras need to be well-protected in industrial settings. These cameras are electric devices that can emit sparks. They are also tasked with securing factory premises as well as, in some part, ensuring the factory’s operational and management efficiency. Making them explosion-protected allows them to function normally in an potentially explosive environment, thus giving users peace of mind.

“Explosion-protected cameras should be installed in any area where there is a risk of explosion, which could come from a number of sources. Environments where flammable liquids, gases and chemicals are being used or manufactured, and those where significant amounts of dust or fine particles are being created, all carry a risk of catastrophic explosion. Explosion-protected cameras are designed to mitigate this risk, while still enabling high-quality video surveillance,” said Ulrika Bretz, Product Marketing Manager at Axis Communications.

According to Bretz, explosion-protected cameras are suitable for industrial entities in a variety of sectors. “Environments where there’s a genuine risk of explosion are more common than you might think. From the oil and gas sector to farming and food production; from industrial chemicals to timber processing, hazardous environments where the risk of flammable liquids, gases and dust being ignited are those where explosion-protected cameras should be installed,” she said.

What are explosion-protected cameras

So what are these cameras? What make them explosion-protected? The answer lies in the camera’s enclosure.
“The industry term for explosion-protected cameras such as those from Axis is ‘Ex d’, where the device enclosure provides the protection. Explosion-protected cameras are enclosed in heavy-duty casings, typically made of stainless steel or aluminum, which are certified to protect against any spark being emitted from the camera which could provide an ignition source for an explosion,” Bretz said.

What certifications are there to prove the cameras are protected

What certifications are out there to show proof the housing is protected? Bretz cited Axis’s own examples. “The housing of Axis explosion-protected cameras is certified worldwide according to applicable standards: NEC (USA), CEC (Canada), IECEx (International), ATEX (EU), EAC Ex (Eurasian Customs Union), PESO (India), INMETRO (Brazil), CNEx (China), KCC (Korea) and IA (South Africa), covering Class I/II/III, Divisions 1 and 2, and Zones 1, 2, 21, 22, Groups IIC and IIIC. We believe this represents the highest level of standards that customers should look for,” she said.
How should explosion-protected cameras be installed

The installation of explosion-protected cameras also requires special attention. “First of all, they shall be installed by a certified technician in a hazardous area,” Bretz said, adding where to install the cameras depends on the application. “A moving PTZ camera is typically installed higher up to monitor a larger area, while fixed cameras are installed closer to the area of interest. An alternative to install a fixed camera with high zoom factor at greater distance is to install a high resolution camera closer to the monitored area, where one would get both the same level of detail but also a better overview of the area.”

What analytics should be included in these cameras

Explosion-protected cameras can include the same set of analytics found in typical IP cameras. Since these cameras are deployed in industrial settings, analytics that detect smoke and flames can be helpful but should not be the only means of detection.

“While flame and smoke detection analytics are obviously beneficial in environments where there is a risk of explosion, it is also important to state that surveillance camera analytics for these areas should not replace other flame and smoke detection sensors,” Bretz said. “More broadly, analytics to support good health and safety practices – such as the wearing of appropriate PPE and analytics to create alerts should people enter prohibited areas – can support safety and security in hazardous areas.”

Going Deeper: Mine Security

Established long before data mining and bitcoin mining, mining the earth continues to be a major economic driver. The International organizing committee for the world mining congress issues a yearly World Mining Data report. The 2021 report states that world mining production in 2019 was 17.9 billion metric tons (roughly the weight of 96,000 Boeing 747 Jumbo jets). Most of the production (58.9%) was in Asia, followed by North America (15.8%), in terms of countries, China, U.S., Russia and Australia are the four biggest mining nations. In the last few years, Australia and China have seen the most growth and surpassed Africa, especially in the production of minerals like Lithium, Gallium and Niobium needed for the battery industry, demand for which doubled since 2015.

Challenges in mining security and safety

The mining industry faces extreme and multi-faceted challenges in both security and safety. The key concern of security managers in the mining sector are keeping employees safe, however, they are also tasked with preventing theft of valuable raw materials and equipment, choosing equipment that can work in extreme environmental conditions, maintaining compliance with health, safety and environmental regulations and more often than not, working in politically unstable countries.

Working in harsh conditions

Mining security faces three main challenges: harsh conditions, large areas and high costs for installing comprehensive solutions. Compared to commercial-use security systems, mine security systems must work in harsh environments. Dust, humidity, fog, low light, heavy water flow, flammable gases and extreme temperature are common. At the depths of mines, the temperatures could reach in excess of 45 degrees Celsius and the environment is constantly moist and humid. The outside climate in countries like Australia, South Africa or Russia can also be challenging with freezing temperatures in winter or searing desert heat in summer.

“When considering these conditions, equipment should be tested and certified with appropriate impact and ingress ratings, and this should be further evidenced and supported by the manufacturer through long product warranties. Reliable equipment ensures the system continues to do its job and the business continues to operate profitably whilst protecting its workforce” emphasized Mike Margrain, National Technical Manager for Gallagher in Australia.

Equipment therefore needs to be ruggedized and customized to mining operations. Operators need sealed, waterproof units with vibration dampers, which can function over a wide temperature range. All cables need to be secured in airtight or waterproof material, preventing dust and other particles from damaging them. Explosion-proof devices must be installed with appropriate cable management systems.

Cabling technique for example is different for mines, since drilling or attaching cables to rock can only be done by engineering personnel. The solution is pre-installed infrastructure cabling that provides power and communications for conveyor systems or vehicle workshops to most underground points.

Ensuring mine employee safety

Employee safety is the primary concern in the harsh working environments in mines, and verifying authorized personnel is the first step in accomplishing this.

Access control at mines should only admit personnel who passed safety inductions, medical checks and training. Added features include license renewal and expiry notifications. Management is increasingly aware of the cost related to worker safety failures, loss of lives and loss of material and equipment. Other than passing government regulations, increasing the level of security and safety could save money, increase productivity, reduce losses in infrastructure and cut production downtime.

“In underground operations, it is paramount that the location of workers is known due to the elevated risk in these environments. Cardholder location tracking is implemented to ensure workers can be accounted for in the event of an emergency, or to safely manage underground blasting” explained Margrain and described how this works in the field: “Providing electronic ‘tagging’ stations and implementing long-range tracking of personnel ensures the control room operators not only know how many people are in locations underground, but in which area each worker resides. Integrating this data into firing procedures ensures explosives cannot be triggered until all personnel are accounted for in safe areas. Tagging portals which provide feedback to the worker with personal information (and photo ID images) provide peace of mind that the system has indeed logged their location as they travel to different areas while on shift. Furthermore, long-range tracking of workers can be employed in underground operations where travel is required in buses, light vehicles, or machinery. This ensures the location data can be captured without requiring personnel to exit vehicles in dangerous locations to present to a physical access point. The method of access credential utilized for this safety data becomes extremely important as the risk of missed movement can have real implications for personnel health and safety”.

In addition to controlling access, monitoring the work zone is essential for protecting employees. The use of video surveillance underground helps to monitor miner safety by viewing rock falls or accidents in real time, speeding up search and rescue time, and help inhibit illegal activity such as theft or pirate miners. For large areas, radar integrated with video detects if a worker is in a hazardous area or is near hazardous materials or gases. It secures transport and storage of ammonia nitrate, explosives and other hazardous materials.

Should an accident occur, the operational health and safety (OH&S) solution must track miners by access control, sensors and RFID systems. The solution should generate “muster reports” quickly, providing the exact number of individuals in an area to the control room personnel at any given time.

Access control solutions in mines

Access control in the mining and resources sector is generally used less for security and more to manage governance, risk, and compliance; “it’s all about protecting the safety of workers and ensuring business continuity,” said Gallagher’s Margrain. “This includes managing personnel competencies to only allow access to those that hold active qualifications and inductions for the site, or within a particular onsite area.  Contractors may also perhaps only enter if they hold current insurance and have an active work order. In many countries, there are state or government legislated licenses that a worker must hold before they can work on a mining site. These competency level controls will differ depending on what role a worker has and where they are working — for example, there will be different enforcement rules for someone working underground, than those working only on the mine surface” he added.

“Fatigue is a significant risk to workers at an organization that operates 24/7, particularly to those who work night shifts or are working in dangerous environments. We see these rules being applied in more stringent ways for such personnel to prevent a worker from breaching fatigue policies during their shift. An access control system allows sites to quickly locate workers for risk assessments and a potential change of personnel – not only saving time, but also preventing disruption to the site. This type of management (with appropriate enforcement and proactive dynamic notifications) therefore becomes even more important for personnel that are working underground,” explained Margrain. To prevent theft, most attention is focused on access control and intrusion detection for storage, processing areas and areas where heavy machinery is present.

Whilst biometric access control has rapidly increased in popularity in recent years, the uptake in the mining and resources industry has been slow. The primary reasons for this are because daily work environments can impact the ability to reliably match workers via biometrics, due to workers becoming dirty or wearing PPE (personal protective equipment).

Video surveillance in mine security

Security requirements differ by the mine type. Open-pit mines are based on authority and risk levels and put emphasis on access control, while underground mines — with a higher requirement for safety — put emphasis on people location management.

The large area of mines poses a challenge to security. Fencing and lighting might be very expensive, and even with the most comprehensive security solution installed, surveillance is not considered as a viable option for many underground mines, due to harsh conditions and extended tunnel length. Large mines can have hundreds of kilometers of tunnels, which simply cannot be effectively monitored by cameras.

Intrusion detection in mines

While priority areas depend on the site, a mine’s security profile is generally developed from the outside in, making perimeter security the first concern. However, although perimeter fencing is important, it is often impractical due to the large and difficult landscape of mine sites.

Video surveillance can detect perimeter intrusion. Day and night cameras are suited for open areas with good light over long distances. Infrared cameras can perform close-range monitoring at low light entry and exit points. For dark outdoor areas, thermal imaging cameras can see intruders.

Preventing equipment theft

Some mine vehicles are worth millions of dollars and are costly for downtime and repairs, so monitoring and securing equipment is important. Other than asset tagging, sensor solutions such as onboard vehicle collision alert technology also help protect property. The collision alert system detects hazards in the vehicle’s path and alerts drivers for potential collisions, preventing damage to the vehicle and protecting worker safety. Solutions like these provide invaluable production data feedback in difficult-to-reach areas. When integrated with access control, mine companies can make sure that only authorized personnel can operate the vehicle. The option of combined driver & vehicle identification increases security as you know exactly who was driving which vehicle.

Driver-based automatic vehicle identification (AVI) ensures that a vehicle can never leave, or get access to a secured area unless occupied by an authorized driver. Vehicle and driver access traditionally requires the driver to stop and badge or present their access card. This can often result in traffic congestion around access points/gates. Current solutions allow vehicles (both trucks and cars) to activate gates far enough in advance (up to 10m, at speeds up to 200 km/h) which eliminates the need for vehicles to stop, ensuring an uninterrupted flow of traffic. This is a notable feature for mining sites where it is disruptive to stop and start heavy machinery.

Trends in mine security

The United States Mine Safety and Health Administration (MSHA) maintains a database of all mine-related accidents and fatalities in the U.S. MSHA accident reports show that footage from video surveillance is often used in the forensic investigation of accidents.

On May 2, 2020, Rodger A. Zimmerman, a 56-year-old front-end loader operator died when he was engulfed by material inside a collection container (hopper) at Enon Sand & Gravel mine. Zimmerman entered the hopper to clear a blockage caused by material inside the hopper. Once inside, a large amount of material dislodged, engulfing Zimmerman. Video evidence from the mine’s surveillance system verified entry into the hopper to dislodge blockage from underneath was a common practice and occurred repeatedly on previous days captured on the video. The surveillance video showed miners on the belt structure and/or inside the hopper not wearing safety belts or harnesses and not equipped with lifelines, while the belt was operating and without engaging in lock-out-tag-out (LOTO) procedures.

Today’s video analytics can be used to detect and stop this type of accident before happening. Video analytics can raise an alert when employees are getting too close to dangerous equipment or if they are not wearing the right safety equipment like a hard hat or safety harness. Hikvision for example installed a system in a coal mine in China that increased worker safety by monitoring the areas around winches and other equipment, and by sending alerts if employees get too close. The Hikvision solution was also configured to support specific mining-safety applications, such as constant monitoring of surface water levels in different areas of the mine. Constant seepage from rock formations means that surface water can accumulate in different areas of the mine, which is a problem in terms of potential flooding, damage to infrastructure, and worker safety risks. The Hikvision system monitors surface-water levels constantly and allows the mine staff to take action to deal with any problems that arise before water levels exceed safe limits.

Ai-driven video analytics are gaining traction as a means to minimize false alarms. Avigilon’s H4 Thermal camera for example is embedded with Avigilon self-learning video analytics to provide long-range perimeter protection and leverages thermal technology to operate under challenging conditions while minimizing false alarms. It detects the movement of people, vehicles and partly camouflaged objects in complete darkness or areas with challenging light conditions.

Security systems are also used to drive compliance with OH&S regulations. Access control manufacturer Gallagher allows cardholder information to be recorded in the Gallagher system and shared bi-directionally with existing HR/people management systems for accurate, real-time use. Staff records provide a full audit trail to ensure compulsory training and testing are undertaken. This minimizes corporate liability and enables organizations to meet their Duty of Care.

Mobile smartphone devices are commonly used to spot-check workers on-site (i.e., to validate they are trained and inducted to be where they are, or performing their current task), as well as being able to be used for mobile evacuation procedures and access control movements.

Compliance driving product requirements

Given the risks associated with mining operations, government legislation can be stringent but differ immensely in different parts of the world.  “We have seen an increase in concern around fatigue and exposure, and the need for reporting to assist with state levy calculations. Cases of corporate manslaughter against negligent management have certainly created more interest in systems which can demonstrate duty of care and protect workforces,” said Margrain. In many cases, not only do such system implementations meet those goals while ensuring business continuity, but they also demonstrate a reduction of operational cost through improved efficiency. Margrain recommended factoring this into vendor selection: “Having a system with governance, risk, and compliance solutions that can be tailored to meet changing requirements, without significant reinvestment, should be factored into vendor selection. By working with their vendor, sites operating in unique conditions like that of mining, can design a system that is tailored to the specific needs of their site and ensure health and safety requirements are met at the required level”.

(Source: asmag.com)

5-Year quality guarantee on some Dahua product lines

Selected project-based Dahua products shipped on January 1, 2022, onwards are now covered by the upgraded 5-year warranty, free of charge.

This five-year warranty policy is free for customers and does not require any extra payment. Dahua Technology will continue to provide high-quality products, excellent global service system, and stable supply of raw materials, so that customers can avail longer product value without adding to their budget.

Dahua Technology has a global marketing and service network system. It has established 57 overseas subsidiaries, representative offices and service networks in Asia Pacific, North America, Europe, Africa and other regions, and has set up more than 150 authorized customer service stations. This service system can help ensure that its customers enjoy the five-year warranty service without worries.

ASSA ABLOY PULSE brings access control to more than just doors, without batteries or wires

London, May 2022 – Business often face limitations when they try to bring all access points inside and outside their building into an access control system. Gates, remote sites, cabinets and other points are a specification challenge. Now the new DIN-range of PULSE self-powered electronic cylinders and keys allows businesses to overcome this hurdle, without any need for drilling during installation.

 PULSE key-operated access control is self-powered using energy harvesting technology: Devices run without any external energy source at the door, neither wires nor batteries. The PULSE cylinder range includes door locks, cam-locks, furniture locks and padlocks which can operate outdoors in the harshest climates. Almost any cylinder can be switched for a PULSE device and connected without wires or drilling.

To unlock, a user simply inserts and turns their programmable PULSE key. The power generated is harvested to energize the lock’s encrypted electronic security. Once authorized by the Incedoä Business management system, the lock opens.

Managing PULSE devices is straightforward. From the Incedo interface, a facility manager programs each PULSE key with the exact unlocking permissions the keyholder needs. If a key goes missing, a few clicks cancels it and restores site security.

Convenient, scalable and easy to manage

Users find PULSE easy, because on the surface, a PULSE lock appears to work just like any other — with a major benefit: Their single PULSE key unlocks every opening where they are authorized. One key pre-programmed carries all their cleared permissions, no matter how many doors they need to open.

For maximum convenience, a PULSE key is equipped with two authentication technologies. It may be used, like a traditional key, to turn in the PULSE lock and generate power. The same key also doubles as an RFID credential, able to unlock doors equipped with a wireless or wired RFID reader. For users and building managers, this is much more convenient than carrying or issuing two separate credentials.

Businesses have the option to start small — with a handful of PULSE cylinders, padlocks and cabinet locks, for example — and grow an Incedo Business system as their needs change. The initial investment in hardware or software is always protected, because Incedo is built to expand on demand, rather than to replace.

PULSE locks with energy harvesting technology provide this gateway to a flexible, scalable system controlled from one Incedo Business interface. They can meet the needs of a moving organization — without compromises, now or in the future.

Control PULSE locks — and more — from a single, flexible system

Security managers and company directors can be confident their investment in PULSE is future-proofed. Choosing PULSE devices does not lock anyone into a single electronic access technology: PULSE is just one hardware option within the Incedoä access control ecosystem.

For example, at one site, PULSE devices can lock server rooms, cabinets and outdoor storage facilities, while AperioÒ wireless locks secure offices and meeting rooms and Signo wired readers secure the main entrance.

“By connecting Pulse to the Incedo Business platform, we offer our customers a unique choice,” says Henrik Degn, Business Development Manager, PULSE at ASSA ABLOY Opening Solutions EMEIA.

“Based on their needs they can manage energy-harvesting electronic locks, wireless locks and wired readers within one access control solution. Everything is controlled together from a single Incedo interface, with the option to scale up or down, adding cloud management or software services.”

To learn more about the ASSA ABLOY PULSE cylinder range, download a digital brochure at https://campaigns.assaabloyopeningsolutions.eu/pulse

iLOQ enhances partnership with National Hockey League

Before the onset of the pandemic, Iloq signed a framework agreement with the National Hockey League (NHL). The first phase of the cooperation was to promote Iloq and its products during the 2021 Stanley Cup playoff games broadcast in Europe. Prominent branding in broadcasts with the use of ‘virtual blue line’ advertising brought unprecedented visibility for the company.

Now, as we ease our way back to ‘normalilty’ after the pandemic, the second wave of the partnership can be fulfilled. This is the promotion of Iloq during the NHL Global Series games to be played in Finland in November this year.

“The goal of our initial partnership with the NHL was to maximize awareness of the Iloq brand in key European markets as we continue to extend our market reach. With ice hockey, and particularly the NHL, being one of the most popular global sports leagues around the world, we have already successfully reached a large audience. With the Global Series games bringing some home-grown talent to Finland, we will attract worldwide media interest and ensure that Iloq’s brand is visible front and center bringing us many more ‘fans’ and unlimited business opportunities,” states Joni Lampinen, Iloq’s Chief Marketing Officer.

Siemens pulls out of Russia after 170 years

Siemens will exit the Russian market as a result of the Ukraine war. The company has started proceedings to wind down its industrial operations and all industrial business activities. The financial impact of this decision is reported as part of the organisation’s regular disclosure on its second quarter results.

After the start of the war, Siemens put all new business in and international deliveries to Russia and Belarus on hold. The comprehensive international sanctions, as well as current and potential countermeasures, impact the company’s business activities in Russia, particularly rail service and maintenance.

Roland Busch, President and CEO of Siemens AG, said: “We condemn the war in Ukraine and have decided to carry out an orderly process to wind down our industrial business activities in Russia. This was not an easy decision, given our duty of care for our employees and long-standing customer relationships, in a market where we have been active for almost 170 years. We are evaluating the impact on our people and we will continue to support them to the best of our abilities.”

Spanish government approves Vaxtor acquisition by Mobotix

Mobotix has been working successfully with the Vaxtor Group as a Technology Partner over the last few years, therefore, the acquisition of the Spanish company who develop automatic character recognition software, using video technology, was a logical consequence of this intensive cooperation.

The strategic expansion was already announced on January 17, 2022, after the purchase agreement for 100% of the company shares was signed.

Due to the exceptional importance of Vaxtor’s technologies, the Spanish licensing authorities requested a judicial review of the acquisition, which has now been positively decided and the Spanish Ministry of Industry and Trade has approved the takeover. The closing is now officially completed and the legal transfer of the company shares has taken place.

Mobotix AG strengthens its operating business with the strategic acquisition of the Spanish Vaxtor Group from Tres Cantos, Madrid. The acquisition is an essential building block for Mobotix in its positioning as a high-end solution provider based on video and artificial intelligence technology. It will also strengthen the development cooperation between Vaxtor and the Mobotix development office in Madrid, allowing both companies to be able to address emerging growth markets and future requirements even more effectively. According to the company, Market Intelligence estimates that the global market for automatic license plate recognition solutions alone will grow from $2.3 billion to $3.8 billion by 2025.

“Video technology has long gone far beyond just security applications. Data is the key to the future. Collecting, analysing, and connecting vast amounts of data open up new possibilities for our customers,” explains Mobotix CEO Thomas Lausten. “Video technology with artificial intelligence will help protect, support and preserve values and will make life more pleasant, easier and better. With the combined expertise of Mobotix and Vaxtor, we are ideally positioned.”

Vaxtor is a leading provider of artificial intelligence (AI)-based video analytics software, specialising in optical character recognition (OCR) and deep learning technologies. Vaxtor’s 100 percent in-house development, technical vision, expertise, continuous R&D investment, and product quality have enabled it to achieve growth and positive operating results.

SALTO successfully passed ISO 9001 & 14001 certification audit

SALTO has approved one more year of the quality audits for ISO 9001 (Quality Management System Certificate) and ISO 14001 (Environmental Management System Certificate), passing the audit with 0 non-conformities.

These certification renewals guarantee quality as a permanent and priority objective and ensure a commitment to customers regarding the implementation and maintenance of integrated Quality and Environmental Management Systems.

“The fact that SALTO has renewed this double ISO 9001/14001 certification has made us a benchmark in our commitment to the quality and sustainability of our products and processes,” said Ricardo Garcia, SALTO Sustainability and Quality Manager. “Our commitment to continuous improvement propels us to go beyond what is required by international certification standards to include things such as ODS, compensation for our carbon footprint, and eco-design.”

SALTO maintains its commitment to the quality, continuous improvement, and sustainability of its products and processes. With the management of integrated Quality and Environmental Systems, SALTO’s policy is consolidated in order to achieve the required level of quality and continuous improvement in each of the activities carried out by the company. The purpose of this commitment helps SALTO achieve both customer satisfaction and environmental protection.

ISO 9001 and 14001

ISO 9001 quality management means that the organization works to: develop a management plan based on strategic guidelines framed in a global sustainability strategy and focus on minimizing risks and continuous improvement of processes and products, and measure customer and partners’ satisfaction to answer and fully meet customer needs.

ISO 14001 quality management means that the organization works to: conform to legal requirements, have a commitment to the life cycle of products and services in its processes, try to minimize the environmental impact caused by the activity carried out, and seek continuous improvement of its environmental performance.

Igigi: Path to Innovation and synergy of marketing and security industry

Representatives of the G4S company and Igigi startup held a presentation as part of a series of a&s Adria webinars on the marketing platform, and a virtual character called Igigi.

Igigi character uses artificial intelligence algorithms based on which it is able to interact with the approaching people, monitor the behavior of people, and based on that give recommendations for further action.

The Igigi is mostly in shopping malls or in banks where it can provide certain information on request.

In addition to the above possibilities, Igigi is an ideal security solution with regard to the possibility of acting in emergency situations through automatic incident detection.