Home Articles posted by a&s Adria (Page 137)

Energy harvesting access control solution wins at the Building Climate Awards

London, June 2022 – ASSA ABLOY’s access control technology PULSE has been recognized for its innovation in powering electronic locks with energy harvesting technology rather than batteries or mains electricity. It was awarded the Energy Prize at the 2022 Danske Byggecentre Building Climate Awards*.

The purpose of the awards is to “celebrate innovative products and solutions in construction and to increase knowledge of climate-friendly building materials.” From a shortlist of 28 products and solutions, four prizes were awarded: in Climate, Environment, Energy and Work Environment categories.

The jury included industry leaders and experts in the fields of both construction and sustainability, including Green Building Council Denmark**.

“We see an increase of businesses which are looking for energy savings across their building and facility management. There’s an increasingly urgent need to think sustainably about every product and solution that goes into a building,” says Henrik Degn, PULSE Business Development Manager EMEIA at ASSA ABLOY Opening Solutions.

“We are delighted that building and sustainability experts with such broad expertise have recognized the contribution that ASSA ABLOY PULSE access control can make.”

The benefits of PULSE for building owners and managers

PULSE programmable key-operated access control is wireless and self-powered: It runs without any external power source. The power generated when a keyholder inserts their key — kinetic energy which is usually “wasted” — is instead harvested to power the lock’s encrypted electronic security.

Installation is low impact, completed without wiring or drilling. An existing mechanical cylinder is simply swapped for a PULSE device.

“PULSE locks are also part of the Incedoäaccess control ecosystem,” adds Henrik Degn.. “With this flexible, scalable access management platform, facility managers can deploy PULSE energy harvesting locking alongside other wireless and wired locking. Everything is controlled from a single software interface.”

“It’s a comprehensive solution designed to save time and money for building managers — and the only energy harvesting locking solution which offers control from the cloud.”

With Incedoä Business Cloud, security teams can manage a wide range of access points and users remotely, while maintaining complete control over all their buildings — working smarter and more effectively.

They can deploy PULSE cylinders, padlocks and cabinet locks alongside electronic locking solutions for almost any opening or application. For users, a single, programmable PULSE key can unlock every PULSE cylinder or padlock. Its integrated RFID chip can also operate wireless or wired doors.

The 2022 Danske Byggecentre Energy Prize was presented in early May, at a special ceremony in Copenhagen, Denmark.

ASSA ABLOY PULSE was also recognized recently with a Trophées d’Innovation Silver Award presented at Expoprotection Sécurité in Paris.

To learn more about ASSA ABLOY PULSE, download a free Solution Guide at https://campaigns.assaabloyopeningsolutions.eu/pulse

Camera Link solution

VIVOTEK is a company originally from Taiwan, which has been producing video surveillance cameras and solutions for over 20 years. Complete production is in Taiwan, as well as a strong R&D department dedicated to developing new solutions and tracking needs on the job market.

Camera Link is a solution fully developed in our R&D department, and is completely revolutionary in the market, which no manufacturer can offer you.

The solution is intended for perimeter protection, which allows the user fully automatic perimeter protection, with advanced analytical solutions perimeter protection of the user is fully ensured.

The solution consists of bullet and PTZ cameras, bullet camera serves for fixed perimeter surveillance and threat detection via analytical solution based on artificial intelligence, while PTZ camera serves to monitor a specific object after bullet detection, PTZ camera also uses analytical solution based on artificial intelligence.

The solution is unique on the market because the cameras are directly connected to each other, and do not need a connection to the VMS (video management system). Which means the cameras are self-contained to perform their perimeter protection tasks.

In case of any loss of connection between the cameras and the server on which the VMS is located, the cameras will detect any threat perimeter and save the required video to the SD card, after the renewed connection with the servo can transfer to the server. So, with this solution the user is completely protected from material loss in case of loss of camera connection to the server.

The camera model IB9367-EHTV V2 is an ideal model for this application. It is a high processing power camera that can perform demanding perimeter protection actions. It is a 2MP resolution camera, 60 fps in 2MP resolution. It comes with two types of lenses, so all possible scenarios can be covered. The first is a 2.7-13.5mm motorized lens, while the second used to monitor remote areas, has a 5-50mm motorized lens. The camera still has strong WDR, and IR up to 50 meters for a 2.7-13.5mm lens, and up to 100 meters for a 5-50mm lens.

The camera is equipped with VIVOTEK Smart VCA analytics, which is based on artificial intelligence. VIVOTEK Smart VCA is a solution that detects people with a very high percentage. Detection is done in a 3D algorithm, thus completely ensuring protection against false alarms, because the analyst will only recognize the human form. Also, with a very high percentage can recognize various human movements, such as: walking, running. Can detect different scenarios (intrusion detection, loitering detection, line crossing detection, unattended object detection, missing object detection, face detection, crowd detection, running detection)

PTZ camera SD9368 EHL is a mobile camera with high processing power, which due to its performance can easily perform perimeter protection tasks. The camera has a resolution of 2MP, 60 fps in a resolution of 2MP. With a 4.25-170mm lens, which is a magnification of 40X. IR up to 250 m.

The PTZ camera is equipped with VIVOTEK SMART VCA analytics based on artificial intelligence, and with an auto-tracking function, which uses a 3D object tracking solution.

French hospital benefits from cost savings and easy staff management with SMARTair® wireless access control

London, June 2022 – When Groupe Hospitalier Mutualiste Portes du Sud looked to modernize door security, their focus was clear: A battery-powered rather than wired solution was required to meet the access control challenges of a hospital environment.

 Like any healthcare setting, Portes du Sud must ensure their premises are an open, welcoming space for the public while simultaneously keeping medicines, staff, equipment and sensitive data secure. Every user group — from doctors, nurses, patients and their visitors to a host of temporary and contract workers — needs access rights tailored to their precise demands and schedule.

A wire-free electronic solution offers a number of concrete advantages in future-proofing hospital access control and meeting these challenges. It provides managers with the flexibility to tailor rights to a whole team or just one person — and change or cancel those access permissions anytime. They can audit access for faster incident investigation.

While helping phase out expensive metal keys, wireless devices also offer seamless compatibility with existing mortise locks and easy, cost-effective installation without cables. And because they are powered by standard batteries, any future outages do not impact hospital security.

A flexible system, recommended by security experts

Portes du Sud consulted three specialist providers and each one recommended the same system: SMARTairÒ.

Hospital doors are now locked securely with battery-powered, wireless escutcheons: “One SMARTair escutcheon on its own replaces a wired reader, an electrical connection and a magnetic lock. And it is just as safe,” says Frédéric Steenhoute at Groupe Hospitalier Mutualiste Portes du Sud.

All credentials, door devices and users are managed easily from SMARTair’s TS1000 software. When someone loses their badge, managers cancel it with a couple of clicks, which saves the money and time which would be wasted changing locks in a mechanical system. If property goes missing, it’s easy to trace who went where and when, which keeps equipment and personal belongings safer.

And with no mechanical keys to order — badges are fast and cost-efficient to print from their own printer — the hospital saves money, too.

As well as protecting premises with a future-proofed solution, managers value the autonomy that wireless access control gives them. On any date, at any time of day or night, the ease of use and maintenance of a wire-free system makes life simpler for hospital technicians.

Devices are easy to maintain and can be moved if needed

Hospital managers enjoy everyday benefits in the management of staff and temporary contractors. “The fact we can assign rights to a whole team, and also specific rights to two or three people at the same time, is very useful,” adds Steenhoute.

SMARTair also several options for extending the reach or functionality of access control in the future.  The hospital can add escutcheons with antibacterial coating, for example. Another potential future option, SMARTair’s Openowä mobile app enables management and door unlocking by smartphone.

SMARTair devices can be moved anytime, to adjust or reconfigure door coverage. Web management can handle access for new buildings or any Group expansion.

Choosing SMARTair enables hospital managers to do all this — as well as install and maintain the system — in-house, which saves even more time and money.

“Wireless solutions allow us to be autonomous,” says Steenhoute. “It is very easy to remove an escutcheon from one door and to install it on another door; all our technicians can do it.”

To learn more about SMARTairÒ wireless access control, download a free solution guide at http://campaigns.assaabloyopeningsolutions.eu/smartair

Suprema XPass 2. The ideal solution for secure access control

Suprema is a South-Korean technology-based company, a global leader in access control, time & attendance, and biometrics solutions. Suprema has now its European branch, Suprema Europe SARL, which is developing its partner’s network in the Balkans.

Suprema provides its own Access Control solutions as the XPass 2 RFID reader, very compact and available in three designs.

What makes the XPass 2 different?

Comparing to the traditional access control that is centralized (Door controller + RFID reader), the XPass 2 is using a distributed architecture (TCPIP Intelligent readercontroller). The reader is both a Door Controller and a Reader which lower the cost of ownership, both for product purchasing and installation, since installation is much quicker to operate.

The Suprema XPass 2 benefit PoE (Power over Ethernet), and can directly be connected to the door latch, the door sensor and Request to Exit button. For enhanced-security, XPass 2 has an optional SIO2 (Secure IO2) module, that will connect to the door and accessories. SIO2 will be installed indoor, in the secure area of the building and that is connected to XPass 2 via RS485 OSDP (with secure channel in a MasterSlave mode).

Where the XPass 2 can be used?

XPass 2 is an ideal solution for those who need to reduce the cost of installation with keeping security as well of quality of service. XPass 2 is a perfect fit for shared working spaces, small offices, as well as for the gyms, schools, universities, factories, hospitals, or logistics centers, to manage from 10 to 100 doors. Since it is IP67, Suprema XPass 2 can be installed both indoor and outdoor. The XPass 2 comes with a strong, vandal-resistant package, rated IK08. It has invasive moisture protection with the operating temperature between -30° to 65°C. No matter how harsh the environment, the XPass 2 is the ideal choice for outdoor applications.

Compatible with different types of access cards

Due to its dual-frequency RFID card technology, XPass 2 supports both LF(125KHz) and HF(13.56MHz) including most common RFID card standards (Mifare, DesFire, EV1EV2). If you have already issued cards for your employees such as EM cards, you can smoothly, switch to more secure standard such as EV2 with both old and new card working at the same time. You do not need to purchase all the readers again.

NFC for mobile connection

The Suprema XPass 2 can read Bluetooth Low Energy (BLE) and NFC signals to provide mobile credential capability when using Suprema’s Smartphone application [AIRFOB PASS] available on AppStore (IOS) and Google Play (Android).

With that APP, Suprema turns any iOS or Android smartphone into a highly secure contactless access credentialing device, eliminating the cost associated with issuing access cards and proximity devices. Due to our mobile access control solutions, your smartphone becomes your access key.

If you have further questions and inquiries, do not hesitate to contact us at www.supremainc.comenwheretobuylist.asp.

Bosch 9000i cameras: Maximum situational awareness for perimeter protection

The new MIC IP fusion 9000i 9mm camera expands the current MIC IP fusion 9000i line-up to bring maximum situational awareness to perimeter detection applications such as along a fence line at an energy or utility facility, data center, or other high-level security sites. The new camera brings a wider thermal field of view (70° x 52°), downscaling prepositions to six for a single camera to provide 360-degree coverage in approximately 30 seconds. Receiving a full circle view quickly lowers security costs per square meter, resulting in customer savings. The MIC IP fusion 9000i 9mm camera combines a thermal imager with a 1080p starlight camera in a single housing. By employing a unique technology, metadata fusion, the camera can blend object detection data from both thermal and optical video streams and display them in one view. It also can withstand all weather conditions regardless of lighting.

Choosing a lens option

Perimeter detection applications require different lenses to detect activity in and around the fenced perimeter. For short range applications in which a wide scene (360 degree) must be fully captured swiftly, the new 9mm lens is the ideal option. For medium range applications, the 19mm lens is the right choice. A longer range lens (50mm) is used in applications where long-range detection/early warning is important. For example monitoring activity along borders, in shipping channels or on airport runways. The video below Illustrates the difference in field of view between the 50mm and 9mm lens models.

Rugged and intelligent by nature

As a member of the MIC family, all MIC IP fusion 9000i cameras are rugged by nature and offer built-in Intelligent Video Analytics, specifically designed to withstand the harshest environments. Even in the most extreme conditions, video data can be interpreted directly at the source to further improve the level of security or enable the video data to do more than security alone.

Metadata fusion

The MIC IP fusion 9000i 9mm camera combines a thermal imager with an optical camera in a single housing. It employs a unique technology, metadata fusion, to blend object detection data from both thermal and optical video analytics streams and display them in one view. Metadata fusion focuses on the invisible things that need attention and provides operators with overall awareness of their environment regardless of which video stream they are watching.

For example, while a person is walking in a tunnel, a serious incident takes place causing the tunnel to quickly fill with smoke. Due to poor visibility, the optical camera can no longer detect the person. However, the thermal camera with its special sensor will continue to distinguish them and the metadata overlay is visible on the optical image. An alarm is triggered and the operator receives notification of the event from both image streams and can immediately switch to the thermal image by clicking on the metadata. Once the operator sees the video data related to the event, they can determine the next right action to take.

Multi-credential flexibility for access control

Suprema, a global leader in access control, biometrics and time & attendance solutions, shared partner testimonials about its security controller CoreStation that helps facilitate building multi-credential access control systems. Suprema CoreStation is a biometric-enabled security controller that provides great system design flexibility with credential options ranging from PIN, RF card reader, mobile access to fingerprint and face recognition.

Powerful performance

Meyer, a partner in Turkey, was able to construct a face recognition access control system for its customer using Suprema CoreStation and Suprema face recognition terminals.

“CoreStation offers unrivaled matching speed. The customer preferred to connect the face recognition terminals to CoreStation instead of directly to the server for stronger security. This meant that all user data was saved in CoreStation and data had to be transferred to CoreStation for every matching operation. Despite this configuration, users do not notice any delay in authentication thanks to CoreStation’s powerful performance,” said Orcun Bayindir, CEO of Meyer.

IQ trading, a partner in Ukraine, enabled fingerprint recognition access control system for a banking customer. Andrii Glukhov, technical support lead at IQ trading, cited CoreStation’s scalability, enterprise level memory and interlock zone support as advantages.

“Using Suprema CoreStation, we connected 26 two-sided doors with high performance fingerprint authentication. CoreStation is a unique, powerful controller that can store up to 500,000 users, 1,000,000 fingerprint templates and 5,000,000 logs, providing uninterrupted service regardless of network issues. We were also able to create sequential passages with interlock zones, increasing overall security level and eliminating the possibility of a person entering the second door without closing the first one,” said Glukhov.

Easy to integrate

Absolon, a partner in Europe, provided mobile access solution to Crestyl, a leading real estate developer in Czech, using CoreStation. The site had over 100 doors with 1,500 employees and required a secure yet flexible controller that could be easily integrated with third party systems. Crestyl was operating a third party system C4 software and was looking for a way to add mobile credential without a major system overhaul. CoreStation, together with Suprema BioStar 2 and Suprema XPass D2 readers, was a great answer because of CoreStation and BioStar 2’s integration flexibility. C4 was integrated with BioStar 2 via BioStar 2 API and XPass D2 were selected for mobile credential compatibility.

“CoreStation’s appeal lies in the gamut of credential options it supports. Partners and customers can enable PIN, RF card, mobile access as well as biometric credentials like face and fingerprint with Suprema’s intelligent controller,” said Hanchul Kim, CEO of Suprema Inc.

Commitment to Security Standards and Compliance

Suprema’s four-door access control panel CoreStation is its first controller that acquired UL 294 compliance, a certification that evaluates the safety and reliability of the product. Suprema’s compact outdoor RFID reader, XPass D2 is SIA OSDP verified, meaning that the device conforms to the SIA Open Supervised Device Protocol (OSDP) standard and the related performance profiles. It ensures higher security than a common access control communication protocol by constant monitoring of wires and protecting with high-end AES-128 encryption.

Explosion-protected cameras: 4 things to know about them

In industrial settings, sparks from electrical devices, IP cameras included, have the potential to trigger explosions. Having explosion-protected cameras, then, becomes critical. These disasters incur heavy damage to the manufacturer, not to mention casualties. According to statistics by the National Fire Protection Association, between 2011 and 2015 municipal fire departments in the U.S. responded to an estimated average of 37,910 fires at industrial or manufacturing properties each year, with annual losses from these fires estimated at 16 civilian deaths, 273 civilian injures, and US$1.2 billion in direct property damage.

There are many causes to fires and explosions in industrial settings. A blogpost by Nilfisk cited the following five major causes: combustible dust, hot work, flammable liquids and gases, equipment and machinery, and electrical hazards. According to the post, electrical fires can occur due to one or a combination of the following factors: wiring that is exposed or not up to code, overloaded outlet, extension cords, overloaded circuits and static discharge.

IP cameras need to be well-protected in industrial settings. These cameras are electric devices that can emit sparks. They are also tasked with securing factory premises as well as, in some part, ensuring the factory’s operational and management efficiency. Making them explosion-protected allows them to function normally in an potentially explosive environment, thus giving users peace of mind.

“Explosion-protected cameras should be installed in any area where there is a risk of explosion, which could come from a number of sources. Environments where flammable liquids, gases and chemicals are being used or manufactured, and those where significant amounts of dust or fine particles are being created, all carry a risk of catastrophic explosion. Explosion-protected cameras are designed to mitigate this risk, while still enabling high-quality video surveillance,” said Ulrika Bretz, Product Marketing Manager at Axis Communications.

According to Bretz, explosion-protected cameras are suitable for industrial entities in a variety of sectors. “Environments where there’s a genuine risk of explosion are more common than you might think. From the oil and gas sector to farming and food production; from industrial chemicals to timber processing, hazardous environments where the risk of flammable liquids, gases and dust being ignited are those where explosion-protected cameras should be installed,” she said.

What are explosion-protected cameras

So what are these cameras? What make them explosion-protected? The answer lies in the camera’s enclosure.
“The industry term for explosion-protected cameras such as those from Axis is ‘Ex d’, where the device enclosure provides the protection. Explosion-protected cameras are enclosed in heavy-duty casings, typically made of stainless steel or aluminum, which are certified to protect against any spark being emitted from the camera which could provide an ignition source for an explosion,” Bretz said.

What certifications are there to prove the cameras are protected

What certifications are out there to show proof the housing is protected? Bretz cited Axis’s own examples. “The housing of Axis explosion-protected cameras is certified worldwide according to applicable standards: NEC (USA), CEC (Canada), IECEx (International), ATEX (EU), EAC Ex (Eurasian Customs Union), PESO (India), INMETRO (Brazil), CNEx (China), KCC (Korea) and IA (South Africa), covering Class I/II/III, Divisions 1 and 2, and Zones 1, 2, 21, 22, Groups IIC and IIIC. We believe this represents the highest level of standards that customers should look for,” she said.
How should explosion-protected cameras be installed

The installation of explosion-protected cameras also requires special attention. “First of all, they shall be installed by a certified technician in a hazardous area,” Bretz said, adding where to install the cameras depends on the application. “A moving PTZ camera is typically installed higher up to monitor a larger area, while fixed cameras are installed closer to the area of interest. An alternative to install a fixed camera with high zoom factor at greater distance is to install a high resolution camera closer to the monitored area, where one would get both the same level of detail but also a better overview of the area.”

What analytics should be included in these cameras

Explosion-protected cameras can include the same set of analytics found in typical IP cameras. Since these cameras are deployed in industrial settings, analytics that detect smoke and flames can be helpful but should not be the only means of detection.

“While flame and smoke detection analytics are obviously beneficial in environments where there is a risk of explosion, it is also important to state that surveillance camera analytics for these areas should not replace other flame and smoke detection sensors,” Bretz said. “More broadly, analytics to support good health and safety practices – such as the wearing of appropriate PPE and analytics to create alerts should people enter prohibited areas – can support safety and security in hazardous areas.”

Going Deeper: Mine Security

Established long before data mining and bitcoin mining, mining the earth continues to be a major economic driver. The International organizing committee for the world mining congress issues a yearly World Mining Data report. The 2021 report states that world mining production in 2019 was 17.9 billion metric tons (roughly the weight of 96,000 Boeing 747 Jumbo jets). Most of the production (58.9%) was in Asia, followed by North America (15.8%), in terms of countries, China, U.S., Russia and Australia are the four biggest mining nations. In the last few years, Australia and China have seen the most growth and surpassed Africa, especially in the production of minerals like Lithium, Gallium and Niobium needed for the battery industry, demand for which doubled since 2015.

Challenges in mining security and safety

The mining industry faces extreme and multi-faceted challenges in both security and safety. The key concern of security managers in the mining sector are keeping employees safe, however, they are also tasked with preventing theft of valuable raw materials and equipment, choosing equipment that can work in extreme environmental conditions, maintaining compliance with health, safety and environmental regulations and more often than not, working in politically unstable countries.

Working in harsh conditions

Mining security faces three main challenges: harsh conditions, large areas and high costs for installing comprehensive solutions. Compared to commercial-use security systems, mine security systems must work in harsh environments. Dust, humidity, fog, low light, heavy water flow, flammable gases and extreme temperature are common. At the depths of mines, the temperatures could reach in excess of 45 degrees Celsius and the environment is constantly moist and humid. The outside climate in countries like Australia, South Africa or Russia can also be challenging with freezing temperatures in winter or searing desert heat in summer.

“When considering these conditions, equipment should be tested and certified with appropriate impact and ingress ratings, and this should be further evidenced and supported by the manufacturer through long product warranties. Reliable equipment ensures the system continues to do its job and the business continues to operate profitably whilst protecting its workforce” emphasized Mike Margrain, National Technical Manager for Gallagher in Australia.

Equipment therefore needs to be ruggedized and customized to mining operations. Operators need sealed, waterproof units with vibration dampers, which can function over a wide temperature range. All cables need to be secured in airtight or waterproof material, preventing dust and other particles from damaging them. Explosion-proof devices must be installed with appropriate cable management systems.

Cabling technique for example is different for mines, since drilling or attaching cables to rock can only be done by engineering personnel. The solution is pre-installed infrastructure cabling that provides power and communications for conveyor systems or vehicle workshops to most underground points.

Ensuring mine employee safety

Employee safety is the primary concern in the harsh working environments in mines, and verifying authorized personnel is the first step in accomplishing this.

Access control at mines should only admit personnel who passed safety inductions, medical checks and training. Added features include license renewal and expiry notifications. Management is increasingly aware of the cost related to worker safety failures, loss of lives and loss of material and equipment. Other than passing government regulations, increasing the level of security and safety could save money, increase productivity, reduce losses in infrastructure and cut production downtime.

“In underground operations, it is paramount that the location of workers is known due to the elevated risk in these environments. Cardholder location tracking is implemented to ensure workers can be accounted for in the event of an emergency, or to safely manage underground blasting” explained Margrain and described how this works in the field: “Providing electronic ‘tagging’ stations and implementing long-range tracking of personnel ensures the control room operators not only know how many people are in locations underground, but in which area each worker resides. Integrating this data into firing procedures ensures explosives cannot be triggered until all personnel are accounted for in safe areas. Tagging portals which provide feedback to the worker with personal information (and photo ID images) provide peace of mind that the system has indeed logged their location as they travel to different areas while on shift. Furthermore, long-range tracking of workers can be employed in underground operations where travel is required in buses, light vehicles, or machinery. This ensures the location data can be captured without requiring personnel to exit vehicles in dangerous locations to present to a physical access point. The method of access credential utilized for this safety data becomes extremely important as the risk of missed movement can have real implications for personnel health and safety”.

In addition to controlling access, monitoring the work zone is essential for protecting employees. The use of video surveillance underground helps to monitor miner safety by viewing rock falls or accidents in real time, speeding up search and rescue time, and help inhibit illegal activity such as theft or pirate miners. For large areas, radar integrated with video detects if a worker is in a hazardous area or is near hazardous materials or gases. It secures transport and storage of ammonia nitrate, explosives and other hazardous materials.

Should an accident occur, the operational health and safety (OH&S) solution must track miners by access control, sensors and RFID systems. The solution should generate “muster reports” quickly, providing the exact number of individuals in an area to the control room personnel at any given time.

Access control solutions in mines

Access control in the mining and resources sector is generally used less for security and more to manage governance, risk, and compliance; “it’s all about protecting the safety of workers and ensuring business continuity,” said Gallagher’s Margrain. “This includes managing personnel competencies to only allow access to those that hold active qualifications and inductions for the site, or within a particular onsite area.  Contractors may also perhaps only enter if they hold current insurance and have an active work order. In many countries, there are state or government legislated licenses that a worker must hold before they can work on a mining site. These competency level controls will differ depending on what role a worker has and where they are working — for example, there will be different enforcement rules for someone working underground, than those working only on the mine surface” he added.

“Fatigue is a significant risk to workers at an organization that operates 24/7, particularly to those who work night shifts or are working in dangerous environments. We see these rules being applied in more stringent ways for such personnel to prevent a worker from breaching fatigue policies during their shift. An access control system allows sites to quickly locate workers for risk assessments and a potential change of personnel – not only saving time, but also preventing disruption to the site. This type of management (with appropriate enforcement and proactive dynamic notifications) therefore becomes even more important for personnel that are working underground,” explained Margrain. To prevent theft, most attention is focused on access control and intrusion detection for storage, processing areas and areas where heavy machinery is present.

Whilst biometric access control has rapidly increased in popularity in recent years, the uptake in the mining and resources industry has been slow. The primary reasons for this are because daily work environments can impact the ability to reliably match workers via biometrics, due to workers becoming dirty or wearing PPE (personal protective equipment).

Video surveillance in mine security

Security requirements differ by the mine type. Open-pit mines are based on authority and risk levels and put emphasis on access control, while underground mines — with a higher requirement for safety — put emphasis on people location management.

The large area of mines poses a challenge to security. Fencing and lighting might be very expensive, and even with the most comprehensive security solution installed, surveillance is not considered as a viable option for many underground mines, due to harsh conditions and extended tunnel length. Large mines can have hundreds of kilometers of tunnels, which simply cannot be effectively monitored by cameras.

Intrusion detection in mines

While priority areas depend on the site, a mine’s security profile is generally developed from the outside in, making perimeter security the first concern. However, although perimeter fencing is important, it is often impractical due to the large and difficult landscape of mine sites.

Video surveillance can detect perimeter intrusion. Day and night cameras are suited for open areas with good light over long distances. Infrared cameras can perform close-range monitoring at low light entry and exit points. For dark outdoor areas, thermal imaging cameras can see intruders.

Preventing equipment theft

Some mine vehicles are worth millions of dollars and are costly for downtime and repairs, so monitoring and securing equipment is important. Other than asset tagging, sensor solutions such as onboard vehicle collision alert technology also help protect property. The collision alert system detects hazards in the vehicle’s path and alerts drivers for potential collisions, preventing damage to the vehicle and protecting worker safety. Solutions like these provide invaluable production data feedback in difficult-to-reach areas. When integrated with access control, mine companies can make sure that only authorized personnel can operate the vehicle. The option of combined driver & vehicle identification increases security as you know exactly who was driving which vehicle.

Driver-based automatic vehicle identification (AVI) ensures that a vehicle can never leave, or get access to a secured area unless occupied by an authorized driver. Vehicle and driver access traditionally requires the driver to stop and badge or present their access card. This can often result in traffic congestion around access points/gates. Current solutions allow vehicles (both trucks and cars) to activate gates far enough in advance (up to 10m, at speeds up to 200 km/h) which eliminates the need for vehicles to stop, ensuring an uninterrupted flow of traffic. This is a notable feature for mining sites where it is disruptive to stop and start heavy machinery.

Trends in mine security

The United States Mine Safety and Health Administration (MSHA) maintains a database of all mine-related accidents and fatalities in the U.S. MSHA accident reports show that footage from video surveillance is often used in the forensic investigation of accidents.

On May 2, 2020, Rodger A. Zimmerman, a 56-year-old front-end loader operator died when he was engulfed by material inside a collection container (hopper) at Enon Sand & Gravel mine. Zimmerman entered the hopper to clear a blockage caused by material inside the hopper. Once inside, a large amount of material dislodged, engulfing Zimmerman. Video evidence from the mine’s surveillance system verified entry into the hopper to dislodge blockage from underneath was a common practice and occurred repeatedly on previous days captured on the video. The surveillance video showed miners on the belt structure and/or inside the hopper not wearing safety belts or harnesses and not equipped with lifelines, while the belt was operating and without engaging in lock-out-tag-out (LOTO) procedures.

Today’s video analytics can be used to detect and stop this type of accident before happening. Video analytics can raise an alert when employees are getting too close to dangerous equipment or if they are not wearing the right safety equipment like a hard hat or safety harness. Hikvision for example installed a system in a coal mine in China that increased worker safety by monitoring the areas around winches and other equipment, and by sending alerts if employees get too close. The Hikvision solution was also configured to support specific mining-safety applications, such as constant monitoring of surface water levels in different areas of the mine. Constant seepage from rock formations means that surface water can accumulate in different areas of the mine, which is a problem in terms of potential flooding, damage to infrastructure, and worker safety risks. The Hikvision system monitors surface-water levels constantly and allows the mine staff to take action to deal with any problems that arise before water levels exceed safe limits.

Ai-driven video analytics are gaining traction as a means to minimize false alarms. Avigilon’s H4 Thermal camera for example is embedded with Avigilon self-learning video analytics to provide long-range perimeter protection and leverages thermal technology to operate under challenging conditions while minimizing false alarms. It detects the movement of people, vehicles and partly camouflaged objects in complete darkness or areas with challenging light conditions.

Security systems are also used to drive compliance with OH&S regulations. Access control manufacturer Gallagher allows cardholder information to be recorded in the Gallagher system and shared bi-directionally with existing HR/people management systems for accurate, real-time use. Staff records provide a full audit trail to ensure compulsory training and testing are undertaken. This minimizes corporate liability and enables organizations to meet their Duty of Care.

Mobile smartphone devices are commonly used to spot-check workers on-site (i.e., to validate they are trained and inducted to be where they are, or performing their current task), as well as being able to be used for mobile evacuation procedures and access control movements.

Compliance driving product requirements

Given the risks associated with mining operations, government legislation can be stringent but differ immensely in different parts of the world.  “We have seen an increase in concern around fatigue and exposure, and the need for reporting to assist with state levy calculations. Cases of corporate manslaughter against negligent management have certainly created more interest in systems which can demonstrate duty of care and protect workforces,” said Margrain. In many cases, not only do such system implementations meet those goals while ensuring business continuity, but they also demonstrate a reduction of operational cost through improved efficiency. Margrain recommended factoring this into vendor selection: “Having a system with governance, risk, and compliance solutions that can be tailored to meet changing requirements, without significant reinvestment, should be factored into vendor selection. By working with their vendor, sites operating in unique conditions like that of mining, can design a system that is tailored to the specific needs of their site and ensure health and safety requirements are met at the required level”.

(Source: asmag.com)

5-Year quality guarantee on some Dahua product lines

Selected project-based Dahua products shipped on January 1, 2022, onwards are now covered by the upgraded 5-year warranty, free of charge.

This five-year warranty policy is free for customers and does not require any extra payment. Dahua Technology will continue to provide high-quality products, excellent global service system, and stable supply of raw materials, so that customers can avail longer product value without adding to their budget.

Dahua Technology has a global marketing and service network system. It has established 57 overseas subsidiaries, representative offices and service networks in Asia Pacific, North America, Europe, Africa and other regions, and has set up more than 150 authorized customer service stations. This service system can help ensure that its customers enjoy the five-year warranty service without worries.