Home Archive by category Najave II

Najave II

Inside the Transformation of Airport X-Ray Screening

AI, CT, and connected screening ecosystems are redefining the security lane. With automated detection, modular architectures, predictive maintenance, and biometric-linked passenger journeys, airport X-ray scanners are evolving into intelligent platforms that reshape how airports manage risk, efficiency, and compliance.

By: Mirza Bahic; E-mail: mirza.bahic@asmideast.com

For years, the X-ray scanners at the checkpoint symbolized a compromise. It was a compromise between security and convenience, and between safety and speed. Passengers unpacked their belongings into plastic trays, queues moved through terminals, and operators stared at flat, two-dimensional silhouettes for hours on end. The process felt fixed and was shaped by limitations that appeared non-negotiable. That age-old compromise is now being rewritten thanks to a new generation of airport X-ray screening technologies.

Rewriting the Architecture of Airport Screening

Across the globe, airports are deploying a new generation of scanners built around 3D computed tomography (CT), deep-learning-based automatic threat recognition, and tightly connected smart-airport ecosystems. The combined result is not merely gradual improvement but a shift in the very architecture of screening. What once required disassembly, slow belt movement, and focused operator attention can now be achieved with higher accuracy, less friction, and dramatically improved passenger flow.

Regulators, too, are reshaping this part of the security landscape, pushing standards toward higher detection performance while allowing new operational freedoms, such as leaving liquids and electronics inside the bag at airports equipped with certified CT technology. In parallel, regulatory evolution is accelerating the technological one.

To understand where airport screening is heading, we examine the perspectives of three industry manufacturers, Smiths Detection, Gilardoni, and Nuctech, through a unified thematic lens. Their experience, placed against the wider global context, reveals not only how far the sector has advanced, but the direction of the coming decade. At the heart of that evolution is a shift in who, or more precisely what, performs the first layer of screening.

AI Becomes the Primary Screener

First things first, the most significant change in airport screening is not visible to passengers. It lives inside the software stack of modern scanners, where threat detection is increasingly performed by algorithms rather than by the operator’s eye alone.

Juergen Kappler, Portfolio Director of Aviation & Critical Infrastructure at Smiths Detection, describes this approach as two-fold. On one side, deep-learning models trained on very large volumes of X-ray imagery learn the shapes, textures, and visual patterns associated with prohibited items.  On the other hand, more classical image-processing algorithms analyze material properties such as density and effective atomic number in order to identify explosives and similar substances.

These two families of algorithms work together in systems like iCMORE, the company’s automated prohibited-item detection suite for aviation. When deployed with Smith’s CT scanners, iCMORE supports an alarm-only viewing concept. “Only bags flagged as containing potential threats are presented to security operators, while non-alarmed bags move swiftly through checkpoints without manual inspection,” says Kappler. The system is updated continually with new data from regulators and airport stakeholders in order to keep pace with changing threats and test regimes.

In hold baggage, Smiths Detection continues to rely on its long-established explosives detection algorithms, which are still the backbone of ECAC and other certifications. Those algorithms are not static – they are being tuned for current standards such as ECAC EDS 3.2 and are already being developed toward emerging concepts such as EDS-CB C4-limited for cabin baggage.

Gilardoni approaches AI from a slightly different angle. It comes from a background of building X-ray systems where image quality has always been central. Riccardo Bianchi, Product Manager of the Security Business Unit at Gilardoni, notes that the company has been “at the forefront of innovation in X-ray imaging technology for many decades now,” including in-house development of X-ray generators. That investment underpins certified detection performance on conventional and dual-view systems at ECAC EDS-CB C1 and LEDS levels. On top of this, Gilardoni adds pattern recognition of typical threat shapes such as knives, guns, and similar objects, and stresses that these algorithms are continuously updated to keep up with changing forms and concealment methods.

Yet, the company is not tackling AI only in the context of new CT platforms. It is explicitly developing AI solutions compatible with existing conventional scanners, so that airports can upgrade detection capability without wholesale hardware replacement. To support operator training and maintain detection proficiency, Gilardoni integrates Threat Image Projection (TIP) software into its systems, allowing simulated threats to be inserted into live screening sessions for continuous competency assessment without disrupting operations.

Another company, Nuctech, describes a deep-learning-based AI layer running on what it calls its Intelligent Inspection Platform. Rather than using generic models, the company trains on a proprietary baggage image database that includes 3D CT data generated through simulation and through curated real-world samples. This dual approach, which combines simulated threat scenarios with ethically sourced real-world data, allows Nuctech to expand its training datasets rapidly. At the same time, it preserves strict data protection standards.

This allows the algorithms to consider not only shape but also material properties derived from CT, such as density and effective atomic number, when identifying explosives, narcotics, and other contraband. Nuctech stresses that these models are validated through independent tests under ECAC and national civil aviation standards. It also operates a formal “Threat Response Cycle” which takes in new threat information and then pushes updated models into the installed base through secure software updates. This flexible R&D framework enables the company to respond to emerging threats within weeks rather than months, ensuring airport security keeps pace with evolving risks.

Across these three perspectives, AI is clearly no longer an afterthought. It is becoming the first filter in the lane, clearing the majority of baggage automatically and handing only a fraction of images to human operators for further scrutiny. The operator’s role is changing from continuous first-line screening to exception handling. But even the most advanced detection algorithms depend on the quality of the underlying X-ray data, which brings the focus back to CT architecture.

Integration into Smart-Airport Ecosystems

It is evident now that modern scanners are conceived not as standalone boxes, but as nodes in a connected system of baggage handling, operations control, IoT monitoring, and analytics.

Juergen Kappler, Portfolio Director of Aviation & Critical Infrastructure at Smiths Detection, emphasizes that his company’s scanners are designed to integrate “seamlessly into smart airport ecosystems,” supporting open architecture and multiple integration options. Its forthcoming ELECTORA platform is described as an open-standards engine for extracting operational and maintenance insight from scanner data. It is intended to scale across fleets and feed advanced analytics, including predictive maintenance and long-term performance trends. Built on open technical standards and designed for scalability, ELECTORA should provide comprehensive reporting and monitoring capabilities with flexible data export options, enabling airports to contribute scanner telemetry to advanced analytics and real-time operational dashboards.

Riccardo Bianchi, Product Manager of the Security Business Unit at Gilardoni, says that this company presents its scanners as operational-technology components in IoT environments. Machines support real-time diagnostics and health monitoring. This means that data can be exported for analysis, and dynamic dashboards are used to supervise machines, track key performance indicators, and integrate with external monitoring tools.

The company also offers web-based remote control and monitoring dashboards for centralized oversight, and its systems can also be retrofitted with sensors for advanced analytics and predictive maintenance frameworks. The company’s Breva 2.0 automated tray return system adds its own data stream, exposing self-diagnostics that can be used for performance tuning and predictive maintenance across dozens of lanes. Currently operating on approximately 80 lanes deployed worldwide, Breva 2.0 is fully customizable and can integrate with both Gilardoni and third-party scanners, providing advanced self-diagnostics that interface with airport IoT systems to enable comprehensive health and performance monitoring.

Finally, Nuctech describes its systems as “intelligent data nodes” that interface with baggage-handling systems, airport operations centers, and other infrastructure. The company’s systems support standard protocols such as DICOS (Digital Imaging and Communications in Security), facilitating seamless integration with airport Baggage Handling Systems (BHS) and Airport Operations Centers (AOC). Scan results can be used to instruct baggage-routing systems in real time, diverting bags that require further screening, while embedded IoT sensors feed predictive-maintenance platforms that seek to detect wear and anomalies before they result in failure. This shift from reactive repair to proactive prevention allows maintenance teams to schedule interventions during off-peak hours. As a result, it minimizes operational disruption while maximizing system availability.

The net effect is that scanners are no longer just detection devices – they are part of a live data fabric that airports can use to manage flow, maintenance, and risk.

A Three-Track CT Future

So, if AI is the brain, CT is the vision system. The way scanners acquire and reconstruct X-ray data has a direct impact on detection performance, false-alarm rates, and throughput, and here the industry is exploring more than one path.

Smiths Detection continues to build on conventional rotating-gantry CT. Kappler points out that “rotating gantry CT systems have reached a high level of maturity, offering hundreds of views per rotation to achieve exceptional image resolution.” The rotating geometry, combined with anti-scatter grids, produces high-quality volumetric images that feed both explosives-detection algorithms and deep-learning models. At the checkpoint, this design underpins the HI-SCAN 6040 CTiX, which combines full 3D imaging with a belt speed of 0.2 meters per second. The graphical interface deliberately uses the same color scheme as the company’s 2D X-ray systems, easing the learning curve for operators.

At the same time, the company is not limiting itself to conventional CT. It has introduced the SDX 10060 XDi, a system that uses X-ray diffraction instead of tomographic reconstruction. This system has no rotating components. Instead, it analyzes diffraction signatures to identify materials based on their crystalline structure. In early deployments, XDi is positioned as a way to further reduce false alarms in fully automated configurations, especially when combined with CT in a system-of-systems approach. Early trial results show promising outcomes. “False alarms can be reduced by a factor of four to five in fully automated configurations,” Kappler states. In the end, this should lower the need for manual bag checks and improve the overall lane throughput.

Gilardoni is also closely watching this architectural evolution. It recognizes that airports are pushing for higher throughput, lower maintenance, and more cost-effective alternatives to rotating-gantry CT. Bianchi notes that non-rotating CT designs can simplify the mechanical structure and potentially reduce lifecycle costs, but is frank about the fact that static architectures still face challenges in representing objects with the realism and fidelity that rotating CT supports today. According to him, the company is “exploring innovative ways to overcome such technological limitations in order to fully exploit the potential of non-rotating CT machines.”

For Nuctech, static CT is already a strategic choice rather than a future option. The company says it has “pioneered a non-rotating static-gantry CT architecture” that eliminates the heavy rotating assembly, reducing weight and footprint while improving reliability. The simplified mechanical structure significantly improves Mean Time Between Failures (MTBF), translating to higher system availability and lower maintenance costs over the equipment lifecycle.

Nuctech also claims that this architecture provides high-resolution 3D images with full 360-degree coverage and no blind spots, while enabling very high conveyor speeds. With XT2100HS, the company states that this design supports throughputs up to 1,800 bags per hour under standard assumptions for bag length and spacing. Static CT thus becomes not only an imaging choice but a maintenance and throughput strategy.

The industry is therefore not converging on a single architecture. Instead, it is using more powerful software to get the most out of both rotating and static hardware, and, in some cases, adding diffraction-based techniques on top. For airports, the choice will increasingly depend on their mix of performance targets, lifecycle costs, and space constraints.

Throughput: Turning Design into Lane Capacity

Yet, all the imaging and AI sophistication in the world is irrelevant if a system cannot keep up with the passenger flow of a modern terminal. Throughput remains the metric that makes or breaks a deployment.

In hold baggage, Smiths Detection gives the classic benchmark: assume an average bag length of eighty centimeters, a gap between bags of twenty centimeters, and a belt speed of half a meter per second. Under those conditions, the theoretical maximum is about 1,800 bags per hour.

Kappler notes that its SDX 10080 SCT platform is designed to allow even smaller gaps between bags than the standard twenty centimeters and that it performs calibration in the background, so there is no need to stop the belt for routine system checks. In practice, this means that the system comes close to the theoretical throughput ceiling in real-world baggage-handling environments. The SCT’s dynamic calibration capability runs seamlessly during operation, eliminating the traditional need for periodic conveyor stoppages and ensuring sustained performance at optimal throughput levels throughout operational hours.

For cabin baggage, the CTiX runs at 0.2 meters per second and, depending on tray length and spacing, can process on the order of 850 to 900 trays per hour. In the typical configuration, CTiX is integrated with an automated tray return system so that when its detection algorithms trigger an alarm, the tray in question is automatically diverted to a recheck position without interrupting the main flow.

On the other hand, Gilardoni relies on its dual-view systems, which often operate in smaller or mixed-technology airports. They are configured for belt speeds up to 0.3 meters per second in checkpoint roles and up to 0.5 meters per second in hold-baggage systems, where the limiting factor is usually baggage handling rather than operator capacity. Bianchi stresses that its workflow logic allows flagged baggage to move to secondary screening without stopping the lane, and that its algorithms are tuned to minimize false alarms, even at high throughput. Operational feedback from Gilardoni deployments highlights reduced false alarm rates and improved system uptime through scheduled and predictive maintenance as key performance improvements valued by security managers.

Nuctech’s XT2100HS, built on its static CT architecture, is also rated up to 1,800 bags per hour in hold-baggage scenarios. The company emphasizes that throughput is as much about process design as it is about belt physics. It describes a three-level, risk-based screening model where AI performs the first pass and automatically clears most bags, a smaller proportion of images is routed to local or remote operators for detailed review, and only a very small fraction is sent to manual inspection. By structuring operations this way, Nuctech argues that the lane can sustain its mechanical throughput even under peak passenger loads. After 6 to 12 months of operational deployment, airport partners usually report significant reductions in false alarm rates and substantial increases in throughput during peak periods. They also highlight a notably improved operator experience, supported by clearer and manipulable 3D images that enable faster and more confident decision-making.

Throughput is no longer determined solely by belt speed or gantry type. It is the outcome of how imaging, algorithms, automation, and staffing are orchestrated together. While airports now focus heavily on throughput and automation, another foundational aspect of screening systems has reached a level of maturity and regulatory stability.

Radiation Safety Reaches Steady State

Although CT and AI are advancing rapidly, radiation safety is a domain where the fundamentals are stable and heavily regulated.

Kappler underlines that all aviation X-ray systems must comply with strict limits on external dose rate, and that independent radiation-safety officers measure equipment before it goes into operation. To keep leakage as low as possible, the company uses high-end solid-state detectors that require less internal X-ray dose to achieve image quality, along with multi-layer curtain systems and shielding. The inevitable leakage that remains “has been reduced to an absolute minimum,” Kappler notes.

Gilardoni leans on its experience in medical imaging, where dose management has long been critical. Bianchi highlights that the company relies on quality components and X-ray generation and detection to keep X-ray intensity at the minimum level compatible with image quality and certified detection performance. Crucially, Gilardoni’s scanners activate the X-ray beam only while luggage is physically present in the detection area. This beam-gating approach reduces overall radiation emission and optimizes energy consumption throughout operational hours. Bianchi also notes ongoing research into shielding materials and architectures and states that residual leakage is already “orders of magnitude below regulatory limits.”

Their competitor, Nuctech, refers to the ALARA principle, i.e., “As Low As Reasonably Achievable,” as the foundation of its approach. It describes how high-sensitivity detectors allow good images to be formed at lower doses, and how multi-layer physical shielding combined with safety interlocks keeps radiation levels outside the device close to the natural background. All of its systems, it says, are tested by national radiation-protection authorities as part of the certification process.

For airport operators, the conclusion is that radiation is not the differentiator it once might have been. All credible systems operate within a narrow band of regulatory limits and are designed to do so over long lifecycles. The competition now is in how effectively that allowed dose is converted into image quality and detection performance. Yet, screening performance is no longer about standalone machines. Airports increasingly evaluate whether a system can evolve over time and not simply comply today.

Platforms, Not Appliances

With CT, AI, and regulatory standards all evolving, airports are increasingly wary of investing in equipment that cannot be upgraded. In line with this, all three manufacturers therefore stress modularity and long-term upgrade paths.

Smiths Detection’s Kappler gives concrete examples. The company’s first-generation hold-baggage CT systems were installed in 2013 and certified to ECAC EDS 3.0. As standards have progressed to 3.1 and now 3.2, those systems have been upgraded via software. The company notes that EDS 3.2 compliance for the SDX 10080 SCT platform can be achieved through software-only changes, thanks to a CT design with sufficient energy resolution and number of views from the outset.

For cabin baggage, the HI-SCAN 6040 CTiX is built so that new EDS-CB algorithms and iCMORE detection modules can be loaded directly onto existing hardware. In effect, the scanner is a platform whose detection capabilities can be extended and sharpened over time. Kappler also points out that the SCT detector array is designed to allow the addition of more detectors in the future, opening the door to higher belt speeds, and that the platform is engineered to host X-ray diffraction modules if future ECAC or TSA standards require CT-XRD combinations. The SCT system also offers the flexibility to configure with or without an integrated Line-Scanner, which is a complementary imaging technology that enhances specific detection capabilities. This should allow airports to optimize for their operational requirements and budget constraints while maintaining a clear path to future capability upgrades.

On the other hand, Gilardoni focuses strongly on compatibility with existing equipment in the field. Its AI solutions are being developed to run on installed conventional X-ray scanners, preserving the airport’s investment in the mechanical platform. The company also designs integration architectures that can combine data from Gilardoni and third-party equipment, recognizing that many airports operate mixed fleets and will continue to do so while transitioning between generations of technology.

Yet, Nuctech’s approach to the modularity aspect has two strands. On the software side, it positions its systems as “software-defined,” meaning that new AI-based detection functions for emerging threats can be deployed via software updates rather than by swapping out machines. On the hardware side, it highlights field-replaceable modules for critical subsystems such as detector arrays and image processors, allowing targeted hardware upgrades where necessary while keeping the overall platform. The stated aim is to keep pace with evolving standards and capabilities without forcing airports into “rip and replace” cycles.

Modularity has thus moved from marketing slogan to procurement requirement. The question is no longer only whether a scanner can meet today’s standards, but whether its design and vendor roadmap make it likely to meet tomorrow’s.

Cybersecurity in Connected Screening Systems

As scanners become networked devices exposing images and system logs to external systems, they also become part of the airport’s cyber-attack surface. All three manufacturers address this head-on.

Kappler describes a multi-layered security architecture in which data is transferred using encrypted protocols, stored behind strict access rights and authorization controls, and protected by regular vulnerability scanning and security testing. Smiths Detection applies operating-system hardening based on industry-standard CIS benchmarks, leverages Security-Enhanced Linux (SELinux) for additional kernel-level protection, and deploys Host Intrusion Detection Systems (HIDS) to continuously monitor for suspicious activity.

At the device level, kiosk modes, disabled auto-start from external media, and strong password policies reduce the risk of local compromise. Automated vulnerability scans and patch management processes ensure that potential security risks are quickly identified and remediated. Customizable security policies then enforce rigorous access controls across the operational environment.

Other approaches are equally valid. According to Bianchi, Gilardoni’s systems follow data-protection-by-design principles. Scanners can send images to external storage over secure channels with cryptographic protection, and access to those images and related metadata is controlled by role-based access, segregation of duties, and password policies. For systems utilizing removable media, Gilardoni implements OEM-managed secure data-erasure processes to ensure that no sensitive information remains post-disposal, addressing the full data lifecycle from creation to destruction.

Next, Nuctech explicitly references alignment with international data-protection regulations, including GDPR. It uses AES-256 encryption at rest and in transit, enforces strict role-based access control with extensive audit logging, and supports configurations with network segmentation and image anonymization. The company emphasizes that clients retain full control over their data, positioning itself strictly as a technology provider and ensuring that airports maintain complete data sovereignty over all screening information collected by the systems. Nuctech also highlights remote-screening architectures in which operators review images in physically separate facilities, reducing the amount of personal data handled at the checkpoint itself.

This focus reflects a broader shift in the industry: security equipment is now treated as critical IT infrastructure as much as electromechanical machinery, and is assessed accordingly by airport IT and cyber teams.

The Hybrid Future of Screening

Looking forward, the three manufacturers outline trend trajectories that, while distinct, strongly overlap in their direction.

Kappler sees his company’s CTiX as the checkpoint hardware platform on which increasingly capable software will move toward fully automated first-level screening. By combining ECAC EDS-CB algorithms for explosives with APIDS algorithms for prohibited items, and by pushing both toward higher standards such as C4-limited and APIDS 2 or 3, the company expects to reduce the share of images requiring human review to a very small minority.

It has already demonstrated proof-of-concept checkpoints where trays are linked to passengers via biometric capture, such as facial recognition or biometric boarding passes. This foreshadows a future in which passenger identity and baggage are associated throughout the screening process for enhanced security and seamless tracking. For future regulatory requirements, such as potential ECAC EDS 4 or TSA 9.0 standards that may demand CT-XRD fusion, Smiths Detection’s platform strategy enables integration of X-ray diffraction modules into existing CT scanners rather than requiring complete system replacement.

For Gilardoni, Bianchi articulates a strategy defined by modular innovation. Current scanners are deliberately designed so that they can host future automated-detection modules and biometric components, rather than requiring replacement. At the same time, cybersecurity remains a cornerstone of this evolution, with ongoing investments in secure software development, cryptographic protocols, and compliance with evolving global cyber standards as systems become increasingly connected and data-rich.

Finally, Nuctech describes a long-term goal of creating a seamless, intelligent, and integrated security process. The company is actively exploring multi-technology fusion approaches, such as combining CT imaging with trace-detection techniques to improve chemical specificity and precisely identify suspicious substances that CT alone may not characterize properly. It is also exploring biometric-baggage linkage that associates passengers with their luggage throughout the security journey.

Pilot programs are testing facial recognition and other biometric identifiers to create a continuous chain of custody. In this model, each bag is digitally linked to its owner from check-in through final loading, which enables enhanced security tracking and differentiated screening based on passenger risk profiles. In this vision, future checkpoints could become fully automated lanes in which bags are screened and routed with minimal human involvement, and security officers shift into remote supervisory roles, intervening mainly on complex or exceptional cases. This transformation would leverage automation and increasingly powerful AI to achieve operator-free screening lanes, redefining security officers as high-level remote supervisors and managers rather than frontline operators.

All three vendors therefore converge on a picture of the checkpoint as a data-driven, largely automated decision engine that is deeply integrated with passenger identity and airport operations, rather than as an isolated X-ray tunnel with a human operator at the center.

The Age of Smart, Upgradable Screening Is Upon Us

The combined perspectives of Smiths Detection, Gilardoni, and Nuctech show an industry that is changing at multiple levels at once. CT imaging is being refined and diversified through both rotating and static architectures. AI-driven detection is moving into the core of the screening workflow, and throughput is increasingly becoming the result of coordinated system design rather than raw belt speed.

For security professionals, airport X-ray scanners can no longer be evaluated as standalone machines bought for a fixed period and then replaced. They are now platforms, embedded in a wider system of systems, whose value is determined as much by their upgrade path, their integration interfaces, and the vendor’s regulatory posture as by the performance of the hardware at the moment of purchase.

The old compromise between security and convenience is not solved overnight, and legacy fleets will remain in operation for years. But the direction is clear: baggage screening is becoming smarter, more connected, and more automated. The strategic question for airports is no longer whether to adopt this new generation of technology, but how quickly, in what configuration, and with which partners they will move into that future.

Compliance as a Moving Target

No matter how sophisticated the technology is, it only reaches the airport floor if it passes regulatory certification. All three companies pay close attention to this.

Juergen Kappler, Portfolio Director of Aviation & Critical Infrastructure at Smiths Detection, notes that his company’s products are certified by ECAC, TSA, ACSTL, and CAAC, among others. He stresses that the HI-SCAN 6040 CTiX was the first scanner certified for an algorithm that allows screening of liquids up to two liters in cabin baggage, and that its iCMORE automated prohibited-item detection solution was the first to receive APIDS Standard 1 approval at the national level.

Riccardo Bianchi, Product Manager of the Security Business Unit at Gilardoni, mentions a range of certifications across Gilardoni’s conventional portfolio, including ECAC EDS-CB C1, ECAC LEDS, TSA, ENAC, and STAC. He frames certification as an ongoing effort rather than a one-off step, with continuous work to align products to current and emerging standards.

Another competitor, Nuctech, states that its systems have achieved approvals from ECAC, STAC in France, the UK Department for Transport, and CAAC in China, and that it participates in the development of international and national standards. In fact, the company sees itself as “a contributor to the definition of tomorrow’s test regimes rather than merely a respondent.” Beyond pursuing certifications, Nuctech has led or contributed to the development of numerous international and national standards, positioning itself not merely as a compliant vendor but as an active participant in shaping the future regulatory landscape of aviation security.

Given the evolving nature of standards, particularly in cabin-baggage CT levels and potential future CT-XRD combinations, this certification posture matters as much as the current approval list. As a result, Airports increasingly ask not only “is this certified now?” but “is this vendor clearly committed and technically able to keep the system certified as requirements change?”

Body-Worn Cameras: Silent Witness No More: Smart Body-Worn Cameras Go Live

In an era where smartphones have made everything instantly shareable and live, body-worn cameras have evolved to match this always-on expectation. These devices have grown from simple accountability tools into AI-enhanced security assets that not only capture, process, and respond to incidents but increasingly support applications across diverse fields.

Piše: Mirza Bahic; E-mail: mirza.bahic@asmideast.com

Body-worn cameras are no longer silent witnesses—they’re intelligent, networked, and mission-critical. Equipped with advanced optics, encrypted live-streaming, and integrations that support AI-driven analytics, today’s body-worn cameras are becoming essential tools across frontline operations. In retail, they flag suspicious behavior and generate courtroom-ready evidence. In emergency response, they cut through chaos, functioning in smoke-filled environments and delivering real-time insights that drive life-saving decisions.

And the evolution goes well beyond public safety and commercial applications.

The technology has even reached sports and entertainment. At the 2025 FIFA Club World Cup, miniature cameras mounted on referees’ headsets capture live match footage from unprecedented angles. These devices stream unique perspectives of goals and key moments while broadcast directors make real-time editorial decisions about which footage to feature. It’s a telling example of how body-worn camera technology has expanded far beyond its security origins into entertainment, sports, and countless other sectors.

This isn’t the body-worn camera technology of five years ago. What began as simple recording devices for police accountability has evolved into a sophisticated ecosystem where advanced optics, edge AI, and cloud-based evidence management converge. Today’s body-worn cameras represent a fundamental shift in how organizations approach safety, security, and operational transparency, transforming from passive documentation tools into active intelligence platforms.

Market Surge and Innovation Drive Evolution

The numbers underscore this rapid expansion. Spherical Insights projects the global body-worn camera market will surge from $7.48 billion in 2023 to $27.65 billion by 2033—a remarkable 13.97% compound annual growth rate. This growth reflects not just increased adoption in traditional security roles, but explosive diversification into new applications across industries.

“More than 18,000 law enforcement agencies in more than 100 countries deploy Axon products and technology,” notes Anas Hammouri, Director of the Middle East, Turkey & Africa at Axon. This global footprint illustrates how body-worn cameras have become indispensable tools in modern security.

Martin Ekman, Business Development Director for Body-Worn Solutions at Axis Communications, echoes this sentiment. “We’ve been fortunate enough to sell our solution to around 50 countries globally, with a significant number of those being in the EMEA region.” He highlights substantial deployments, adding, “One of our biggest law enforcement installations has over 17,000 body-worn cameras, and we’ve also had some substantial successes in prisons, where we’ve deployed over 6,000 cameras.” Ekman further points out that “body-worn cameras are quickly becoming standard issue and, in many places, even mandatory,” underscoring their growing importance and ubiquity.

Behind these projections lies a technological revolution. Modern body-worn cameras fuse high-definition imaging, advanced audio capture, real-time analytics, and end-to-end encrypted workflows into platforms that would have seemed like science fiction just a decade ago. This evolution represents more than technological advancement. It signals a fundamental transformation in how organizations ensure accountability, enhance operations, and manage critical incidents in an increasingly complex security landscape.

Transforming Public Safety

Beyond operational improvements, body-worn cameras have matured enough to offer measurable financial benefits. Leslie Li, Deputy General Manager of BWC Business Unit at Hytera, reports that reduced crime and fewer complaints translate into significant savings in the ballpark of tens of thousands of dollars, which, according to him, are achieved by cutting down costly investigations and litigation. Enhanced suspect identification is aided by facial recognition technologies integrated into their modern BWCs. “These have successfully assisted frontline officers in discovering several potential suspects”, says Li. He adds that a public safety department in an unnamed country experienced an 18.7% reduction in crime rates within six months of adopting body-worn cameras.

A similar trend is visible outside traditional law enforcement. Since May 2024, Slovakia’s ZSSK railway company has equipped its train drivers with 419 Axis body-worn cameras, resulting in a 5% decrease in overall incidents and a 21% drop in aggression toward staff and passengers. Beyond deterrence, the cameras helped clarify around 50 cases, with police repeatedly praising their high evidentiary value in investigations.

Axon’s Hammouri describes a similar trend in Spain, where la Policía Foral de Navarra saw a 50% drop in violence and misconduct incidents against officers during the San Fermín Festival, thanks to Axon body cameras.  Officers equipped with Axon Body 3 cameras observed that the mere presence of the cameras improved attendee behavior. Police authorities noted that, in complicated situations, the awareness that actions were being recorded by the police had a deterrent effect.

Furthermore, the recordings promoted transparency in officer-civilian interactions, reinforcing the agency’s commitment to meeting community expectations. By balancing effective law enforcement with citizens’ privacy and peace of mind, body cameras contributed significantly to bolstering security during the annual Running of the Bulls while maintaining accountability in policing efforts.

According to Hammouri, Italy’s Ravenna police also recorded a 50% reduction in incidents when comparing Q1 2021 to Q1 2020. A similar approach was adopted by Greater Manchester Police, who leveraged Axon’s body-worn cameras with live streaming at the Parklife festival. This granted commanders real-time situational awareness directly from the field, enabling more efficient coordination, better communication with event organizers and paramedics, and ultimately enhancing officer and public safety through quicker, better-informed decisions.

Post-event debriefs also benefited from the recorded footage, allowing teams to review specific incidents, refine tactics, support prosecutions, and improve festival policing over time. Officers further noted that simply wearing the cameras had a measurable calming effect on crowd behavior, helping deter anti-social conduct on site while still ensuring a reliable evidentiary record when needed.

Body-Worn Cameras Gain Ground in Commercial and Public Spaces

Body-worn cameras are rapidly expanding their utility beyond traditional law enforcement, revolutionizing operations across diverse sectors such as emergency services, healthcare, education, retail, transportation, and aerospace/defense. This multi-sector adoption highlights the versatility and significant impact of BWC technology in addressing a wide range of operational and safety challenges.

In fact, the cameras’ impact on de-escalation now extends beyond law enforcement, reaching other high-risk environments where safety and conflict management are critical. For instance, in 2024, Axon launched the dedicated Axon Body Workforce, a body-worn camera designed specifically to address workplace violence affecting frontline workers in retail stores and healthcare facilities.

Meanwhile, Axis has demonstrated the effectiveness of its camera solutions in other settings. Erik Frännlid, Director of New Solutions Initiatives – Products and CTO Organization at Axis Communications, describes what happened following the installation of Axis cameras at a major UK airport. One of the airline attendants remarked, “The de-escalation factor is huge — many situations that are about to escalate stop right away when they notice the camera. And I’ve never even started it yet.” These examples highlight how body-worn cameras are becoming essential tools across diverse sectors to promote safety and reduce conflict.

By 2024, major retailers like Tesco, Coles, and TJ Maxx plan to standardize BWCs for loss prevention, with surveys showing over half of retailers investing in wearable video technology. Transportation agencies are also embracing BWCs, as transit systems such as the U.K. National Highways, Swedish Rail, and the Rio de Janeiro metro adopt integrated bodycam solutions.

Some of these users are already reporting notable results: a U.S. trial retailer experienced a 53% reduction in incidents, while another noted that 47% of active incidents were effectively de-escalated once recordings were activated, according to Hammouri.

In education, teachers are beginning to use body-worn cameras for training and behavioral management, leveraging objective records for professional development. This wider adoption underscores BWCs’ effectiveness across operational contexts—from de-escalating incidents in retail and transport to providing valuable training insights in education.

From Security to Training Excellence in Healthcare

Yet, the poster child for non-security applications of BWCs might be healthcare. In fact, one of the most valuable non-security applications of body cameras in healthcare settings is their use as training and professional development tools.

The experience of CoxHealth, a premier US-based healthcare system, with Axis body cameras illustrates how these devices can serve multiple non-security functions that enhance patient care, staff development, and organizational operations.

Supervisors and officers regularly review camera recordings not for disciplinary purposes, but for educational growth and skill enhancement. The recordings provide an objective perspective that allows healthcare staff to step back from high-stress situations and analyze their responses with clarity. This continuous learning approach contributes to improved patient satisfaction and safer healthcare environments for everyone involved.

Body cameras now serve as invaluable documentation tools for healthcare incidents, providing accurate, timestamped records that support quality improvement initiatives. The detailed audio and video records capture nuances that written reports might miss, including tone of voice, body language, and environmental factors.

While not strictly a security function, body cameras provide crucial legal protection for healthcare organizations and their staff. The objective documentation can protect against false claims and provide accurate records for legal proceedings. All of these healthcare use cases demonstrate that body-worn cameras have evolved far beyond their original security-focused applications, now serving as comprehensive tools for organizational improvement by enhancing training, fraud protection, documentation, communication, and overall quality of care.

Innovations in Design and Durability for Modern BWCs

Modern body-worn cameras represent a dramatic leap from earlier generations, engineered as smart, resilient tools for complex, high-pressure environments. Axon’s Body 4 camera, for instance, integrates 5-megapixel resolution, a wide 160° field of view, and a 4:3 aspect ratio that enhances vertical visibility by nearly 40%. Its 3400 mAh battery provides coverage even with demanding features active, while the IP68 rating ensures dust and water resistance for rugged field conditions.

Axis Communications emphasizes the demand for robust construction through open architecture, delivering high-quality video and audio performance that earned recognition, including a Red Dot Award for ergonomic design. Their cameras incorporate Wide Dynamic Range and Electronic Image Stabilization, and proprietary. Finally, Axis Zipstream compression technology reduces file sizes while maintaining image clarity, and the units meet IPX5/IPX8 waterproof standards for reliable operation across various environments.

Similarly focused on flexibility and adaptability, Zepcam provides modular solutions allowing customization in software, camera types, and mounting configurations for both public and commercial clients. Their systems support national cloud or on-premise setups, offer infrared capabilities for low-light environments, and include external configurations for helmets or uniforms. Smart sensor and audio processing enhance performance in motion-heavy scenarios.

Hytera adds another dimension with devices designed around frontline safety, integrating unique alert systems that bolster officer security. “Our BWCs also support intercommunication with narrowband radios, enhancing communication flexibility and reliability… if an officer falls down, the BWC lens is blocked, or someone tries to tamper with the device, our equipment immediately sends alerts to the command center,” says Li. These safety features combine with AI-driven noise cancellation, image stabilization, super wide-angle lenses, starlight night vision, and infrared capabilities for reliable performance in harsh environments.

Built by Those Who Use Them

Body-worn cameras are increasingly being shaped by those who use them daily. For many manufacturers, direct input from police officers, security personnel, transport workers, and emergency responders has become essential to product development.

Axis Communications, for instance, worked closely with law enforcement teams across Europe and the U.S. during early development. Officers stressed the importance of handling difficult lighting and minimizing motion blur, says Erik Frännlid, Director of New Solutions Initiatives – Products and CTO Organization at Axis Communications.

They also asked for cameras that were easy to carry and operate in high-stress situations. This input directly influenced the device design and continues to guide software updates through Axis’s operating system.

Hytera also actively gathers input from frontline users through a dedicated research team, says Leslie Li, Deputy General Manager of Hytera’s BWC Business Unit. Users highlighted the need for longer battery life, improved audio clarity, and devices that can withstand harsh environments. In response, Hytera enhanced battery performance, integrated noise cancellation and more powerful speakers, and made their devices more rugged.

Going beyond physical performance, Axon added another layer by embedding ethical considerations into its design philosophy. According to Anas Hammouri, Director for the Middle East, Türkiye, and Africa at Axon, user feedback has helped shape privacy settings, user controls, and data protection features. The company’s development approach integrates customer input with guidance from ethics experts to ensure responsible innovation.

Advanced Connectivity Enables Dynamic Situational Awareness

Modern BWCs prioritize robust connectivity to function as integrated network nodes rather than standalone recording devices. Axon’s Body 4 exemplifies this approach through GPS location sharing, bidirectional communication, and livestreaming capabilities. As Hammouri explains, “Each connected Axon Body 4 becomes a live node in a broader, smarter network,” enabling real-time coordination and immediate data sharing.

Another company advancing connected capabilities is Zepcam. Its body-worn cameras feature advanced sensor and audio processing, with infrared illumination available to enhance image capture in low-light environments. The proprietary Secure Link technology dynamically manages wireless video and data transmission, optimizing performance in highly variable network conditions such as 4G and Wi-Fi. A dedicated antenna is incorporated to improve connectivity and signal stability in challenging 4G coverage areas.

Hytera extends this emphasis on intelligent connectivity. According to Li, Hytera’s terminals support hybrid communication and real-time positioning, enabling comprehensive situational coordination beyond simple documentation. This connectivity infrastructure ensures high-performance data transmission even under pressure, facilitating immediate response and command center coordination.

Moreover, as Li explains, the BWC solution “supports the synchronization of track and evidence,” automatically linking evidence cases to their geographic locations. This capability enables a simultaneous display on the same screen, providing law enforcement personnel with a multi-dimensional playback of the truth and comprehensive, precise information support.

The Rise of Intelligent Analytics and AI

AI-driven features are fundamentally reshaping BWC capabilities from reactive recording tools to proactive intelligence platforms. Axon recently introduced Draft One, an AI-powered report-writing assistant that cuts paperwork time by over 40%.

The company has also introduced Axon Assistant, a voice-powered AI system providing real-time translation (supporting over 50 languages), voice-enabled policy chat with citations, general Q&A functionality, and situational support directly from officers’ vests. Hammouri notes this tool “immediately bridges language barriers” while continuously evolving to include future capabilities like license plate lookup and weather updates. New Axon Assistant skills, including voice-driven license plate lookup and weather queries, are planned for release later this year as part of their fixed-cost AI Era Plan.

Supporting and expanding on such AI capabilities, recent academic research—including an April 2025 case study with Rochester PD—demonstrates AI’s potential to detect behavioral patterns, including escalation versus de-escalation, in real time through combined video, audio, and natural language processing. These analytical capabilities promise to assist command centers in both post-event analysis and proactive supervision.

At the same time, Axis focuses on an open architecture strategy that enables seamless integration with third-party analytics platforms. Partners can access live video streams and overlay real-time intelligence for advanced situational assessment.

Finally, Zepcam focuses on triggered recording and streaming with features like remote ON/OFF and panic button activation, delivering excellent low-latency live streaming performance.

EMEA Rides the Adoption Wave

Body-worn cameras are finding increasingly diverse applications across EMEA, and all four interviewed companies—Axon, Axis, Hytera, and Zepcam—point to accelerating adoption trends.

The adoption of body-worn cameras in law enforcement continues to expand across multiple countries, with several major implementations taking place in 2025. Luxembourg is preparing to equip its Grand Ducal Police officers with body cameras starting July 1, 2025. Scotland has initiated an ambitious nationwide rollout of body-worn video cameras for Police Scotland, beginning in March 2025, with 10,500 cameras distributed over an 18-month period, targeting all frontline officers.

Across the Gulf Cooperation Council (GCC) countries, body-worn cameras are gradually becoming a fixture in law enforcement and security operations, though deployment levels differ sharply. The United Arab Emirates (UAE) leads the region. The UAE began exploring body-worn cameras in 2015, when Dubai Police launched a six-month trial involving 80 officers. In 2020, Sheikh Mohammed bin Rashid Al Maktoum issued Resolution No. 14, formally authorizing the use of security cameras by Dubai Police in public areas, including strict privacy rules prohibiting unauthorized transfer or publication of footage. Since then, both Dubai and Abu Dhabi Police have formally adopted BWCs. Abu Dhabi updated its policy in January 2025 to mandate that devices be visible on officers’ uniforms, that detainees be informed when recording starts, and that all footage be securely handled and shared only following official authorization.

Building on this momentum, Hytera’s Li confirms that their BWCs are already in use in Saudi Arabia, the UAE, the UK, and across Eastern Europe, where new mandates are requiring law enforcement personnel to wear cameras on duty.

Van Dijk of Zepcam notes that customers are increasingly drawn to “a secure European solution,” with deployments now spanning “a few tens of countries in EMEA.” He adds that increased demand for system integration and flexible deployments, including commercial use, is shaping their development roadmap.

All of these examples align with market observers’ notes that commercial interest—especially from sectors like retail, private security, and transportation—is rapidly rising, supported by both practical need and regulatory alignment. At the same time, regional variations highlight the evolving regulatory landscape and the differing paces of adoption between public and commercial sectors.

Turkey’s Accelerated Bodycam Rollout

Turkey has also embraced body camera technology as part of a major enhancement to its law enforcement operations. Beginning in June 2025, both the Police Department and the Gendarmerie General Command have implemented widespread deployment of body cameras among field personnel. In 2025, Interior Minister Ali Yerlikaya announced plans to equip all police and gendarmerie officers with body cameras featuring integrated facial recognition technology by the end of the year.

These cameras, developed by defense contractor ASELSAN, feature advanced capabilities including real-time monitoring and recognition technology that can instantly identify wanted suspects and vehicles involved in criminal activities.

Overcoming Privacy and Cybersecurity Hurdles

While the benefits of body-worn cameras are clear, security professionals must also consider the critical challenges associated with their implementation, including privacy concerns, overall costs, interoperability issues, and cybersecurity vulnerabilities. The security of digital evidence has become paramount in modern deployments. As Van Dijk explains, “We manage security along the chain, from recording on the device till viewing the recording.”

The deployment of BWCs, particularly those with experimental AI features like live facial recognition, raises significant privacy concerns. In 2024, UK police scanned nearly 5 million faces using similar technologies, prompting civil liberties groups like the Ada Lovelace Institute to call for greater oversight or bans on real-time biometric surveillance.

Vendors are responding to these concerns with comprehensive security architectures and privacy-by-design principles. Physical security forms the foundation of these efforts. “The video data is stored on a non-removable hardware component. Unauthorized access via USB is not possible,” notes van Dijk, highlighting how manufacturers are addressing potential vulnerabilities at the device level.

Advanced encryption and authentication protocols extend protection throughout the data lifecycle. Axis uses AES-256 encryption, secure boot, and signed firmware, complying with ISO/IEC 27001:2022 and ETSI EN 303 645 standards. The company’s signed video technology addresses a growing concern in the digital age. “In times of AI manipulation, this is becoming increasingly important to verify that video has not been tampered with and remains authentic,” says Frännlid.

Another company, Hytera, offers end-to-end encryption from camera to cloud and adds frame-level AES256 encryption with signature verification.

Building on this foundation of rigorous data protection, Axon’s cloud-based Axon Evidence platform ensures data immutability, with audit logs and watermarks to safeguard traceability and forensic integrity. As part of preserving the chain of custody, a serial number is burned into the evidence watermark at the time of recording as an immutable marker that cannot be altered by users or administrators. The original file and metadata remain intact, and every assignment or reassignment of a camera is logged in the device’s audit trail, ensuring that the identity of the camera operator at the time of each recording can always be confirmed. These features not only support evidence review but can also relay real-time location data during active recording.

Similarly, their approach includes signed firmware updates, two-factor authentication, and encrypted server-side storage, along with robust hardware-level protections to ensure end-to-end data security. The company is also certified to the ISO 27001:2022 standard.

Despite these comprehensive security efforts, ongoing dialogue and robust regulatory frameworks remain crucial to balance security needs with individual privacy rights.

Interoperability and Implementation Costs

Seamless integration of body-worn cameras with existing dispatch platforms, digital evidence management systems (DEMS), and video management systems (VMS) remains a significant challenge for organizations deploying these technologies. While vendors such as Axis, Zepcam, Hytera, and Axon emphasize open APIs and broad integration capabilities, ensuring true interoperability across diverse vendor ecosystems can be complex. Agencies must carefully evaluate whether proposed BWC solutions can effectively communicate with their current infrastructure without causing data silos or workflow disruptions.

Beyond technical integration, implementing a comprehensive BWC program requires significant financial investment that extends well beyond hardware costs. Total cost of ownership encompasses data storage—often cloud-based—evidence management software, necessary upgrades to network infrastructure for live streaming, ongoing device maintenance, and training personnel. Although return on investment (ROI) figures vary by deployment, agencies must conduct thorough cost-benefit analyses to account for these long-term operational expenses, including the increased demand on IT resources. For example, Police Scotland’s £33 million investment in digital evidence systems underscores the scale of financial commitment required for full deployment.

This substantial investment underscores how implementing body-worn cameras involves not only procuring the devices themselves but also developing the necessary digital infrastructure to securely store, manage, and utilize the vast amounts of video evidence they produce.

Together, these factors emphasize the need for careful planning and resource allocation to ensure that body-worn camera programs deliver sustainable operational value without compromising financial sustainability, security, or efficiency.

The Trust Equation

Body-worn cameras have evolved from simple recording devices into AI-powered intelligence platforms, reshaping security, safety, and transparency across industries. Their expanding capabilities now prove essential in retail, healthcare, transportation, and emergency services beyond traditional law enforcement.

This rapid advancement, however, brings complex trade-offs. Privacy concerns, cybersecurity vulnerabilities, and implementation costs require careful navigation, while varying regional regulations complicate deployment strategies. The technology’s success depends on how effectively organizations integrate these tools while maintaining ethical standards and protecting individual rights.

BWCs are no longer just documenting events—they’re actively shaping how organizations operate and build public trust. The future of this technology will be determined by our ability to balance innovation with responsibility in an increasingly connected world.

BioStation 3 is Compliant with the ISO/IEC 30107-3 PAD Standard

Suprema’s AI-powered facial authentication access control solution, BioStation 3, has successfully passed the ‘Presentation Attack Detection (PAD)’ test conducted by the reputable U.S.-based software quality assurance & testing company, iBeta. As a result, BioStation 3 is now compliant with the ‘ISO/IEC 30107-3’ PAD standard.

iBeta is biometric testing laboratory accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) under the U.S. National Institute of Standards and Technology (NIST). The laboratory verifies the performance and quality of biometric systems according to stringent international standards. BioStation 3 was evaluated by iBeta’s PAD conformance testing in accordance with the ISO/IEC 30107-3 standard, including passive liveness detection testing with comprehensive spoofing techniques used in the presentation attack.

With over 20 years of experience in the biometrics industry, Suprema has built a robust foundation in over 140 countries worldwide. This extensive global presence has enabled Suprema to accumulate experience with various racial and ethnic profiles, as well as different facial changes, which is essential for the development of AI algorithms. Leveraging this data, Suprema has achieved exceptional facial authentication performance.

In 2022, Suprema further enhanced its AI capabilities by adopting highly advanced AI processor, NPU(Neural Processing Unit), into BioStation 3. This upgrade has significantly improved the accuracy and speed of facial authentication while strengthening anti-spoofing measures to detect fake faces, images, and photos. The facial authentication performance is impressively consistent across various ethnicities and for faces with masks, glasses, hats, beards, niqabs, and different hairstyles. It even ensures accuracy under any lighting condition, whether bright, dim, or backlit. Also, it is not only highly accurate but also fast, so it takes within 0.2 seconds to authenticate moving faces which offers great convenience in high-traffic areas.

Building on the innovation and product quality of BioStation 3, it has been recognized in worldwide, receiving prestigious awards from leading security media. BioStation 3 was honored as the ‘Best Product’ in the access control category at the ‘Detektor International Award 2022’, secured a silver trophy for the most innovative product at ‘ExpoProtection 2022’ held in Paris, France, and was named the ‘Top Access Control Hardware Product’ in the ‘SecurityInfoWatch.com Readers’ Choice Product Awards 2023’.

This global recognition including a validation from iBeta, is a further testament to Suprema’s facial authentication AI technology, showcasing its world leading performance and reliability. With unparalleled expertise and cutting-edge technology, Suprema continues to lead the field, setting new standards in AI-powered facial authentication solutions.

Leading AI-Driven Cloud Security

In 2022, VIVOTEK introduced VORTEX, a cloud-based Video Surveillance as a Service (VSaaS) platform powered by artificial intelligence, offering seamless integration with VORTEX cameras. Built on proven technology, VORTEX enhances security with advanced tools and intuitive connectivity within a reliable ecosystem

By: Đorđe Baćić, BDM, VIVOTEK Europe; E-mail: djordje.bacic@vivotek.com

VIVOTEK’s hybrid cloud architecture and intuitive platform enable easy integration, allowing teams of all skill levels to seamlessly deploy VORTEX across multiple locations. With robust security protocols, it ensures data privacy and protection at every level, providing a secure and reliable foundation. Powered by advanced AI, VORTEX enables proactive, data-driven decision-making that strengthens security and supports smarter strategies. Thanks to seamless integration with third-party solutions, it offers unparalleled flexibility, expanding capabilities within a connected and reliable ecosystem designed to enhance operations.

Remote Management and Scalability

Users can effortlessly manage all VORTEX devices and existing cameras remotely from any location and on any device through an intuitive cloud interface that ensures real-time responsiveness. Security is further enhanced with VORTEX’s hybrid cloud, which provides flexibility, instant scalability, proactive detection, remote management, and strong cybersecurity measures to anticipate and prevent threats. Instant notifications and operational insights allow for swift responses, offering proactive management that improves security and efficiency across all locations.

 Cybersecurity

Automatic updates deliver the latest features, security patches, and AI enhancements, ensuring peak performance and protection without the need for manual intervention. VORTEX secures organizations with encrypted devices, cloud storage, role-based access control, Multi-Factor Authentication (MFA), Single Sign-On (SSO), global compliance, and continuous monitoring for trusted and resilient protection. It integrates with third-party solutions, enabling intelligent automation and data processing for more efficient operations and informed decision-making.

 Device and Cloud Security

TLS 1.2 and AES-256 encryption, local data storage in the U.S., Japan, Germany, and Australia, automatic updates, and the elimination of port forwarding ensure robust cloud data security. Meanwhile, encrypted SD cards, secure system boot, signed firmware, unauthorized access prevention, and automatic updates provide top-tier device protection and performance.

Additionally, role-based access control (RBAC) and detailed audit logs enable precisely defined permissions, data security, and operational integrity. Furthermore, VORTEX ensures strong data protection by adhering to industry standards (NDAA, TAA) and maintaining GDPR compliance.

Single Sign-On (SSO) simplifies access, while Multi-Factor Authentication (MFA) ensures strong protection for sensitive data and networks. Thanks to plug & play functionality, users can connect the VIVOTEK Network Video Recorder (NVR) by simply scanning a QR code, eliminating the need for manually entering an IP address, user account, or password.

Panduit Micro Data Center

Definition of Micro Data Center A Micro Data Center (MDC) is a compact, versatile solution that integrates hardware, software, and cabling, serving as a comprehensive network hub. Similar to a telecommunications or network room but on a smaller scale, the key feature of an MDC is that it consolidates the entire data center infrastructure into a single enclosure — including electronic devices, patch panels, cable management, grounding/bonding, power, and copper/fiber cabling — designed to meet the demands of manufacturing environments.

The MDC represents the next phase in the evolution from tower computing systems to rack and cabinet-based deployments in manufacturing. It supports various business applications, such as:

  • Process and event monitoring, process historian, production tracking, and Overall Equipment Effectiveness (OEE) reporting. • Control network management, outer loop control, and recipe downloads. • Quality control, material handling, maintenance, batch tracking, and asset management. • ERP integration (e.g., scheduling, reporting, material consumption).

In addition to serving as a standalone system for these applications, the MDC can also function as a network hub that connects cabling and switches. In large manufacturing complexes or remote locations, it can act as a data collection node that transmits manufacturing data to the enterprise (e.g., Store and Forward). MDCs can also host Virtual Machine (VM) systems, enhancing reliability and optimizing server utilization.

More Meaningful Connections From a logical architectural perspective, the MDC is situated between the manufacturing plant and the enterprise data center, often separated by a demilitarized zone (DMZ) and a firewall to prevent direct traffic between the enterprise and manufacturing networks. This separation protects against viruses and unwanted intrusions while ensuring maximum bandwidth for manufacturing processes. Additionally, it allows each network to operate independently, ensuring that disruptions in one do not affect the other.

The NEMA 12-rated MDC protects Industrial Automation and Control Systems (IACS) by preventing the ingress of solid foreign objects and water. This robust design allows the MDC to be installed directly on the plant floor, eliminating the need for a dedicated control room or telecommunications closet. Placing the MDC near production equipment reduces the number of connections, shortens cable lengths, and facilitates quick access for maintenance, enhancing network reliability and performance. Furthermore, this proximity minimizes potential failure points, reduces network latency, and simplifies troubleshooting and diagnostics.

Physically, the MDC is typically installed in a secure space, such as a control room, production office, or telecommunications closet, located near the production environment but separate from it to protect equipment from dust, moisture, vibrations, and corrosion. This strategic placement shortens cable lengths, improves network performance, and simplifies maintenance access, further ensuring high reliability and quick responsiveness.

Panduit MDCs are a smart choice because they combine industrial durability, rapid deployment, integrated cable management, and compliance with key standards, making them a more reliable, cost-effective, and flexible solution compared to many competing products.

New 89 V3 Powerful AI Cameras

VIVOTEK’s V-series AI cameras combine advanced intelligence with high-quality imaging, available in 5MP. With AI-driven incident detection and real-time alerts, the cameras provide live-streaming capabilities to enhance deterrence. The user-friendly design reduces installation time and maximizes safety. This product series is the ideal solution for building a reliable and effective security system.

By: Đorđe Baćić, BDM EMEA, VIVOTEK; E-mail: Djordje.bacic@vivotek.com

Advanced Imaging and AI Capabilities

The RealSight Engine ensures sharp, detailed capture of individuals, even in motion or challenging lighting conditions, without manual adjustments. The Engine automatically delivers clear images, day or night.

VIVOTEK Smart VCA offers precise object and attribute tracking, providing detailed video analytics for targeted monitoring and quick searches.

The TPM 2.0 chip provides hardware encryption to protect confidential and cryptographic data, prevent unauthorized access, and also ensure system integrity for long-term security.

Advanced security features include access list, CSRF protection, digest authentication, HTTPS, IEEE 802.1x, password protection, secure boot, signed firmware, Trend Micro IoT Security (brute force attack event, cyberattack even quarantine event), user access log, user account management, and built-in FIPS 140-2 Level 2 certified Trusted Platform Module (TPM)

Robust Security and Durability

The camera is equipped with a built-in HDMI output port, allowing it to connect directly to the monitor via an HDMI cable. This setup eliminates the need for a video receiver to display surveillance footage, requires no additional wiring, and does not interfere with the existing decoration.

VIVOTEK’s product design facilitates an easy and efficient installation process: only a single-size screwdriver is required to disassemble and install the camera device. Additionally, compatible accessories are provided to meet various installation requirements across different environments.

IP67 & IK10 is weather-resistant and vandal-proof, ensuring durability even in harsh outdoor conditions. It is built to withstand extreme weather elements and protect against vandalism, providing reliable security in any environment.

Complete Video Security with VIVOTEK Solution

Thanks to the integration with VORTEX, key individuals can be promptly notified via mobile push notifications on the VORTEX app or through email, enabling proactive deterrence and the prevention of violations.

You can effortlessly find evidence without accessing numerous video clips by using Deep Search, which enables efficient searching based on various attributes. View snapshots of people and their paths, eliminating the need for video replays.

Case Vault helps users manage footage found through Deep Search. Organize clips and export detailed case reports straight from search results, making case management easier.

Streamlined Management and Seamless Integration

Device Manager can quickly configure your cameras and NVRs. With our batch configuration, IP allocation, HTTPS/IEEE certificates, and firmware updates have never been easier, ensuring the system is always up-to-date and streamlined.

You can easily enhance your Milestone XProtect with VIVOTEK’s AI cameras for instant search evidence by attributes.

Optimize your Genetec Security Center with VIVOTEK’s AI cameras for quick evidence searching through Deep Search and export search reports.

To learn more about the VIVOTEK IB/FD/IT 9389 V3 AI Camera and experience cutting-edge security, visit the VIVOTEK website.

Betting on advanced video

The Adriatic region’s thriving casinos sector is harnessing new advances in video surveillance technology, writes Koray Ozyildirim, IDIS Türkiye Country Manager

A new generation of resort casinos is opening up across the Adriatic, comprising luxury hotels, state-of-the-art gaming, retail, wellness, and leisure facilities. As the sector prospers, in traditional tourist hot spots and in new destination resorts, there is demand for more powerful video solutions.

For example, casino operator Merit International, headquartered in Türkiye, is on a growth trajectory and recently opened its Starlit development in Budva, Montenegro, offering guests a high end hotel experience, private residences, a penthouse-level gaming area and stunning sea views. This is the third such investment in the country for the USD$1bn company, which already operates nine hotels and 11 casinos in Northern Cyprus, Croatia, and Bulgaria.

The 2,500 square meter Starlit is Merit’s most ambitious project to date, and advanced video technology is seen as key to its success. IDIS provided a complete, end-to-end solution, in a project delivered by our partner Volga Electronics.

Video allowing a more proactive approach

Casino operators like Merit are looking to harness the latest video tools to help them take a more proactive approach, addressing priorities and tackling risks common across the sector.

Casinos need continuous real-time and high-definition surveillance of gaming floors, to allow rapid intervention if operators detect suspicious activity. Efficient footage review is vital too, with search tools that enable rapid resolution of disputes and queries. At the same time, for casino resorts that host VIPs and high rollers, it is vital to foster customer loyalty through efficient and professional guest services, ensuring minimal disruption to gaming.

Having state-of-the-art surveillance provides reassurance for bona fide customers and acts as a deterrent to criminals and opportunists. So, there has long been a willingness in the sector to invest in the best available video infrastructure.

Today, this means more powerful, AI-enhanced solutions that will help to identify insider threats more reliably; make it easier to maintain integrity and trust on the gaming floor; and, in the case of casino resorts, optimize back-of house services for hotel guests and apartment residents.

Planning and implementing video solutions

For those planning and implementing casino video solutions it is advantageous to have a wide choice of high performance cameras with true WDR performance and IR that can cope with variable, often subdued, lighting conditions. System design and usability are also vital considerations. For example, surveillance federation services allow for the integration of multiple systems across multiple casinos, giving operators the advantage of multi-task, centralized monitoring, and management. This supports improved efficiency and cost savings. Additionally, a federated architecture enhances security by enabling control rooms to share video feeds and information across locations, and to send alerts in the event of threats being detected, improving response coordination. It also ensures scalability and flexibility, enabling expansion without cost penalties.

VMS mobile apps are important too, giving authorized managers and pit bosses the option of monitoring, reviewing, and controlling systems via their phones and tablets.

AI analytics delivering a competitive advantage

And, in an increasingly competitive market, deep learning AI analytics are giving casino operators a competitive advantage by providing actionable insights to drive operational efficiency. For example, Analytics can help managers decide how to place and utilize staff depending on people counting, dwell time, or queues for specific gaming tables or bars.

Heat maps and flow patterns can distinguish where casino guests spend most time and how they move through the casino, allowing improved floor layouts for enhanced engagement and positive experiences.

People counting and occupancy monitoring, with analytics targeted at the casino entrances, make it easier to manage peaks and troughs in activity with the right level of staffing thanks to automatic alerts to duty managers
And AI video also offers the benefits of metadata search tools allowing for quick and efficient retrieval of specific video footage based on various parameters such as appearance, object type, time, location, and specific events.

End-to-end solutions

At the Starlit, The end-to-end IDIS solution comprises more than 90 NDAA-compliant cameras, including 5MP IR domes and mini-PTZs with true WDR and two-way audio; four 64-ch pre-installed IDIS Solution Suite (ISS) servers with dual power; plus, all network accessories including specialist surveillance keyboards

The ISS VMS management software provides a powerful foundation for Starlit’s surveillance operations with features for authorized users including simultaneous multi-stream live view and recording, administration and management of all devices and IDIS Critical Failover, which inherently protects against a range of fault conditions ensuring a full record of events is always stored.

ISS also supports integration with the casino’s ERP software, with transaction data to be overlayed on recorded video for efficient incident investigation.

Confident decision-making

The casino already has data collection systems, and now IDIS video heat maps can provide a unique extra layer of business intelligence – for example, allowing directional footfall and dwell time metrics to be compared to customer spending patterns; and revealing the most-used areas where customers are likely to occupy their time even when they are not spending money. This additional level of insight will give managers the confidence to change the positioning of gaming tables and slot machines, improve the utilization of guest services, target promotions, and perfect the overall casino floor and resort layout.

Across the Adriatic region, and in casino growth markets globally, this latest generation of video solutions is proving to be highly attractive. The value of AI-enhanced video technology is being embraced by operators, not only to help reduce losses and prevent fraud, but to ensure positive guest experiences, and improve management decision making.

ICT- IDEMIA Unlock Smarter Access

Integrated Control Technology (ICT) provides smarter security with its latest integration between enterprise Access Control and Security platform, Protege GX, and IDEMIA MorphoManager. Unifying biometric authentication and access control in one system makes access management easier, faster, and more secure than ever.

“At ICT, we believe in the power of open technology, that enables users to create the solutions they need by bringing together powerful systems,” explains Josh Baker, Product Manager, Integrations at ICT. “With the biometrics market expected to be worth $136 billion in 2031 we’re thrilled to add IDEMIA to our range of biometrics integrations, streamlining user management and enabling multifactor authentication in Protege GX.”

With the new integration using IDEMIA BioBridge, user records will constantly update and synchronize between ICT Protege GX and IDEMIA’s MorphoManager, which manages fingerprint and 3D facial templates for up to 100,000 users, and can configure thousands of biometric terminals. This integration allows ICT customers to use any of IDEMIA’s biometric devices, from touch and contactless fingerprint readers, to their face recognition series, and centrally manage the access rights for all users.

Customers can map their premises and allocate different security settings depending on the risk levels. They can then decide what type of identification devices to use in which areas, or a combination of them: multi-technology readers, fingerprint or face recognition devices. Protege GX manages the access level according to users’ rights and the security rules set for the areas. You can implement scenarios to fit the customer’s requirements, such as automatically arming and disarming an area, or only allowing access to an area if the supervisor is present.

Biometrics are an efficient and inherently secure way to identify employees as well as visitors. It simplifies the management of credentials by eliminating the needs for cards or tags, which can be lost or misplaced.

“ICT’s integration with IDEMIA unlocks smarter access and provides a scalable security solution,” says Thomas Napora, Vice President and General Manager, EMEA at ICT. “Our customers in the financial, government, and critical infrastructure sectors, will benefit from the flexibility and reliability of our intrusion and access control platform with the robustness and security of IDEMIA biometrics sensors,” Napora adds.

Josh Baker explains the ICT philosophy behind open technology and integrations. “We know time is money and inputting the same data into two systems is simply something that doesn’t need to be done in this day and age. That’s why we’re committed to continuing to deliver integrations that are easier for you to deploy and add value to your customers.”

The integration is available now; commercial and technical information is available on the ICT website  https://ict.co/products-solutions/our-integrations/biometric-systems/idemia/. The regional ICT team is available to support any enquiries.

2024 Tech Trends Maturity and Suitability Index

Welcome to asmag.com’s 2024 technology survey sponsored by ZKTeco. This year our survey saw participation by 250 security players who were polled not only on the suitability and maturity of security technologies but also on customer interest/enthusiasm over these technologies and their growth prospects in the near term. It is our hope that with the survey, readers will gain a better understanding of technologies that deeply shape our industry. The full results for video surveillance and access control can be found here.

Cloud/hybrid architecture

Video surveillance as a service (VSaaS) and access control as a service (ACaaS), which are increasingly adopted by security players, show little change in terms of suitability and maturity this year as compared to 2023, even though ACaaS ranks No. 1 for access control technologies with huge growth potential (full results can be found in the access control and video surveillance articles).

It’s worth noting that the hybrid architecture has received higher scores of 4.03 on suitability and 3.7 on maturity. In terms of customer inquiry and growth potential, hybrid ranks No. 4 and No. 3, respectively. Based on the results, we can see that the cloud momentum is still there, and this is especially the case for hybrid cloud, which distributes processing/storage between on-prem and cloud.

“Hybrid architecture is gaining popularity because it combines the best of both on-premise and cloud-based systems. It allows organizations to retain local control of their most sensitive data while leveraging the scalability and convenience of the cloud for broader management. This dual capability is especially useful for companies with legacy systems that aren’t ready for full cloud migration,” said Tom Buckley, Co-Founder of Qumulex.

“A flexible hybrid-cloud deployment provides multiple options, ensuring that regardless of how many systems are running on local servers or connected to the cloud, they can all be brought back to a central head-end for seamless management from a single platform. A hybrid approach also simplifies the transition to cloud-connected systems at a manageable pace, enabling edge devices to become cloud-compatible, adding cloud services to existing infrastructure, and allowing for the development of a long-term strategy that maximizes ROI while avoiding expensive forklift upgrades,” said Laurent Villeneuve, Senior Product Marketing Manager at Genetec.

AI/Generative AI

Generative AI refers to artificial intelligence that can create new contents based on existing datasets. A potential game-changer for security, generative AI garnered a suitability score of 4.16 and ranks No. 1 in both customer inquiries and growth potential over the next five years.

“Generative AI is gaining a lot of attention in security because of its ability to improve the accuracy and speed of threat detection, as well as its potential to reduce false alarms. By learning from vast amounts of data, generative AI can identify patterns that humans or traditional systems might miss, enabling more proactive security measures. It can also be used to enhance facial recognition, predictive maintenance, and video analytics. While it’s still maturing as a security technology, its rapid development and widespread applicability make it a top candidate for investment and adoption in the near future. As it matures, we expect to see more innovative applications that will revolutionize how we approach physical and cybersecurity,” Buckley said.

Meanwhile, Villeneuve argues that GenAI can also introduce new risks, which must be properly addressed.

“The rise of GenAI also introduces new security threats, including the proliferation of deep fakes and vulnerabilities in foundation models, which are trained on vast amounts of publicly available internet data. These models are increasingly becoming targets for adversarial attacks, such as efforts to introduce malicious data into the models’ training datasets. The security industry, in particular, must be vigilant in identifying and mitigating these emerging risks to ensure the integrity and safety of its systems. If implemented correctly, this can lead to faster response times and more efficient investigations, ultimately improving overall operational effectiveness,” he said.

Edge processing

In terms of edge processing, it gained a suitability score of 4.3 and maturity score of 3.86. In terms of customer inquiries, it ranks third. The high suitability score reveals that users enjoy the benefits offered by edge processing, where data is processed on the edge – only metadata is transmitted to the backend for further processing. This allows for better utilization of bandwidth and quicker response to incidents. The increasing availability of AI cameras where video can be processed on the edge also helps drive this trend.

Cybersecurity

Cybersecurity received suitability and maturity scores of 4.39 and 3.91, respectively. It also ranks No. 2 in both customer inquiries and future growth potential. The results reflect the growing importance of cybersecurity amid high attack rates. According to Broadcom, connected cameras accounted for 15 percent of all IoT attacks. A US News and World Report survey further shows 13 percent of respondents have experienced camera hacks, while 49 percent are worried about them. This has prompted vendors to design their products with cybersecurity in mind. Gallagher, for example, has launched their Controller 7000 with enhanced hardware and security infrastructure to optimize cybersecurity. Video surveillance equipment manufacturers are increasingly highlighting NDAA compliance where no key parts of components are made in China. With hacking and security breaches becoming more rampant, discussions and awareness over cybersecurity are all but likely to continue.

Unmanned security (drones and robots)

As for unmanned security such as drones and robots, it scored moderate suitability and maturity scores of 3.7 and 3.34, while ranking fourth in terms of growth potential in the near term. Unmanned security has been a much-discussed topic a few years back, yet user interest and enthusiasm seem to have diminished a bit. However unmanned security still has useful applications, especially in critical mission scenarios where monitoring by fixed cameras is insufficient. Mitsubishi, for example, has teamed up with 3S to offer a fire-prevention solution where drones are flying with both visible and thermal cameras, the latter of which can detect small fire points, which can escalate into larger-scale fires.

Tables:

Ranking of security technologies, by inquiries from customers

Ranking Technology
1 AI/Generative AI
2 Cybersecurity/cyber-defense solutions
3 Edge processing/storage
4 Hybrid cloud architecture
5 Unmanned security platforms
6 5G
7 Radar and lidar

Ranking of security technologies, by future growth potential

Ranking Technology
1 AI/Generative AI
2 Cybersecurity/cyber-defense solutions
3 Hybrid cloud architecture
4 Unmanned security platforms
5 5G
6 Edge processing/storage
7 Radar and lidar

The principles of gas measuring technology

How has gas detection developed over the years?

In mining, hazardous levels of gas concentration can build up all the time, causing powerful explosions and accidents. The search for methods for the early detection of hazardous gases, such as methane and carbon monoxide, was therefore already of crucial importance in the 19th and 20th centuries to ensure the safety of miners. The first method of gas detection involved the use of canaries. For this, a canary was kept in a small cage and monitored regularly. If the bird displayed any signs of stress or illness, this was taken as a clear warning signal for the presence of hazardous gases. To protect the animal‘s health, flame lamps would then be used to determine hazardous levels of gas concentration.

For this, the miners lit the flames in a fresh air environment. If the flame shrank in size or began to go out, this indicated a low level of oxygen in the air. If, on the other hand, the flame increased in size, this was a sign that methane – as well as oxygen – was present in the mine. Gas warning technology has continued to develop to this day. Today, precise, compact and robust gas detectors are used to monitor dangerous gas concentrations and combustible vapours.

Various technologies such as catalytic, electrochemical, infrared, ultrasonic or MPS technologies offer the best possible options for monitoring and analysing the ambient air. These allow safe and reliable gas detection in a wide range of applications and ensure maximum protection for lives and plants.

The gas detectors must monitor various gases and vapours safely and continuously in changing conditions. This requires maximum reliability, flexibility and stability in order to protect the safety of people and plants in the best possible way. In addition, not every gas detector may be used in every working environment. It is therefore necessary

to check whether the required device specifications are met before use. These device requirements are explained in the relevant standards and regulations.

What are gases?

Matter above its boiling point is generally referred to as a gas. In this physical state, the molecules or atoms move far away from each other and completely occupy the available space. In contrast to matter in solid and liquid states, gases have no solid form and no solid volume.

Gases consist of a swarm of molecules moving randomly and chaotically, constantly colliding with each other and with everything around them. They fill every available space and, because of the high speed at which they are moving, mix rapidly with any atmosphere into which they are released.

Gases can be lighter or heavier than air or have approximately the same density. Gases can have an odour or be odourless. There are coloured and colourless gases. Even if you cannot see, smell or touch them, this does not mean that they are not present. Gases in principle are not harmful. They are, after all, part of the earth‘s atmosphere. It is only when their concentration exceeds critical levels that there is a risk of poisoning and explosion and, if it falls below these levels, danger of suffocation from lack of oxygen.

Methane, for example, is colourless and odourless and difficult to detect when present. However, as this natural gas is used in many homes for heating and cooking, it is present in people‘s everyday lives. Vehicle engines burn fuel and oxygen and produce emissions/waste gases containing nitrogen oxides, carbon monoxide and carbon dioxide

and are a hazard to life and plants. Oxygen and hydrogen must also be detected continuously to keep the ambient air clean and prevent oxyhydrogen explosions.

What are the different gas hazards?

Choosing the correct measuring principle is of central importance in the detection of gas hazards. Each measuring principle is suitable for different danger zones and is optimised for either toxic and/or combustible gases and oxygen. In principle, the following gas hazards can be distinguished:

  1. Explosion hazard due to combustible gases

Wherever combustible gases such as methane, butane and propane are present, there is an increased risk of explosion, for example in petrochemicals, industry and refineries. Sensors with a catalytic sensor element for combustible gases are used here.

  1. Excess oxygen and lack of oxygen

While excess oxygen makes materials more flammable, a lack of oxygen is life-threatening. Oxygen can be consumed or displaced by another gas. Sensors with an electrochemical sensor element are generally used for monitoring oxygen levels.

  1. Toxicity

Hazards from toxic gases can arise in a wide variety of areas, such as in industrial production processes or during transport, but also in natural processes, such as putrefaction processes during the degradation of biomass. Sensors with an electrochemical sensor element for toxic gases are used here.

In addition to the different gas groups, selecting the suitable measurement method depends on many other factors, such as checking whether other hazardous substances are present in the environment (cross-sensitivity), whether continuous measurement or long-term or short-term measurement is required and whether there needs to be an alarm and warning notification if limit values are exceeded.

What are the sensors and measuring principles used in gas detection?

The sensors use certain properties of the gas to convert them into an electrical signal. The following measuring principles are used in gas detection technology: the electrochemical measuring principle, the catalytic measuring principle, the infrared measuring principle, the semiconductor measuring principle and the MPS measuring principle.

The electrochemical measuring principle

Electrochemical sensors are often used because of their precision, sensitivity and fast reaction times. They are used in areas such as environmental monitoring, medical diagnostics, food control and industry.

Electrochemical gas sensors work in a similar way to batteries and are used to measure carbon monoxide (CO), nitric oxide (NO), nitrogen dioxide (NO2), ammonia (NH3) and oxygen (O2). The ambient air to be monitored diffuses through the filter membrane into the liquid electrolyte of the sensor.

The chemical process of the measurement is an oxidation, whereby one molecule of the target gas is exchanged for one molecule of oxygen. The reaction drives the oxygen molecule into the counter electrode, resulting in a current signal (nA) between the measuring and reference electrodes. As a rule, gas sensors are specific, so there is little – if any – cross-sensitivity to other substances.

Advantages

  • Linear measurement signal
  • Highly sensitive
  • Low cost

Catalytic measuring principle

The catalytic measuring method involves measurement using pellistor and catalytic bead sensors and is suitable for measuring explosive gases and vapours. In this measuring method, two platinum coils are embedded in a ceramic layer and connected electrically via a bridge circuit (a Wheatstone measuring bridge).

The surface of one platinum coil is activated with an oxidation-promoting catalyst, while the surface of the other platinum coil is not activated. Current flows through the coils, heating them to approx 500 °C. The oxygen in the air reacts with the combustible gas on the surface of the active coil. This increases the temperature and resistance in the active platinum coil, causing the bridge to become unbalanced. This process can be measured.

Advantages

  • Total measurement of many combustible gases
  • Linear signal
  • High measurement accuracy
  • Poisoning from silicones etc.

Infrared measuring principle

The infrared measuring principle involves the measurement of CO2, methane etc. using infrared sensors. The IR principle uses the individual absorption spectrum of the gas to be measured as a base and determines the exact concentration by analysing it precisely and quantitatively. Since all measured gases absorb in different spectral ranges, this results in a kind of „fingerprint“ that allows selective characterisation with almost no cross-sensitivities.

Advantages:

  • Low cross-sensitivity
  • High measurement accuracy
  • Wide measuring range
  • High selectivity
  • Dust & dew point sensitive
  • Long lifetime
  • Low maintenance costs

Semiconductor measuring principle

Semiconductor sensors are used for some toxic and explosive gases. A metal oxide-based semiconductor (tin oxide) is applied to a substrate. The substrate contains electrodes that measure the resistance of the semiconductor and a heater that heats the semiconductor to 200 to 400 °C.

The sensor reacts to changes in the composition of the surrounding atmosphere by changing the resistance of the semiconductor. Reducing gases such as carbon monoxide or hydrogen lower the resistance of the semiconductor. The sensitivity of the semiconductor to a specific gas can be changed through the temperature of the semiconductor.

Advantages

  • Low budget
  • Versatile in use
  • Non-selective
  • Robust

MPS measuring principle

MPS sensor technology is used to detect combustible gases such as hydrogen, methane, propane and acetylene as well as refrigerants. This highly flexible sensor solution is attractive for a wide range of applications. MPSTM sensors are particularly suitable for areas that are difficult to access, as they can operate for long periods without requiring calibration or maintenance. The integrated environmental sensor measures the change in thermodynamic properties.

Advantages

  • Lifetime 15+ years
  • Maintenance free
  • Low power consumption
  • High linearity
  • High stability
  • Non-selective
  • Environmental compensation

What do explosion protection and explosion limits mean?

 Explosion protection

Many combustible substances come into play in industrial processes. This releases combustible gases and vapours through valves or other openings. For prevention purposes, these danger zones are called Ex-areas in which only equipment of a safe ignition protection category may be used.

Explosion protection is standardised worldwide and based on the 3-zone concept. Ex zones are areas in which a hazardous explosive atmosphere exists. The zones can be distinguished as follows:

EX-Zone Type of hazard Areas in which a hazar­dous explosive atmosphere exists Permitted devices/

Protective measures

Zone 0 Permanent danger of explosive atmosphere e.g. inside containers Ex-protected devices required
Zone 1 Occasional danger of explosive atmosphere The immediate vicinity of Zone 0, e.g. filling openings Ex-protected devices recommended, non-ex-protected devices with special protective measures
Zone 2 Low risk of explosive atmosphere The area surrounding Zones 0 and 1 Non-ex-protected devices, provided the probability of an explosive atmosphere is low

Explosion limits

The explosion range is defined by a Lower Flammability Level (LFL) and an Upper Flammability Level (UFL). The Lower Flammability Level describes the lowest concentration of a combustible substance in the air at which a flame can ignite and spread.

The Upper Explosion Limit describes the highest concentration at which a flame can only just ignite and spread independently. However, it should be noted here that the situation can change rapidly, for example through dispersal of the mixture caused by a gust of wind, and the concentration can then again fall below the Upper Flammability Level.

Which requirements and guidelines apply to gas detectors?

 Safe Integrity Level – SIL

The Safety Integrity Level, also known as the safety requirement level (SIL for short), is an internationally-recognised measured variable in the field of functional safety. The Safety Integrity Level is used to assess electrical/electronic/

programmable electronic (E/E/PE) systems and refers to the reliability of safety functions.

4 SIL levels are used to determine the potential risk to persons, systems, plants and processes. These are realised using safety functions with the aid of a safety instrumented system (SIS), which may consist of different equipment such as sensors, actuators and control elements. A distinction is made between SIL1 up to SIL4, which requires the strictest measures for the greatest risk. These are requirement measures for the probability of dangerous random failures.

Functional safety is part of the overall safety of a device, a plant, a train, a car or any other complex automated system. The aim of functional safety is always to protect people, plants and the environment from malfunctions. Without functional safety, trains would not be accidentfree, chemical plants would not be able to be operated safely, or airbags would be triggered at the wrong moment.

Which certificates and standards are required for gas detectors?

Many applications require special certificates that prove that the gas detectors meet environmental requirements, such as ATEX, ISO, Marine, IEC, EN, SIL, etc. Gas detectors also differ significantly in respect of their technical features. In particular, there are sometimes considerable differences in terms of functionality, calibration, lifetime

and suitability for installation as well as userfriendliness. MSR-Electronic offers a wide range of gas detectors for the detection of toxic and combustible gases.