As new risks & global threats emerge, governments are calling for higher level of safety and security. Surveillance and control, prevention of unlawful activities of sea and land borders are critical issues in the enforcement of homeland security. Xiuge delivers a set of comprehensive border surveillance & control capabilities that :
Quick reaction time from detection to interception
Intelligent and modular design: Intelligent network digital PTZ integrates the video coding, data acquisition, protocol conversion, power amplifier, power inverter, temperature control and lightning protection and other functional modules with the fireworks intelligent identification processor researched and developed independently by Helpsoft, compact structure, no problem of compatibility, low failure rate and good stability.
High integration: The intelligent network digital PTZ highly integrates the functions of surge protection, information exchange, communication, control, analysis and processing to reduce the power consumption of equipment and improve the operating reliability of equipment.
Wear resistance: Using special alloy material with a high coefficient of wearing, make it service life up to 10 years.
Easy maintenance: Integrated into one circuit board and open at the back side of PTZ, maintenance costs are just a few tenths of traditional equipment.
Easy installation: Small size, it can be directly connected to the external equipment only with one data cable when installation.
Low power consumption: The maximum operating power of the equipment does not exceed 50W.
Integrated lightning protection: the device itself integrated lightning protection module, no need of additional purchase lightning protection box.
IP66 protection grade: anti-corrosion coating treatment on the surface make it has the functions of moisture-proof, dust-proof and antiseptic.
Monitoring range: According to the different lenses, monitoring range will also be different (this product is suitable for monitoring the radius of 3-5 km area)
Because border surveillance is a matter of national security, Xiuge develops tailored solutions to match different nature and levels of threats.
Unregulated borders and coastlines are the chinks in a nation’s homeland security armour. Smuggling (contraband and human trafficking), illegal immigration, and terrorism are the three threats, to a country’s security, most likely to exploit the porosity of unregulated borders and coastlines: think back to the “Mumbai: 26 November” attack, or think of the smuggling of contraband through Gujarat, Jammu & Kashmir, or Rajasthan.
Border/Coastal Surveillance Systems (B/CSS) address these chinks in the armour through a mix of sensors, command and control applications, and interception units. This brief details the components of a B/CSS solution and the desired features of a B/CSS solution, with reference to Homeland Security requirements.
The components of a B/CSS solution
The operational components of a B/CSS solution can be best represented through the flow-chart below:
The sensor network serves as the eyes, ears, and skin of the B/CSS. A combination of sensors can track individuals and objects over varying distances, providing higher resolution as the target gets closer to the border or coastline. The functions of early-warning and threat-classification are carried out by the sensor network. Long-range sensors include OTH Radar, Sonar, SAR (Synthetic Aperture Radar), and IR/Optical Cameras; while close-range sensors include fences, fence-mounted detectors, buried cable, volumetric sensors, and microwave sensors.
Command & Control Application:
A command and control application takes the inputs from the sensors and carries out data fusion of different types of sensors, maps the movement of highlighted objects on a cartographic representation of the border or coastline, generates SOPs for responding to potential threats, and collates data which will be used to generate reports for post-event analysis.
The operator serves as the interface between the automated components of the B/CSS and the response teams on the field. Using the inputs provided by the command and control application, the operator directs the response teams to potential threats; sends real-time orders and missions to the response teams; and enters any additional information, received from the response units, into the command and control application.
Drafted by Chongqing Xiuge Intelligent Technology Co., Ltd