Pages

Wednesday, September 26, 2012

Video Smoke Detection



Video Smoke Detection (VSD) systems have been developed to overcome many of the problems associated with smoke detection. It provides solutions for previously unsolvable fire detection scenarios, working externally as well as internally and represents a true technological breakthrough in fire detection.


Video Smoke Detection is based on the computer analysis of video images provided by standard modern CCTV cameras. VSD automatically identifies the particular motion patterns of smoke and alerts the system operator to its presence in the shortest time possible. This enables a fast response to a potential fire, saving valuable time even in voluminous areas or where a high airflow may be present. 


In applications ranging from turbine halls to historic buildings, road tunnels, rail depots, warehouses, shopping malls, aircraft hangars and many others, Camera-based fire detection system has become established as the leading edge technology in the field of fire protection 



Fire safety professionals constantly seek the benefits of early warning of potential fires. In a perfect world it would be possible to place hundreds of smoke detecting sensors above and around any items or areas at risk. This would certainly enable a fast response to a potential fire, saving valuable time even in voluminous areas or where a high airflow may be present. Of course such a dream is not possible from a practical or financial point of view.

Video smoke detection technology makes this dream a reality.




How does VSD work?
Video smoke and flame detection is performed by a software algorithm running on Visual Signal Processors (ViSPs) that implement parallel processing engines in hardware. Video images are analyzed in real time by applying digital image processing techniques that allows smoke and flames to be detected with a high degree of confidence. The video image is continually monitored for changes and false alarms are eliminated by compensating for camera noise and acquiring knowledge of the camera
view over time.

Multiple zones can be defined for a camera view in which smoke and flames are to be detected. Each zone has a set of parameters that provide complete control over the detection algorithm. These parameters are configured individually for each zone in order to cater for a wide variety of application scenarios. It is also possible to combine information from multiple cameras to enhance the detection process.

Stemming from many years of research and development several complex statistical and geometrical measurements are made on the video image data from each zone as dictated by the control parameters. This is made possible by the parallel digital signal processing capabilities of the hardware. The scale of parameter settings is such that it is possible to detect smoke ranging from slow emerging faint smoke through to dense smoke plumes that are produced in a short period of time.

Once the measurements have been made from the video image data, a set of rules can be applied to determine if they characterize smoke or flames. The rules can also be tuned to meet the specific application requirements to complete a robust and successful detection algorithm.



 Product
 FireVu is an advanced embedded Video Smoke Detection (VSD) server designed to operate over an IP network. For this, mathematical algorithms it is capable of determining the presence of smoke within each of its four available analog camera inputs (PAL or NTSC). Operators can be alerted either remotely over the system’s network or local to the unit via relay outputs.

Each camera image can have up to 16 fully independent, configurable zones, allowing the user complete flexibility on setting up the areas to be protected with their required sensitivity levels. System configuration is carried out via a series of web pages using a browser such as Internet Explorer, while system monitoring and reviewing is carried out by Observer client software.


All alarm events are recorded to disk with configurable pre and post event video, allowing the operator to witness (and download) the event, including who or what created it.
   
The system is a 19” rack-mountable unit, utilizing in-house manufactured Visual Signal Processors (ViSPs) to process the images.

Each unit possesses 16 configurable relay outputs and can accept up to 16 alarm inputs. Numerous servers can be joined to a network to create a multi-camera system for larger installations.
 





Benefits
 It’s fast.... it detects smoke at the source of the fire.
  1. It’s unaffected by high air movement.  It will sense smoke movement patterns just as quickly in high airflow as it does in no airflow environments.
  2. It can detect all types of smoke.  Conventional detectors respond more quickly to certain types (colors) of smoke than others – VSD responds to the movement patterns typical of any color smoke.
  3. It can use traditional security cameras that may already be existing at the facilities needing protection.
  4. It gives visual verification of the alarm allowing a more immediate response to fire event.
It can retain a visual record (archive) of fire events for future playback and investigation activities.



Application
Case Study – Power Generation:
Here is a good example of where video smoke detection might solve a problem.  Fire protection is difficult for Turbine Generators in the Power Generation industry. Typically these turbine generators are in large open areas with really high ceilings.  Stratification effects from high ceilings, dilution of the smoke in the large open area and unpredictability from the high airflow in the space.  Conventional smoke or heat detection will just take too long to operate.

Video Smoke Detection can solve the problem.  It will detect the smoke at the source of the fire (typically coming from within the generator somewhere) and doesn’t wait for smoke or heat to reach the detectors mounted all the way at the ceiling.

Sunday, September 23, 2012

FCC Part 15

The Federal Code Of Regulation (CFR) FCC Part 15 is a common testing standard for most electronic equipment. FCC Part 15 covers the regulations under which an intentional, unintentional, or incidental radiator that can be operated without an individual license. FCC Part 15 covers as well the technical specifications, administrative requirements and other conditions relating to the marketing of FCC Part 15 devices. Depending on the type of the equipment, verification, declaration of conformity, or certification is the process for FCC Part 15 compliance.
Verification is a procedure where the manufacturer makes measurements or takes the necessary steps to insure that the equipment complies with the appropriate technical standards. Submittal of a sample unit or representative data to the Commission demonstrating compliance is not required unless specifically requested the Commission. Verification attached to the equipment a label showing that compliance is met.
Declaration of Conformity is a procedure where the responsible party makes measurements or takes other necessary steps to ensure that the equipment complies with the appropriate technical standards. Submittal of a sample unit or representative data to the Commissions demonstrating compliance is not required unless specifically requested. The Declaration of Conformity attaches to the equipment a label showing that the sample has been tested and found acceptable by the responsible party.
Certification is an equipment authorization issued by the Commission, based on representations and test data submitted by eh applicant. Certification attaches to the units subsequently marketed by the grantee which are identical to the sample tested an FCC ID number to show compliance.
FCC Part 15 Subpart A contains specific information regarding testing and certification. Information like, scope of the rules and legal implications, definitions, prohibition against eavesdropping, labeling, and other sections.
Some more interesting descriptions used in the FCC Part 15 as listed in Subpart A.
Digital Device. “An unintentional radiator (device or system) that generates and uses timing signals or pulses at a rate in excess of 9,000 pulses (cycles) per second and uses digital techniques; inclusive of telephone equipment that uses digital techniques or any device or system that generates and uses radio frequency energy for the purpose of performing data processing functions such as electronics computations, operations, transformations, recording, filing, sorting, storage, retrieval, or transfer. A radio frequency device that is specifically subject to an emanation requirement in any other FCC Rule part or an intentional radiator subject to Subpart C of this part that contains a digital device is not subject to the standards for digital devices, provided the digital device is used only the enable operation of the radio frequency device and the digital device does not control additional functions or capabilities.”
Intentional radiator. “A device that intentionally generates and emits radio frequency energy by radiation or induction.”
Class A Digital Device. “A digital device that is marketed for use in a commercial, industrial or business environment, exclusive of a device which is marketed for use by the general public or is intended to be used in the home.”
Class B Digital Device. “A digital device that is marketed for use in a residential environment notwithstanding use in commercial, business and industrial environments. Examples of such devices included, but are not limited to, personal computers, calculators, and similar electronics devices that are marketed for use by the general public.
FCC Part 15 Subpart B is for unintentional radiators. The category of unintentional radiators includes a wide variety of devices that contain clocks or oscillators and logic circuitry but that do not deliberately generate radio frequencies emissions. Among the common unintentional radiators are personal computers, peripherals, receivers, radios, TV sets, and cable TV home terminals. FCC Part 15 Section 15.101 has a very informative table for unintentional radiators. Two levels of radiation and conducted emissions limits for unintentional radiators are specified in FCC Part 15 Subpart B. The two levels are Class A digital devices, the higher less strict limits, and Class B digital devices, the lower more strict limits. Manufacturers are encouraged to meet the Class B digital device limits.
FCC Part 15 Subpart C is for intentional radiators. The carious types of intentional radiators covered by Subpart C include cable-locating equipment, cordless telephones, remote control and alarm transmitters, field-disturbance sensors for opening doors, and spread-spectrum systems for wideband data transmission. Intentional radiators governed by FCC Part 15 Subpart C must either have a permanently attached antenna or provide a unique coupler to prevent the use of unauthorized antennas. The FCC Part 15 Subpart C rules for operation of radio transmitters for the most part are very detailed regarding fundamental field strength, power and/or power density, frequency accuracy, and permitted harmonic and spurious emissions.
FCC Part 15 Subpart D outlines the regulations for unlicensed personal communication service (UPCS) devices operating in the 1910 – 1930 MHz frequencies bands.
FCC Part 15 Subpart E sets out the regulations for unlicensed National Information Infrastructure (U-NII) devices operating in the 5.15 – 5.35 GHz, 5.47 – 5.725 GHz, and 5.725 – 5.825 GHz bands.
FCC Part 15 Subpart G sets out the regulations for Access Broadband over Power Line (Access BPL) devices operating in the 1.705-80 MHz band over medium or low voltage lines. This section outlines the geographical area within which Access BPS operations are not permitted in certain frequencies bands.

Wednesday, September 12, 2012

Biometric Scanning and Your Privacy



Look at the whorls on your index finger. Every fingerprint is almost entirely unique – that’s why they’ve been dusted for crime detection for more than a century. Technology is moving on. Biometric scanning is the process of checking a fingerprint, iris, or face pattern with a technological device. But what does the mass introduction of Biometrics mean for your privacy?

What is Biometric Scanning?

Biometric scanning is the process of ‘reading’ a physical feature such as fingerprint, iris, face, vein, or voice. When you present your fingerprint or iris, the biometric reader creates a digitized template which will be used to recognize you in the future. The template is stored, either in a central system, or on your card.

Where is Biometric Scanning Used?

Biometric scanning is already used in many workplaces, high-tech laptops, and on passports in some European countries. It is also being proposed for the new Identity Cards which could soon be compulsory in the UK.
Biometric scanners are currently used to register asylum seekers and monitor travellers passing through major airports. The UK and USA are in discussions about sharing their biometric information in the anti-terror campaign. In Europe, the sharing of information between police and immigration officials is being orchestrated. The Home Secretary recently remarked that the UK could not hope to improve its security systems by remaining inside a “bubble”, insisting that this sharing of personal biometric data is crucial to a safe future.

Is Biometric Scanning Foolproof?

Ever since a secondary school tested out a top-notch Biometrics system for dishing out school dinners, then declared it too slow, and worth another try in 12 months, biometric testing has been something of a laughing matter. Will it really be good enough for our national security?

The National Physical Laboratory carried out tests on behalf of the Home Office, which is looking for two methods (a primary and a back-up) to use on the new Identity Cards. The report indicated that minor factors such as a cut finger, poor light, bad positioning, watery eyes or contact lenses influence the success of scanning. 98% of fingerprint scans resulted in the successful acquisition of an image and 100% of facial scans produced a usable image. The report also showed that, once an image was produced, the number of false matches was quite high.

What Are The Risks To Your Privacy From Biometric Scanning?

In terms of privacy, the main concern with biometric scanning is the storage and handling of any data acquired by biometric systems.
Storing Your Biometric Data
The UK government does not have a reputation for handling information securely. It’s already tentatively proposed sharing biometric data from the National Identity Register with banks and supermarkets, and is in talks to give out more information to other countries, resulting in a lack of privacy. An ex-MI6 operative said that the National Identity Register is a “present” for terrorists – a fantastic target for misuse or destruction.
Using Your Biometric Data
The privacy concerns here are international. Although we’re protected by the European Convention on Human Rights, and by the Data Protection Act, other countries have different laws. Critics are already worried that the new biometric passports will be too easy to read, record, and pass on.