Analysis of how to break through the airport perimeter security management problems
Borosilicate Vapor Cells,Fused Borosilicate Cuvette,Vapor Cell And Cuvette,Large Specification Vapor Cell Yixing Jingke Optical Instruments Co.,Ltd. , https://www.jkgxcn.com
Airport perimeter security problems
Today, many civil buildings use the most cost-effective products such as electronic fences to implement perimeter alarm management, which proves to be effective in practical applications. But why does the perimeter alarm at the airport haunt users and manufacturers? Let’s take a look at Focus on the characteristics of the airport perimeter. In addition to the general characteristics of the general civil perimeter, airport perimeters also have other characteristics, such as a large range of one week, ranging from almost ten kilometers to as many as several tens of kilometers; secondly, the airside is often flat and wide, but it is also positive. As a result, the airside perimeter of many airports is bleak and desolate; the physical perimeter of the airport at the end can be seen in a number of barbed wire screens, and many airports also use wire mesh designs on the roadside. These three features have actually brought with them three very interesting difficulties. First, the long distance caused artificial patrols or the difficulty of timely warning after an alarm. Second, the terrain of a flat terrain made the invaders shortly after breaking the line of defense. There is no second measure to restrict its movement; the design of the third barbed wire makes it possible for the onlookers on the periphery of the perimeter to interfere with the perimeter alarm equipment.
In the past ten years, many airports in China have begun to pay attention to the issue of perimeter warnings, and many airports have already built or begun to build perimeter alarm systems. However, most airport perimeters are still at the “line†prevention level. What is meant by "line" precautions? If we look over the physical perimeter from the air, its form is a line. Based on the electronic perimeter of the physical alarm, whether it is an electronic fence or a vibration cable or a sensor based on a physical perimeter, its form Basically, it is a "line" or a "line" that slightly enlarges the width. The form of "line" perimeter defense is to enhance the "wire" type of physical perimeter in the form of "electronic wire." The "electronic line" triggering alarm forms a supplement to and advancement of the physical perimeter, and this alarm generated on the "line" also provides the most direct notification to the police.
Disadvantages of "wire" precautions
The shortcomings of "line" defense at the airport are also obvious. First, how could an intruder who breaks through the “line†be blocked quickly? Assume that an intruder at the end of the runway in the airside zone broke through the perimeter “line,†and that the guard at the time was only at the top of the runway not far from it. The length of the runway is generally about 4 km. The guards drive on the tour site and rush to the invading area at a speed of 120 km/h (the arrival time of the police is notified when the alarm is received). Then the time is about 2 minutes. Generally, the intruder enters the perimeter after entering the perimeter. The speed of the sprint is about 26~30km/h. Assuming that the person is over-consumed due to the excessive energy, the speed can only reach 20km/h. Into the run, then two minutes is enough to run 666m, calculated from 500m, from the point of invasion to 500m distance, in many airports have crossed the runway, to the position of the taxiway, and has even exceeded; Second, for many vibration-based "Circle" perimeter, on-line viewers often cause false positives, eventually forming a "wolf" situation. It can be seen that the "wire" perimeter widely used in general civil buildings does not meet all the needs of the airport. If you search through the historical records of some airports, the number of records that you invade and go to the empty side of the infield area will vary from 1 to 2 every year. Once invaded, seizing these invaders is often time-consuming and labor-intensive, and it is still the case at night. The underlying reason is that the intersection between the intruder and the perimeter “line†has only one point, and the location of that alarm is just a “pointâ€, and the precautions before and after the “dot†mean that the intruder actually It is out of the scope of defense.
"Surface" perimeter scheme assists airport security
Of course, for this intrusion "point" many airports have begun to use the camera's intelligent follow-up to identify and track, but because it is essentially defensive, follow-up and tracking of the camera is only valid in a small area.
On the basis of the above example, the 500m inrush distance after two minutes is very difficult to achieve by simply relying on the "half-blind" tracking of the camera. In this example, it is only assumed that the airside is a pure flat surface without any undulating terrain. There is still a small height difference in the ground on the airside of a few airports.
How to deal with these intruders who break away from the defense in the "line" perimeter is a "plot" of airport perimeter users. To make it not break away from defense, the core principle is to require the perimeter to be more than just a "line" but a "surface". Changing the perimeter from "line" to "face" is psychologically more difficult to accept, and it does not seem to fit the form of overlooking from the air. But the intrusion behavior is a continuous process, not a transient event, so the perimeter itself must also be a continuous form, which is why the "face" perimeter is a necessary perimeter form to combat intrusion.
The so-called "face" perimeter means that the perimeter alarm and detection area is not only along the perimeter of the physical perimeter, but covers the entire airport area, especially a large-area coverage perimeter alarm area in the airside area. If necessary, the scope can even be extended to the outer part of the physical perimeter to form a "pre-alarm" area. The value of the “face†perimeter is that the breakthrough point can generate an alarm. After the breakthrough, the intruder’s actions and positions within the airport (mainly the airside) are within the monitoring range of the perimeter system, regardless of the intrusion. Which direction to move, the control center can always get its position, so that it does not break away from the defense, which can quickly guide the police officers to track, as soon as possible to prevent intruders from further action.
Analysis of Construction Effect of "Surface" Type Perimeter Security System
"Face" coverage requires the use of devices capable of "face" coverage, one is a face-covered camera system, video analysis through the camera to ensure that the intruder's actions and location at any time can be informed by the manager; The other type is ground radar, which uses radar scanning to obtain the location of the intruder.
The former has a high investment, and it is difficult to ensure accuracy under nighttime, foggy and other climatic conditions. The latter is an all-weather detection method, and the single device coverage can range from one kilometer to several kilometers. Honeywell's RVS system is the latter. Based on the solution of integration of millimeter-wave radar, follow-up camera and central control software, taking one kilometer of short-range ground radar as an example, RVS solution can be in the perimeter and airside of the airport, according to the requirements of the headroom, in no more than 4 meters. The vertical pole (in a reasonable and in line with the requirements) erected on the millimeter-wave radar, to achieve air-side coverage of the airport.
There is actually a "line" in the "face" perimeter. This "line" is not a physical alarm device in the traditional sense, but a "virtual" perimeter line using GIS/GPS technology. As we all know, the scanning range of the radar is circular. It is unrealistic and impossible to set the straight line or polygonal line boundary of the airport only by the scanning area of ​​the radar itself. Therefore, we need to make full use of the GIS/GPS positioning technology of the back-end software. The “virtual†perimeter line is “scratched†on the map's calibration location. Any detected moving objects outside the “virtual†perimeter line are not intruders, while radially moving objects on the “beyond†perimeter line are invasive. (invasion point), and for intruders within the "perimeter line", they need to keep track of their position as an "intruder" to conduct necessary surveillance and provide location information to police personnel for quick verification. It stops.
Still taking the intrusion as an example, its intrusion behavior triggered the alarm because it “touched†the virtual perimeter, and this alarm informs the patrol personnel on the other side of the runway in a reliable manner. When the patrolling officers went out of the police, the intruder began to move toward the airside infield. Since the “face†perimeter was used, although the intruder had broken through the “lineâ€, he would never be able to escape the “faceâ€. Scope of prevention (This is the biggest difference from the traditional "line" perimeter), so his trajectory will always be displayed on the back-end software, which also means that intruders will never be able to break away from defense. The intruder's mobile information on the back-end software can be acquired by police personnel on the patrol through intercom or handheld devices (such as the iPad). In two minutes or even longer, the intruder can always be positioned by the patrol personnel and achieve Precisely positioned arrests.
The "face" type perimeter system has changed the momentary alarm that breaks through the invasion into a continuous alarming and tracking process, making the intruder nothing. Due to the monitoring characteristics of the millimeter-wave radar, in actual applications, the intruder may not be a person, but an animal smaller than the human figure, such as a monkey, may also be accurately captured.
Although the “face†type perimeter can continuously capture the position of the intruder, its invisible properties also cause difficulties for the review of intrusion prevention to a certain extent, and there are still “point†type perimeter prevention in the RVS system. Application supplements, that is, video capture of intruders by way of follow-up with the camera to provide further review and follow-up guidance. However, unlike traditional “dot†video tracking, RVS video tracking is based on active precision tracking of radar coordinates, using long-range cameras (usually integrated with low-light cameras and thermal imagers) that are in the same position as radars. Track intruders in the form of radar coordinates.
As a new perimeter technology, radar perimeter technology has completely broken the traditional thinking mode of the perimeter. The "dotted point" management of the airport perimeter has truly achieved 24-hour airport perimeter prevention, and its core principle is to extend the "transient" management of intrusions to "continuous" management if a radar warning zone is established (Physical Week) Outside the border, the pre-event, in-event and post-event management of the intrusion incident were realized. Because of its three-point combination of “point and line faceâ€, it overcomes the uniqueness of the perimeter of the airport, 1. Perimeter length (long radar scanning distance), 2. Large area (radar is a surface scan), 3. Barbed wire onlookers Interference (radar is an invisible perimeter) problem. It is believed that the perimeter management technology based on the "point", "line" and "face" triad will surely bring a safer flight environment to China's airports.