Presented at the 2013 Society of Mining, Metallurgy and Exploration Annual Meeting (SME 2013). Mining operations require a wider approach for surveillance systems to meet needs ranging from process monitoring to people and assets protection. Intelligent video analytics can identify specific conditions and notify operators of potential issues, allowing mining operations to make quick, informed decisions.
New trends in video analytics and surveillance systems for the mining industry
1. New trends in video analytics and
surveillance systems and its potential
applications for the mining industry
Kevin Saldanha, Senior Product Manager
Schneider Electric
SME Annual Meeting and Exhibition 2013
2. Schneider Electric
Trends and Implications that Drive
Industry Security
● Increasing physical threats in
the workplace
● Corporate espionage and theft of physical
and intellectual property
● Stricter and evolving regulatory
environment for security practices &
reporting
● Advanced Identity Management
● Convergence of IT and Physical Security
● Terrorist threats in high risk facilities
Schneider Electric – New trends in video analytics and surveillance systems – SME 2013
4. Schneider Electric
Intelligent Video Analytics - Definition
●Video analytics involves detecting
and tracking motion of objects
●It can identify specific conditions
and alert mine operators of
potential situations
Schneider Electric – New trends in video analytics and surveillance systems – SME 2013
5. Schneider Electric
Adaptive Motion
●Detects and tracks objects that
enter a zone – filtered by size
Schneider Electric – New trends in video analytics and surveillance systems – SME 2013
6. Schneider Electric
Directional Motion
11:00 – 05/05/2012
●Generates an alarm in an area
when a person or object moves
in a user-specified direction.
●Cameras can detect vehicles /
personnel moving in the opposite
direction of the normal flow of
traffic or an individual entering
through an exit door.
11:00 – 05/05/2012
Schneider Electric – New trends in video analytics and surveillance systems – SME 2013
7. Schneider Electric
Object Removal
●Triggers an alarm if an object is
removed from a defined zone
●Ideal for customers who want to
detect the removal of high value or
critical objects
11:00 – 05/05/2012
11:00 – 05/05/2012
Zone 1
Zone 1
Schneider Electric – New trends in video analytics and surveillance systems – SME 2013
8. Schneider Electric
Object Counting
11:00 – 05/05/2012
●Counts the number of objects that enter a
defined zone or cross a tripwire
●Used to count the number of people at a store
entrance/exit or inside a store where the
traffic is light.
●Based on tracking and does not count people
in a crowded setting.
Zone 1
Schneider Electric – New trends in video analytics and surveillance systems – SME 2013
9. Schneider Electric
Camera Sabotage
●Detects large changes in the field of view
●Alarm generated on significant shift in pixel
field such as lens cover or camera
repositioning
Schneider Electric – New trends in video analytics and surveillance systems – SME 2013
10. Schneider Electric
11:00 – 05/05/2012
Abandoned Object
●Detects objects placed in
user-defined zone
●Dwell time monitoring of a
stationary object within a
zone
●Typical installation for
critical infrastructure
(Chemicals, Fuel,
Hazardous)
Schneider Electric – New trends in video analytics and surveillance systems – SME 2013
11. Schneider Electric
Loitering Detection
11:00 – 05/05/2012
●Detects people or vehicles in a zone
longer than the user-defined time allows
●Dwell time monitoring of moving targets
within a zone
●Effective in real-time notification of
suspicious behavior around hazardous
areas / critical infrastructure
Schneider Electric – New trends in video analytics and surveillance systems – SME 2013
12. Schneider ElectricSchneider Electric – Presentation Title – SME 2013
Stopped Vehicle
11:00 – 05/05/2012
11:00 – 05/05/2012
●Detects vehicles stopped near a
sensitive area longer than the
user-defined time allows
●Ideal for mining hazardous
areas, and vehicles waiting at
gates.
13. Schneider Electric
Auto Tracking
11:00 – 05/05/2012
●Detects and tracks movement in the
camera’s field of view.
●Camera automatically pans and tilts to
follow object.
Schneider Electric – New trends in video analytics and surveillance systems – SME 2013
14. Schneider Electric
Object Type Detection
●Added to Adaptive Motion and Loitering Detection
on Thermal Imaging cameras
● Uses object size and shape rather than
temperature profile to discriminate object type
Schneider Electric – New trends in video analytics and surveillance systems – SME 2013
16. Schneider Electric
Challenging lighting conditions
11:00 – 05/05/2012
11:00 – 05/05/2012
●Low light levels
●Wide dynamic range – Very
bright and very dark areas
in the same scene
●Blooming with headlights in
the dark
●No light
Schneider Electric – New trends in video analytics and surveillance systems – SME 2013
17. Schneider Electric
SureVision technology
11:00 – 05/05/2012
11:00 – 05/05/2012
●Delivers Wide Dynamic Range, Low Light & Anti-Bloom capabilities,
automatically across changes in lighting and scene.
Schneider Electric – New trends in video analytics and surveillance systems – SME 2013
18. Schneider Electric
Thermal Imaging
Schneider Electric – New trends in video analytics and surveillance systems – SME 2013
Thermal Imaging Visible Imaging
●Doesn’t need light!
●Creates images from differences in radiated emissivity and
temperature
●Particularly effective with video analytics
●Moving from Military to commercial applications
19. Schneider Electric
Thermal Imaging
●For places where subtle differences in
appearance cannot be detected by
visible light cameras
●Thermal cameras can help identify:
●Leaks, ruptures
●Hot spot, Sensitive locations where
temperature change can predict
serious trouble.
●Ideal for mine surveillance, perimeter
monitoring, high-value asset protection,
electrical devices supervision (motors /
transformers) and process supervision
Schneider Electric – New trends in video analytics and surveillance systems – SME 2013
20. Schneider Electric
Specialty Camera Systems for rugged
mining environments
●Pressurized Camera Systems
●Explosion Proof Camera
●Vandal resistant cameras
Schneider Electric – New trends in video analytics and surveillance systems – SME 2013
22. Schneider Electric
Video Management Systems
●Purpose-Built for HD Video
●Mission-Critical Reliability
and Performance
●Scalable to Hundreds or
Thousands of Cameras
●Open-Platform,
Foundational Architecture
●Third-Party Cameras &
Storage
Schneider Electric – New trends in video analytics and surveillance systems – SME 2013
23. Schneider Electric
Mobile access to security video
●For first responders & roving security personnel
●View live video from IP cameras directly or via
video management systems
●Control Pan Tilt Zoom cameras
Schneider Electric – New trends in video analytics and surveillance systems – SME 2013
Today’s security picture is changing rapidly. Risks are increasing. New threats are emerging. Protecting assets – customers, employees, property and data – is still at the core of a business’s security strategy. But business leaders must also reduce risk, mitigate liability, protect revenue streams, and reduce operating costs and insurance premiums. Additionally, they are expected to align or comply with evolving international, federal and local security regulations and standards. For businesses within our target market space, the threats are too complex and wide spread to be addressed by manual or standalone methods. Threats to people, property and data need to be assessed quickly, with clear, real-time data, providing security personnel with actionable information to mitigate threats. Security operations benefit greatly from systems that can communicate with each other. This enables rapid and intelligent alarm response making it possible to disable threats to business operations as early as possible. This is a key step in creating the safest possible environment for business.
There are millions of security cameras in place across the world, with more millions coming on-line every year. Here’s a secret from the video security industry – 95% of video is never watched. Either live or ever. Most of the time nothing untoward happens. But when it does you want to get to it very quickly. Active surveillance is expensive. So it is directed at high value or high security locations. Even then, you often have an operator looking at 16 or more cameras on a video wall looking for suspicious activity. It is easy to miss something when it first happens. What analytics can do is help quickly direct attention to right segments of video from the right cameras, either in real time or forensically. The use of analytics are also moving beyond security applications to improving effectiveness of business or process operation.
Through constant automated digital screening and filtering,video analystics can identify specific conditions Notification of mine operators enables production teams to make quick, informed decisions Storing and retrieving data from memory is very easy for computers, but difficult for the mine personnel. What video Analytics do very efficiently, is identify objects by type, and track their movement in a scene. You can configure analytics to alert you in a range of different circumstances. Analytics are available at the edge – where processing is in th camera at time of capture or at the head end where they can be integrated across a group of cameras and forensic analysis can be done.
Analytics have improved greatly in reliability over the years. Techniques like adaptive motion look for movement of objects by size – eg a human, or vehicle and filter out effects of things like leaves moving in the wind or snow. Detects and tracks objects that enter a scene and then triggers an alarm when the objects enter a user-defined zone. This behavior is primarily used in outdoor environments with lighttraffic to reduce the number of false alarms caused by environmental changes
In essence, what you can do is watch for people or vehicles going to places they shouldn’t. You can set up the analytics behavior to raise an alarm when a person crosses a line or when a vehicle enters a zone. And you can specify the direction. So you can catch things happening against the normal flow of traffic. Generates an alarm in a high traffic area when a person or object moves in a specified direction. Typical installations for this behavior include an airport gate or tunnel where cameras can detect objects moving in the opposite direction of the normal flow of traffic or an individual entering through an exit door.
This is used to track high value or sensitive objects and alarm when they are removed.
This behavior is used both for security as well as for improving operational effectiveness. You can count people or vehicles arriving or leaving a scene as well.
This is a basic analytics in video security cameras today. Guards against vandalism. If someone moves the camera, throws a cloth over it, spray paints it. The camera detects it and sends an alarm.
This behavior is looking for objects left behind in places there shouldn’t be anything. You could, for example look for objects that are unattended longer than a certain period of time.
This behavior looks for people or vehicles hanging around longer than you’d like in a sensitive area.
Here you are concerned about vehicles either stalled or deliberately left unattended for longer than you’d like.
When configured, the camera automatically pans and tilts to follow the moving object until the object stops or disappears from the monitored area. Detects and tracks movement in the camera’s field of view. When the AutoTracker behavior is configured, the system automatically pans and tilts to follow the moving object until the object stops or disappears from the monitored area.
Used to detect whether a person or vehicle is in an area.
A mining operation can have over a thousand cameras. Managing the configuration and use of these cameras by authorized personnel is the key function of video management systems. They also need to organize, store and manage all petabytes of video data that flow from these cameras. Again for privacy and security reasons, access to all this info needs to be controlled. But an authorized person, needs to be able to find cameras and recorded video quickly and easily.
Tablet optimization should be with 2 x 2 and 3 x 3 views An ideal system should enable a user to view up to 500 cameras Search My Systems list for fast location of cameras Save favorite cameras and sites for easy navigation