SIOUX is able to adapt to any type of fence, even with mixed types within the same site. It is possible to adjust the working parameters for each zone, and, inside the zone, for each individual sensor.
The very high probability of detection (pod) and the very low nuisance alarm rate (nar) of this system, are the result of processing, for each of the three signals produced by each transducer, according to “fuzzy logic” inferential analysis rules.
|TOUCH & ZONETM
The installer can easily configure the zones in the field by walking around the perimeter and physically “touching” the sensors to select the beginning and end of each of the available zones. This capability makes it a much more immediate, quick and easy operation, while it is still possible to configure remotely using the sioux test software.
By exploiting the capabilities of the mems sensors to provide its own static position it is possible to gain useful information to understand if the sensor was moved from the original position. During installation the position of the mems whatever it is, will be memorised (CU). If the position alters by more than a pre-set, variable number of degrees (e.g. 5°) it will produce a tamper alarm.
This allows SIOUX to detect possible physical changes in the fence, which probably indicate an attempt to breach or re-position the fence protection system, either when the sensor is removed from the surface of the fence, or when the fence is bent while trying to break through.
|PIN POINT LOCATION
Each mems is identified individually via a specific channel on its master sensor, which knows the exact location of the sensor (address). Each intrusion event will be identified by point with a precision of 1m regardless of the distance between the sensors.
|PLUG & PLAY
The installation is very simple, the sensors can be fitted to the fence at the required distance and then connected in series with each other, using the cables supplied and fitted with rj45 connectors. The address of each sensor will be automatically when the position of each sensor is acquired on system start up detected in sequence.
The analysis of each sensor is based on “fuzzy” logic rules which allows it to establish with accuracy if the detected signal is attributable to environmental disturbances or if it is a genuine intrusion attempt by a human being.
With careful analysis, numerous tests and measurements were made of the types of phenomena created by intrusion attempts that cut or climb different types of fence. these were identified, for the most common types of fence, and the characteristics that distinguish them from natural events, such as wind and rain, events from adjacent roads or railways, and disturbances created by small animals that accidentally bump into the fence, were isolated. in particular the characteristics of low energy events that must be detected, such as cutting the fence, were identified.