MAXIMUM VERSATILITY OF THE PERIMETER FENCE PROTECTION
SIOUX 3.0 is a fence detection system able to adapt to any type of fence (electronic fence, pipelines protection, etc), even with mixed security fence types within the same site. It is possible to adjust the working parameters for each zone, and, inside the zone, for each individual fence sensor.
The very high probability of detection (pod) and the very low nuisance alarm rate (nar) of this fence detection system, are the result of processing, for each of the three fence sensor signals produced by each transducer, according to “fuzzy logic” inferential analysis rules achieving maximum perimeter fence protection.
|TOUCH & ZONETM
The installer of this fence detection system can easily configure the zones in the field by walking around the security fence perimeter and physically “touching” the sensors to select the beginning and end of each of the available zones. This capability makes the setting of each fence sensor a much more immediate, quick and easy operation, while it is still possible to configure remotely using the SIOUX test software.
By exploiting the capabilities of the mems sensors to provide its own static position it is possible to gain useful information to understand if the fence sensor was moved from its original position in the fence detection system. During perimeter fence protection installation the position of the mems, whatever it is, will be memorised (CU). If the position alters by more than a pre-set, variable number of degrees (e.g. 5°), it will produce a tamper alarm.
This allows SIOUX to detect possible physical changes in the fence, which probably indicate an attempt to breach or re-position the fence protection system, either when the fence sensor is removed from the surface of the security fence, or when the fence is bent while trying to break through.
|PIN POINT LOCATION
Each mems is identified individually via a specific channel on its master fence sensor, which knows the exact location of the sensor (address) along the fence detection system. Each intrusion event will be identified by point with a precision of 1m regardless of the distance between the sensors mounted on the security fence.
|PLUG & PLAY
The installation is very simple, the sensors can be fitted to the security fence at the required distance and then connected in series with each other, using the cables supplied and fitted with rj45 connectors. The address of each fence sensor will be achieved automatically when the position of each sensor is acquired in sequence during fence detection system start up.
The analysis of each fence sensor is based on “fuzzy” logic rules which allows the fence sensor to establish with accuracy if the detected signal in the fence detection system is attributable to environmental disturbances or if it is a genuine intrusion attempt by a human being against the security fence.
With careful analysis, numerous tests and measurements were made of the types of phenomena created by intrusion attempts that cut or climb different types of fence. These were identified, for the most common types of fence, security fence, electronic fence, pipelines protection systems, and the characteristics that distinguish them from natural events, such as wind and rain, events from adjacent roads or railways, and disturbances created by small animals that accidentally bump into the perimeter fence protection, were isolated. In particular the characteristics of low energy events that must be detected, such as fence cutting, were identified.