CCTVIma g e
from the trains but we could also provide train telemetry,” he said, “so train position, train speed, alarms and information management coming from the train system back to control which they had never been able to do before.” Digital Barriers is able to provide 6.25 frames per second at 2CIF resolution across the Wi-Fi networks, either on demand from the con- trol centre or when passengers activate the emergency alarm. Digital Barriers provided the video codec technology, a unique codec approved by Network Rail for use on rail systems in the UK. It also provided the backend video management system to run the operator workstations. Another presentation was given by Marco Tagliabue from Firetide,
based in Italy. Firetide is a manufacturer of wireless mesh networks which aims to be flexible and easily scalable. “The reason our solution is very good for handling video traffic is because we provide very high throughput and very low latency. As you know, video is something that requires real time, and if you have problems on your transmission system, you cannot transmit again a video frame,” he said. “Everything has to be real time, so we provide very low latency which means we can scale up the network and add in very many hops.” Firetide’s largest installation to date is in Seoul, South Korea where
they provide a mesh network covering four lines of the underground network. Using 1500 mesh nodes, he says they are able to provide 20 megabits per second to each train. They are able to stream video from the trains to the security control
centre, but the reason the system was installed in the first place was to be able to transmit video from underground stations into the drivers’ cabs of trains as they moved around the network. This followed the Daegu station fire in 2003, an arson attack on a stationary train which killed 198 people. The fire in the first train was able to spread to a second train which entered the station from the opposite direction. The current CCTV system is designed to transmit video of the upcoming train station to drivers to allow them to see what’s happening in the station before they get there and prevent a repeat of this terrible accident. As trains travel through the network, the monitor in the cab is automatically switched from one station to the next, so the driver can determine whether it is safe to proceed. Another aspect of rail security is protection of stations. Adlan Hussein from CNL demonstrated his company’s analytics and alarm handling procedures with the example of an unattended bag. Using a left luggage algorithm, an alarm is generated which alerts the
CCTV operator to a problem. Following scripted procedures, the sys- tem switches to other nearby cameras in addition to the one that gener- ated the alarm to give the operator more of an overview of the situation. The system then asks the operator to confirm that the bag is indeed unattended. If the operator clicks yes, the system activates a procedure for responding to that type of incident. This could involve directing a response team to the location, issuing an evacuation order and notifying emergency services. “One of the most important parts of the system is the resolution form.
This prompts the operator to make notes about exactly what happened in this incident. It also asks the operator to select a resolution type, so for example in the future if you want to ask where are incidents taking place, how can we manage them better, we can start to build up a picture over time of exactly where these incidents are happening,” Hussein said. “It also allows you to generate a PDF report of every incident which
is date stamped and gives an audit trail of exactly what happened.” The system is designed to guide operators through complex response sequences, to ensure that procedures are being followed. “Mass transit is falling more in line with the likes of airports where
they have lots of regulations about how they use their cameras and their security infrastructure,” he said. “What this is doing is giving them the ability to, number one, ensure the operator actually does what he needs to do and, number two, that they can report all of that back,” he said.
Issue sponsor
www.securitynewsdesk.com
Wint e r 2013 15
|
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36