Bosch introduces new VIP X series of IP network video encoders and decoder
Bosch introduces new VIP X series of IP network video encoders and decoder

Bosch Security Systems’ new VIP X series of IP network MPEG-4 video encoders and decoder offer 4CIF real-time video using less than half the bandwidth and storage space of earlier models. At a maximum frame rate of 30 frames/s, the series’ high-resolution real-time MPEG-4 compressed video offers virtually the same quality as the more space-hungry MPEG-2 compression.  The Flexible MPEG-4 compression algorithm also gives users the choice of different frame rates, ranging from 1 up to the maximum of 30 frames/s, to optimise bandwidth and storage space. The VIP X encoders offer dual-streaming capability which enables them to provide two parallel digital video streams encoded with different video quality settings.  The VIP X1 offers full-motion video for a single camera, while the VIP X2 works with two cameras and offers greater convenience, cost-savings and ease of installation than a separate encoder for each camera.  Both encoders also feature fully-interlaced video, alarm inputs and relay outputs, and pan/tilt/zoom control.The new high-performance Single/Quad Stream VIP XD decoder allows video to be received and displayed on analog or computer VGA monitors.  The cost-effective design features a robust MPEG-4 engine to convert high-quality 4CIF resolution digital-video streams at up to 30 frames/s into analog video for viewing.  The decoder can decode up to 4 streams at once, delivering a quad view on the operator’s monitor. The VIP XD is definitely the most powerful decoder in Bosch’s family of IP products and is compatible with all VIP and VideoJet encoders.   These products are ideal for a wide range of security applications where the highest quality video is needed, bandwidth is limited and storage needs to be saved. Reduced data storage and system costs Seamless integration with existing analog systems Highest resolution video for half the storage (compared with MPEG-2) Single/Quad stream decoding

Add to Compare
Bosch VIP X1 XF single-channel video encoder
Bosch VIP X1 XF single-channel video encoder

The Bosch VIP-X1XF Main Profile encoder delivers real-time H.264 compressed video over IP. Delivering two independent streams per camera, each stream delivers full frame rate at best quality and are adjustable to allow viewing and recording at different quality levels. Equipped with a hardware accelerator for Bosch IVA functions, VIP-X1XF takes Intelligence-at-the-Edge to the next level. Same bandwidth, twice the resolutionThe implementation of main profile encoding gives users the benefit of DVD image quality video (4CIF) at the same bandwidth as MPEG-4 half resolution video (2CIF)*. Furthermore Bosch's low latency implementation of this main profile technology offers all the compression benefits of live video without sacrificing image quality, for top-of-the-line H.264 implementation.Designed for IVADesigned for intelligence from the ground up, VIP-X1XF brings you virtually unlimited performance for best quality video at 25/30 images per second@4CIF and full Intelligent Video Analytics. Adding VIP-X1XF, complete with optional IVA licence, to your existing analogue cameras transforms them into powerful, automated detectors that help operators to stay focused. The encoder brings a new level of automation to your CCTV monitoring. Edge-based, real-time processing instantly identifies and warns security teams of alert conditions, giving them the information they need to act quickly.SD card and iSCI recordingRecord two video streams independently on different media. Video can be recorded centrally on iSCI drives managed by Bosch VRM (Video Recording Manager) and redundantly on local media. If networks fail, Bosch VRM fills in gaps in the central recording via automatic network replenishment (ANR).Bilinx supportWith built-in Bilinx support, VIP-X1XF ensures optimum investment protection when migrating to IP. Existing cameras can stay in place, remote configuration functions and PTZ controls keep working without extra cabling, simply connect the coax to the encoder and its done.BenefitsUltra compact size for easy installation close to the cameraH.264 Main Profile encoding for double the resolution with the same bandwidth requirement*Two independent IP video streams per channel allow viewing and recording at two different quality levels ONVIF compliant, compatibility between manufacturers provides customers with open systemsDesigned for IVA, transforms your analogue cameras into powerful automated detectorsCompatible with Bosch Forensic Search which allows you to scan hours of video in just secondsSet adjustable privacy masks, a major benefit for urban surveillance applicationsDirect to iSCI recording and Bosch VRM support eliminates the need for NVR's, significantly reducing cost of ownershipBosch ANR support enables video recording even during network outages * In comparison to MPEG-4, depending on scene and quality settings    

Add to Compare
Bosch's new VIP X1600 XF series offers decoding as well as encoding functionality
Bosch's new VIP X1600 XF series offers decoding as well as encoding functionality

Multichannel encoders plus new decoder module capable of decoding MPEG-4 and MPEG-2 video streams Second-generation VIP X1600 XF base unit with conventional and fibre network capabilities Bosch Security Systems has added important enhancements to its VIP X1600 video-over-IP series which as well as video encoding functionality now also provides video decoding functionality.  In the VIP X1600 XF series, Bosch has introduced a new switch platform in the rack-mount base unit that accommodates multichannel video and audio encoder modules as well as the new VIP X1600 XFMD decoder modules.  Bosch has also introduced several other enhancements in the VIP X1600 XF base unit.  The two 1 Gbps Ethernet ports on the front of the base unit, originally included to provide network port redundancy, are now supplemented by an additional 1 Gbps Ethernet port on the rear.  This provides a greater choice of network connectivity and allows for easier inside-rack cabling like, for example, direct connection to an iSCSI storage array (Internet Small Computer System Interface).  The new base unit also features a 1 Gbps small form factor pluggable (SFP) optical transceiver slot on the front to enable direct fibre connection to a remote Storage Area Network. As with the original series, the VIP X1600 XF base unit can accommodate up to four encoder modules, with each four analogue video inputs or combined analogue video/audio inputs and redundant power supply.  Additionally, the VIP X1600 XF base unit can accommodate up to four of the new VIP X1600 XFMD multichannel decoder modules featuring four analogue video outputs plus bi-directional audio. Encoder and decoder modules can be mixed and matched within the base unit and the modules are also "hot swappable", allowing modules to be added or exchanged at any time without interrupting transmission to the existing channels. Featuring four analogue BNC video outputs with bi-directional audio, the VIP X1600 XFMD decoder module is capable of decoding up to four MPEG-2 video streams without audio or up to 10 MPEG-4 video streams each at a maximum resolution of 4CIF@25/30 ips.  The decoder can also be set up to display 4 full screen video signals or 2 full screen and 2 quad views.  This allows the 10 MPEG-4 live video streams from a single decoder to be displayed on a compact monitor wall.  If 4 decoder modules are used, the system can serve a monitor wall of up to 16 analogue monitors displaying the live video from up to 40 cameras. Changing the setup and camera selection in small installations is easy with the decoder's highly intuitive web-based user interface (which can be accessed via a video management system).  The system administrator can set up a network scan to identify all cameras on the network, then assign the output of each camera to a specific analogue monitor using either on-screen selection buttons or a drag & drop function.  The interface also features an on-screen auto connect switch that allows the system configuration to be stored and automatically re-established in the event of a power cut to the system or in the event of any network failure.

Add to Compare

Video servers (IP transmission) - Expert commentary

What changes has COVID-19 bought to the installation of VA/PA Systems?
What changes has COVID-19 bought to the installation of VA/PA Systems?

TOA Corporation (UK) Ltd discuss what changes COVID-19 has bought to the installation of VA/PA Systems and how the integration of IP has impacted on that. With a year and a half of global uncertainty, we have seen huge changes in what VA/PA systems will need to deliver in order to provide safe and robust solutions with advanced zone and directional messaging. The impact of COVID has pushed installers to re-think what end-users need long-term to manage any future changes in guidelines especially for large events and complex applications such as travel hubs and how the integration of IP will assist with installing safe systems in the future. Providing public announcements PA/VA has been one of the few parts of our industry that has remained consistent and buoyant during the lockdown. It has been the ideal time for public buildings to upgrade as restrictions did not apply to the construction industry and many installations were actually fast-tracked in the hope that when restrictions lifted commercial properties could open as quickly as possible. PA/VA has been one of the few parts of our industry that has remained consistent This was coupled with the knowledge that changes would have to be made to address the increased demand in providing public announcements outside the standard evacuation messages that most VA/PA have been traditionally used for and enable the impact of having to be flexible to deliver multiple messages. Flexible system management So what is changing? Leading in VA/PA is the availability of IP which enables more flexible system management. It allows installation/solution management engineers to offer remote access to complex systems from a central control room meaning that they can maintain and control systems from one hub and operate for multiple areas on large complex sites such as an airport or stadiums. This provides not only a better level of technical coverage across a whole site but also allows an engineer to monitor and fault find without the delay of waiting to being able to access a specific area. This is especially important for vulnerable applications such as schools and health facilities as it enables them to control and reduce the amount of interaction with engineers they need to give physical access to – therefore reducing risk. Potentially less maintenance This makes it more financially viable for both the end-user and the maintenance provider Long-term, IP also makes these systems much more cost-effective. For example, one engineer can manage a hub of multiple locations with potentially less maintenance call-out costs. This makes it more financially viable for both the end-user and the maintenance provider to justify the initial investment. With these systems being paramount to people’s safety remote intervention allows for swift fault finding and problem resolution in a more effective response time and cost-effective way. To enable this the biggest development has been the integration between product manufacturers and software developers. They have been able to collaborate greatly to get products such a horn speakers to connect via industrial standard network protocols giving much greater flexibility in remote system management. Multi-rack systems The technology involved in VA/PA, especially integrating with IP, has seen huge growth recently and we are involved in projects that involve multi-rack systems to enable controlled zone management and evacuation options with greater collaboration between integrators to get the systems to work effectively. VA/PA systems must be at the forefront of long term solutions and sustainability As more people are allowed to gather in larger numbers public-facing buildings need to address their evacuation and voice announcement procedures in order to be compliant. They need to be able to deliver clear and effective messages to their visitors in order to remain open whenever guidelines change. VA/PA systems must be at the forefront of long-term solutions and sustainability. The other area of VA/PA that has changed immensely in the last 18 months is the vast difference in messaging requirements that organisations need. Public safety announcements Systems that have been used infrequently for emergency situations only are now delivering daily messages with public safety announcements. In reality, although we all hope that we will never go back to the peak of lockdown, installations must be robust to cope with any situation in the future. Many smaller spaces that wouldn’t have thought they would need a PA system at all now understand that they too have an obligation to deliver public information and guidance and on a regular daily basis and this will lead to system designs being scaled up and down to meet the broadening array of applications that require VA/PA and how this is managed in the event that new protocols have to be introduced. Detailed technical plans Systems should be certified on the European Standard EN 54-16 and should be expertly designed Design and planning should be key when sourcing the right solution. Systems should be certified on the European Standard EN 54-16 and should be expertly designed to specification with detailed technical plans and tailor-made to the requirements of the end-user. With people’s safety in your hands, you cannot get these systems wrong so it is important that installers are able to draw on the expert technical team resources that we, as a manufacturer, offer in adhering to this standard and for us to be able to provide a commissioning service to sign off on these important safety systems. Compared with traditional lights and sounders systems we believe the future of evacuation will be voice-based. In our ever-increasing culturally diverse world we have to embrace systems that need to be multi-lingual or be able to dedicate a message to a specific target audience and be able to be drilled down to zones and give much more directional information. Multi-zoned academies As office buildings get taller, health facilities become super hospitals or schools upgrade into multi-zoned academies we have to be able to evacuate or hold back evacuation to enable safe crowd control. In order to facilitate this VA will have to replace traditional systems or work in tandem with them. We must point out that in residential high-rise properties the primary method of evacuation, to comply to BS 8629, would still be traditional lights and sounders even if you install a separate VA system. Voice Alarm and Public Address is a long-term investment, especially as the global situation may take many years to recover, and as manufacturers working with our integrators and software developers we must continue to lead in the development of the best systems to ensure we can keep everyone safe.

Securing mobile vehicles: The cloud and solving transportation industry challenges
Securing mobile vehicles: The cloud and solving transportation industry challenges

Securing Intelligent Transportation Systems (ITS) in the transportation industry is multi-faceted for a multitude of reasons. Pressures build for transit industry players to modernise their security systems, while also mitigating the vulnerabilities, risks, and growth-restrictions associated with proprietary as well as integrated solutions. There are the usual physical security obstacles when it comes to increasingly integrated solutions and retrofitting updated technologies into legacy systems. Starting with edge devices like cameras and intelligent sensors acquiring video, analytics and beyond, these edge devices are now found in almost all public transportation like buses, trains, subways, airplanes, cruise lines, and so much more. You can even find them in the world’s last manually operated cable car systems in San Francisco. The next layer to consider is the infrastructure and networks that support these edge devices and connect them to centralized monitoring stations or a VMS. Without this layer, all efforts at the edge or stations are in vain as you lose the connection between the two. And the final layer to consider when building a comprehensive transit solution is the software, recording devices, or viewing stations themselves that capture and report the video. The challenge of mobility However, the transportation industry in particular has a very unique challenge that many others do not – mobility. As other industries become more connected and integrated, they don’t usually have to consider going in and out or bouncing between networks as edge devices physically move. Obviously in the nature of transportation, this is key. Have you ever had a bad experience with your cellular, broadband or Wi-Fi at your home or office? You are not alone. The transportation industry in particular has a very unique challenge that many others do not – mobility Can you trust these same environments to record your surveillance video to the Cloud without losing any frames, non-stop 24 hours a day, 7 days a week, 365 days a year? To add to the complexity – how do you not only provide a reliable and secure solution when it’s mobile, travelling at varying speeds, and can be in/out of coverage using various wireless technologies? Waiting to upload video from a transport vehicle when it comes into port, the station, or any centralised location is a reactive approach that simply will not do any longer. Transit operations require a more proactive approach today and the ability to constantly know what is going on at any given time on their mobile vehicles, and escalate that information to headquarters, authorities, or law enforcement if needed; which can only occur with real-time monitoring. This is the ultimate question when it comes to collecting, analysing, and sharing data from mobile vehicles – how to get the video from public transportation vehicles alike to headquarters in real time! Managing video data In order to answer this question, let’s get back to basics. The management and nature of video data differs greatly from conventional (IT) data. Not only is video conducted of large frames, but there are specific and important relationships among the frames and the timing between them. This relationship can easily get lost in translation if not handled properly. This is why it’s critical to consider the proper way to transmit large frames while under unstable or variable networks. The Internet and its protocols were designed more than two decades ago and purposed for conventional data. Although the Internet itself has not changed, today’s network environments run a lot faster, expand to further ranges, and support a variety of different types of data. Because the internet is more reliable and affordable than in the past some might think it can handle anything. However, it is good for data, but not for video. This combination makes it the perfect time to convert video recording to the Cloud! Video transmission protocol One of the main issues with today’s technology is the degradation of video quality when transmitting video over the Internet. ITS are in dire need for reliable transmission of real-time video recording. To address this need a radical, yet proven, video transmission protocol has recently been introduced to the market. It uses AI technology and to adapt to different environments in order to always deliver high quality, complete video frames. This protocol, when equipped with encryption and authentication, enables video to be transmitted reliably and securely over the Internet in a cloud environment. One of the main issues with today’s technology is the degradation of video quality when transmitting video over the Internet Finally, transportation industry has a video recording Cloud solution that is designed for (massive) video that can handle networks that might be experiencing high error rate. Such a protocol will not only answer the current challenges of the transportation industry, but also make the previously risky Cloud environment safe for even the most reserved environments and entities. With revolutionary transmission protocols, the time is now to consider adopting private Cloud for your transportation operations.

Trends and challenges we will see in the AI-driven security space in 2021
Trends and challenges we will see in the AI-driven security space in 2021

For decades, the nature of global safety has been evolving. From physical security threats like large-scale terrorist attacks and lone actor stabbings to chemical threats such as the Salisbury poisonings and even microbiological threats such as COVID-19, new challenges are constantly arising and the threat landscape we operate in today is constantly changing. Compounding the complexity of the security issues is the complexity and nature of attacks. With the economic downturn, there is the traditional rise in theft, violence and other crimes. Compound this with unmanned businesses and work-at-home staff, and there is a perfect storm for a rise in security threats. Artificial intelligence (AI) and specifically the branch of AI known as machine learning (ML), was already causing widespread disruption in many industries, including the security industry. AI has been a driving force to replace labour-based business models with integrated data and actionable intelligence that is context-aware. It has become apparent that AI will play a big part in the ongoing fight against both pandemics such as COVID-19, as well as other threats that we may face in the future. With all of this in mind, 2021 is poised to be a big year for AI growth. While AI is going to continue to impact our lives in dozens of ways, from smart sensors to face mask compliance detection, the following reflects a few top trends and challenges that I have my eye on for 2021 as we close out this year. The rise of smart city investments One such example is the increasing development of smart cities and how AI can be leveraged to build safe communities. To date, we’ve seen an increase in the number of smart city programmes around the globe; cities that are beginning to deploy innovative technologies for the management and ease of life services. Compounding the complexity of the security issues is the complexity and nature of attacks Typical development of a city includes standard infrastructure - roads, schools, power, water, transportation. Now, internet, data and AI capabilities are part of the standard infrastructure requirements for all new developments. AI promises to deliver increased efficiencies with the infrastructure that will accommodate growing populations while reducing our impact on the environment, resources, and communities. Global cities now account for more than half of the world’s population, and the United Nations projects the number to balloon to 68% by mid-century. Owing to both demographic shifts and overall population growth, that means that around 2.5 billion people could be added to urban areas by the middle of the century, predicts the UN Department of Economic and Social Affairs (DESA). With an increase in population has come an increase in global spending on smart city initiatives to drive down the impact of growing urban concentration. Global spending on smart city initiatives is expected to total nearly $124 billion this year, an increase of 18.9% over 2019, according to IDC's Worldwide Semiannual Smart Cities Spending Guide, while Singapore, Tokyo, London and New York as the big spenders - expected to spend more than $1 billion in 2020. Using AI-driven technology to create safer public and private spaces Today, security solutions driven by AI are being developed and can be covertly deployed across a range of physical environments to protect the population in a more efficient, and accurate manner. As we look ahead to the future of public safety, it’s clear that new AI technology can dramatically improve the effectiveness of today’s physical security space. One such deployment is the use of video object recognition/computer vision software that can be integrated into existing video monitoring security (VMS) systems. These enhanced VMS systems can be deployed both inside and outside of buildings to identify risks and flag threats, such weapons, aggressive behaviours, theft, and safety compliance. This helps to minimise the impact of a breach by an early alert to onsite security in real-time to the location and nature of the potential threat, allowing them to intervene before a loss occurs. These same AI-enabled video solutions can similarly be used to provide advanced business operations in retail, logistics, and manufacturing organisations. Multi-sensor security solutions Also, targeted magnetic and radar sensor technologies, concealed in everyday objects like planter boxes or inside walls, can now scan individuals and bags entering a building for concealed threat objects. Using AI/machine learning, these two sensor solutions combined can identify metal content on the body and bag and match the item to a catalogue of threat items, such as guns, rifles, knives and bombs. Security solutions driven by AI are being developed and can be covertly deployed across a range of physical environments Without this advanced multi-sensor solution, it becomes nearly impossible to discover a weapon on a person's body before it appears in an assailant’s hands. This multi-sensor solution allows for touchless, unobtrusive access to a building, but allows for immediate notification to onsite security when a concealed threat is detected. The hidden technology thus empowers security staff to intercept threats before they evolve into a wider scale attack, while also maintaining the privacy and civil liberties of the public, unless, of course, they are carrying a concealed weapon or pose a physical threat. With the advent of sophisticated surveillance and technological innovation, a level of caution must be exerted. Despite the ongoing global debate, there remains little regulation about the use of AI technologies in today’s physical security space. One thing is certain; it must be deployed in the right place, at the right time, with the right privacy and civil liberty protection objectives. People don’t want to be protected by omnipresent, obstructive and overbearing security systems that infringe on their privacy and civil liberties. They want a proper balance between security and their current way of life, one that must be fused together. Technology and tracing COVID-19 Machine learning-based technologies are playing a substantial role in the response to the COVID-19 pandemic. Traditionally, the key purpose of surveillance systems has been to detect and deter threats, including the detection of visible and hidden weapons and abnormal behaviour. While this, of course, remains a primary focus, today we are seeing how surveillance systems defend against new invisible threats, as well as rapidly automate the process of contact-tracing to capture and contain a virus before it spreads. Again, the ability to track and trace through parsing algorithms that can manage through enormous amounts of data provides a highly scalable and rapid response mechanism to control the spread of threats. AI has demonstrated potential for identifying those displaying symptoms of infectious diseases, without requiring physical human contact Although the threat may not be visible, it is just as destructive. By incorporating AI into existing technologies, government, healthcare and security professionals can monitor public spaces and environments through the combined use of digital and thermal video surveillance cameras and video management systems); just one of the solutions being explored. AI has demonstrated potential for identifying those displaying symptoms of infectious diseases, without requiring physical human contact. By Using AI-powered video analytic software, businesses can monitor face masks, social distancing and large gathering compliance and also detect elevated body temperature. Critically, technology must be capable of both identifying and tracking the virus but also be unobtrusive. An unobtrusive system that is adaptable enough to be deployed across a range of environments where the public gathers in enclosed spaces is necessary to be effective. Security in 2021 Technology has proven itself to be a valuable ally in times of crisis. For smart cities, the use of innovative AI/machine learning technologies will help optimise security solutions in areas that are brimming with potential. As we look ahead to the future of security in a world that is impacted by such a wide range of threats, from physical to chemical to microbiological, it’s clear that new technologies, specifically AI can dramatically improve the effectiveness of security systems and help us to better defend against a wide spectrum of threats. Technology has a huge role to play in making our communities safe in 2021 and beyond, but for security systems to be effective, they must not be oppressive or obstructive. This will ensure they have the full support of the public - the key to success.

Latest Bosch Security Systems news

Sensor data fusion for more reliable intrusion alarm systems
Sensor data fusion for more reliable intrusion alarm systems

Intrusion alarm systems are currently facing a growing number of potential error sources in the environment. At the same time, alarm systems must comply with increasingly demanding legal requirements for sensors and motion detectors. As a future-proof solution, detectors equipped with Sensor Data Fusion technology raise the level of security while reducing the risk of cost- and time-intensive false alarms. This article provides a comprehensive overview of Sensor Data Fusion technology. Anti-masking alarms A cultural heritage museum in the South of Germany for decades, the installed intrusion alarm system has provided reliable protection on the premises. But suddenly, the detectors trigger false alarms every night after the museum closes. The system integrators are puzzled and conduct extensive tests of the entire system. When they finally identify the culprit, it’s unexpected: As it turns out, the recently installed LED lighting system in the museum’s exhibition spaces radiates at a wavelength that triggers anti-masking alarms in the detectors. Not an easy fix situation, since a new lighting system would prove far too costly. Ultimately, the integrators need to perform extensive detector firmware updates and switch to different sensor architecture to eliminate the error source.  This scenario is by no means an isolated incident, but part of a growing trend. Need for reliable detector technology Legal requirements for anti-masking technology are becoming stringent in response to tactics by criminals The number of potential triggers for erroneous alarms in the environment is on the rise. From the perspective of system operators and integrators, it’s a concerning development because every false alarm lowers the credibility of an intrusion alarm system. Not to mention steep costs: Every false call to the authorities comes with a price +$200 tag.   Aside from error sources in the environment, legal requirements for anti-masking technology are becoming more stringent in response to ever more resourceful tactics employed by criminals to sidestep detectors. What’s more, today’s detectors need to be fortified against service outages and provide reliable, around-the-clock operability to catch intruders in a timely and reliable fashion. Sensor Data Fusion Technology In light of these demands, one particular approach has emerged as a future-proof solution over the past few years: Sensor Data Fusion technology, the combination of several types of sensors within one detector – designed to cross-check and verify alarm sources via intelligent algorithms – holds the keys to minimising false alarms and responding appropriately to actual alarm events. This generation of detectors combines passive infrared (PIR) and microwave Doppler radar capabilities with artificial intelligence (AI) to eliminate false alarm sources without sacrificing catch performance. Motion detectors equipped with Sensor Data Fusion technology present a fail-proof solution for building security “It’s not about packing as many sensors as possible into a detector. But it’s about including the most relevant sensors with checks and balances through an intelligent algorithm that verifies the data for a highly reliable level of security. The result is the highest-possible catch performance at the minimum risk for erroneous alarms,” said Michael Reimer, Senior Product Manager at Bosch Security Systems. Motion detectors with sensor data fusion Looking ahead into the future, motion detectors equipped with Sensor Data Fusion technology not only present a fail-proof solution for building security. The comprehensive data collected by these sensors also unlock value beyond security: Constant real-time information on temperature and humidity can be used by intelligent systems and devices in building automation. Integrated into building management systems, the sensors provide efficiency improvements and lowering energy costs Integrated into building management systems, the sensors provide the foundation for efficiency improvements and lowering energy costs in HVAC systems. Companies such as Bosch support these network synergies by constantly developing and optimising intelligent sensors. On that note, installers must be familiar with the latest generation of sensor technology to upgrade their systems accordingly, starting with a comprehensive overview of error sources in the environment. Prominent false alarm triggers in intrusion alarm systems The following factors emerge as frequent triggers of false alarms in conventional detectors: Strong temperature fluctuations can be interpreted by sensors as indicators of a person inside the building. Triggers range from floor heating sources to strong sunlight. In this context, room temperatures above 86°F (30°C) have proven particularly problematic. Dust contamination of optical detectors lowers the detection performance while raising susceptibility to false alarms. Draft air from air conditioning systems or open windows can trigger motion sensors, especially when curtains, plants, or signage attached to the ceilings (e.g. in grocery stores) are put in motion. Strong light exposure directly on the sensor surface, e.g. caused by headlights from passing vehicles, floodlights, reflected or direct sunlight – all of which sensors may interpret as a flashlight from an intruder. Extensive bandwidth frequencies in Wi-Fi routers can potentially confuse sensors. Only a few years ago, wireless routers operated on a bandwidth of around 2.7GHz while today’s devices often exceed 5GHz, thereby catching older detectors off guard. LED lights radiating at frequencies beyond the spectrum of visible light may trigger sensors with their infrared signals. Regarding the last two points, it’s important to note that legislation provides clear guidelines for the maximum frequency spectrum maintained by Wi-Fi routers and LED lighting. Long-term security But the influx of cheap and illegal products in both product groups – products that do not meet the guidelines – continues to pose problems when installed near conventional detectors. For this reason, Sensor Data Fusion technology provides a reliable solution by verifying alarms with data from several types of sensors within a single detector. Beyond providing immunity from false alarm triggers, the new generation of sensors also needs to comply with the current legislature. These guidelines include the latest EN50131-grade 3, and German VdS class C standards with clear requirements regarding anti-masking technology for detecting sabotage attempts. This is exactly where Sensor Data Fusion technology provides long-term security. Evolution of intrusion detector technology Initially, motion detectors designed for intrusion alarm systems were merely equipped with a single type of sensor; namely passive infrared technology (PIR). Upon their introduction, these sensors raised the overall level of building security tremendously in automated security systems. But over time, these sensors proved limited in their catch performance. As a result, manufacturers began implementing microwave Doppler radar capabilities to cover additional sources of intrusion alarms. First step detection technology In Bosch sensors, engineers added First Step detection to trigger instant alarms upon persons entering a room Over the next few years, sensors were also equipped with sensors detecting visible light to catch flashlights used by burglars, as well as temperature sensors. In Bosch sensors, engineers added proprietary technologies such as First Step detection to trigger instant alarms upon persons entering a room. But experience in the field soon proved, especially due to error sources such as rats and other animals, that comprehensive intrusion detection demands a synergetic approach: A combination of sensors aligned to cross-check one another for a proactive response to incoming signals. At the same time, the aforementioned bandwidth expansion in Wi-Fi routers and LED lighting systems required detectors to implement the latest circuit technology to avoid serving as ‘antennas’ for undesired signals. Sensor data fusion approach At its very core, Sensor Data Fusion technology relies on the centralised collection of all data captured by the variety of different sensors included in a single detector. These data streams are directed to a microprocessor capable of analysing the signals in real-time via a complex algorithm. This algorithm is the key to Sensor Data Fusion. It enables the detector to balance active sensors and adjust sensitivities as needed, to make truly intelligent decisions regarding whether or not the data indicates a valid alarm condition – and if so, trigger an alarm. Advanced verification mechanisms The current generation of Sensor Data Fusion detectors, for instance from Bosch, feature advanced verification mechanisms, including Microwave Noise Adaptive Processing to easily differentiate humans from false alarm sources (e.g. ceiling fans or hanging signs). For increased reliability, signals from PIR and microwave Doppler radar are compared to determine whether an actual alarm event is taking place. Additionally, the optical chamber is sealed to prevent drafts and insects from affecting the detector, while the detector is programmed for pet and small animal immunity. Sensor cross-verification Further types of sensors embedded in current and future generations of Sensor Data Fusion detectors include MEM-sensors as well as vibration sensors and accelerometers. Ultimately, it’s important to keep in mind that the cross-verification between sensors serves to increase false alarm immunity without sacrificing the catch performance of actual intruders. It merely serves to cover various indicators of intrusion. Protecting UNESCO World Cultural Heritage in China Intelligent detectors equipped with Sensor Data Fusion are protecting historic cultural artifacts in China from theft and damage. At the UNESCO-protected Terracotta Warriors Museum site, one hundred TriTech motion detectors from Bosch with PIR and microwave Doppler radar technology safeguard the invaluable treasures against intruders. To provide comprehensive protection amid the specific demands of the museum site, the detectors have been installed on walls and ceilings to safeguard the 16,300-square-meter museum site. To ensure an optimal visitor experience without interference from glass walls and other barriers, many detectors are mounted at a height of 4.5 meters (15 feet) above ground under the ceiling. Despite their height, the detectors provide accurate data around the clock while exceeding the performance limits of conventional motion detectors, which clock out at a mere 2 meters (6 feet) catchment area. Integrated video systems The site also presents additional error sources such as large amounts of dust that can contaminate the sensors, as well as visitors accidentally dropping their cameras or mobile phones next to museum exhibits. To distinguish these events from actual criminal activity, the intrusion alarm system is integrated with the museum’s video security system. This allows for verifying alarm triggers with real-time video footage at a fast pace: In the case of an actual alarm event, the system alerts the on-site security personnel in the control room in less than two seconds. Added value beyond security Sensor Data Fusion technology provides a viable solution for the rising number of error sources in the environment As of today, Sensor Data Fusion technology already provides a viable solution for the rising number of error sources in the environment while providing legally compliant building security against intruders. In light of future developments, operators can leverage significant added value from upgrading existing systems – possibly without fundamentally replacing current system architecture – to the new detector standard. Added value how? On one hand, the detectors can integrate with access control, video security, voice alarm, and analytics for a heightened level of security. These synergetic effects are especially pronounced on end-to-end platforms like the Bosch Building Management system. On the other hand, the data streams from intelligent detectors also supply actionable intelligence to building automation systems, for instance as the basis for efficiency improvements and lowering energy consumption in HVAC systems. New backward-compatible detectors Bosch will release a new series of commercial detectors by end of 2021, based on the latest research on risk factors for false alarm sources in the environment and line with current legislation and safety standards. Throughout these developments, installers can rest assured that all new detectors are fully backward compatible and work with existing networking/architecture. With that said, Sensor Data Fusion technology emerges as the key to more secure intrusion alarm systems today and in the future. TriTech detectors from Bosch For reliable, fail-proof alarms the current series of TriTech detectors from Bosch relies on a combination of different sensor data streams, evaluated by an integrated algorithm. These Sensor Data Fusion detectors from Bosch combine up to five different sensors in a single unit, including: Long-range passive infrared (PIR) sensor Short-range PIR sensor Microwave sensor White light sensor Temperature sensor Equipped with these sensors, TriTech detectors are capable of detecting the most frequent sources of false alarms; from headlights on passing cars to a mouse passing across the room at a 4.5-meter distance to the detector. What’s more, TriTech detectors provide reliable performance at room temperatures above 86°F (30°C) while fully guarding against actual intrusion and sabotage attempts from criminals.

LENSEC integrates PVMS with Bosch’s intrusion panel
LENSEC integrates PVMS with Bosch’s intrusion panel

LENSEC is proud to announce the integration of their Perspective Video Management Software (PVMS)® with Bosch’s Intrusion Control Panels (B and G Series). This new partnership allows security operators to manage intrusion, fire, and access control systems while monitoring video surveillance cameras from behind one pane of glass. Through the integration, operators can view events issued by the panel, such as gas, fire, and burglar alarms, and send commands to the connected device. Supported commands include the arming and disarming of devices, activating and silencing bells, bypassing points, and more. This integration places alarm monitoring, device control, and event reaction into one intuitive interface, eliminating the need for multiple monitoring points. Bosch Intrusion Panel Most importantly, all applicable events and actions are available from a unified security platform provided by the Perspective Video Management Software. The ability to bring control of disparate systems into a single, browser-based application delivers critical time-saving advantages. By leveraging the capabilities of the Bosch Intrusion Panel and the existing monitoring, reporting, and analytic features provided by PVMS, security operators can manage multiple life-safety programs from one visual interface. “We are excited about the integration between PVMS and Bosch’s intrusion panels because it will no doubt make things easier for security operators,” said Michael Trask, Director of North American Sales for LENSEC. “What was once managed from three or four different platforms is now available under one system. This integration aligns with both LENSEC’s and Bosch’s goal of providing easy-to-use solutions for our clients.”

Global MSC Security announces that Peter Goodman will share how home office ACE initiative addresses public safety
Global MSC Security announces that Peter Goodman will share how home office ACE initiative addresses public safety

Global MSC Security announces that former Chief Constable of Derbyshire Constabulary and now a Strategic Advisor to the Home Office’s Accelerated Capability Environment (ACE) initiative, Peter Goodman OBE QPM, will participate in the Global MSC Security Conference and Exhibition 2021. The event takes place in Bristol on Tuesday 19th October and this year focuses on the use of artificial intelligence in the surveillance industry. During his 33 years’ service working across three police forces, Peter Goodman OBE QPM was also the National Police Chiefs’ Council lead for cybercrime, as well as leadership roles focused on counter-terrorism, forensics, and tackling serious and organised crime nationally. Right business processes At the Global MSC Security Conference and Exhibition 2021, he will share insights into his work at ACE - a Home Office initiative within the Homeland Security Group that solves public safety and security challenges, arising from rapidly changing digital and data technologies. Peter Goodman OBE QPM states: “With over 300 commissions under our belt, ACE has demonstrated that the public sector can be at the cutting edge of innovation and match the pace of the best innovators with the right business processes and the very best partners.” ACE has demonstrated that the public sector can be at the cutting edge of innovation" He joins a high calibre programme of speakers that includes Fraser Sampson, the Commissioner for the Retention and Use of Biometric Material and Surveillance Camera Commissioner; Philip Ingram MBE of Grey Hare Media; Professor Martin Innes, Director, Crime and Security Research Institute at Cardiff University and Director of the Universities' Police Science Institute; Louise Stapleton, Counter Terrorism Security Advisor at Avon & Somerset Police, and Professor James Ferryman from the University of Reading. Solving security challenges Derek Maltby, MD of Global MSC Security states: “The Global MSC Security Conference and Exhibition stands alone in its ability to bring together national and local government, policing, academia and the private sector to address and advance the challenges and opportunities facing the surveillance industry, of which artificial intelligence presents both. I am looking forward to learning about Peter’s perspective through his work with ACE.” The Global MSC Security Conference and Exhibition takes place on Tuesday 19th October 2021 at The Bristol Hotel in Bristol City Centre, from 9 am until 3.30 pm. The event is sponsored by Genetec, Synectics, Bosch, 360 Vision, Milestone, and DSSL Group. The chosen charity for this year is Meningitis Now.

Related white papers

Choosing the right storage technology for video surveillance

Delivering a smart, secure and healthy workplace with cloud

Security investments retailers should consider for their 2021 budget