Intrusion Detection System - Advanced Creative Technology
Intrusion Detection System - Advanced Creative Technology
16341
page-template,page-template-full_width,page-template-full_width-php,page,page-id-16341,page-child,parent-pageid-16183,bridge-core-2.4.4,ajax_fade,page_not_loaded,,qode-child-theme-ver-1.0.0,qode-theme-ver-22.9,qode-theme-bridge,qode_header_in_grid,wpb-js-composer js-comp-ver-6.3.0,vc_responsive
 

Intrusion Detection System

Intrusion Detection and Perimeter Protection

ACT high-precision AI surveillance technology can effectively filter out up to 99.95% of false alarms, minimizing noise fatigue, unnecessary panic and expenses.
Identifying intruders is primary to all security integrators and providers. False positives or false alarms result in losing confidence in your systems with alert or noise fatigue. ACT AI solutions can eliminate 99% of false alarms by defining the object of interest for monitoring and focus on the zone of intrusion. High performance solutions are required for effective security and Intrusion Detection & Perimeter Protection System (IDS) is the answer.
Identifying intruders is primary to all security integrators and providers. False positives or false alarms result in losing confidence in your systems with alert or noise fatigue. Scylla can eliminate 99% of false alarms by defining the object of interest for monitoring and focus on the zone of intrusion. High performance solutions are required for effective security and Scylla’s Intrusion Detection & Perimeter Protection System (IDS) is the answer.

How It Works

The AI video analytics detects persons or vehicles in a specific zone at a specified time.

It can be seamlessly integrated with your existing security infrastructure, connect to cameras directly and monitor the area real-time 24/7.

Alternatively, it can receive the frames that were detected by the embedded motion detection function, filter those that have a human/vehicle and distribute relevant alerts in case of a detection.

It can track individuals while they are in the view of the camera, run real-time vehicles or people counting at your premises, and report cases of loitering and running in the areas of interest.

How It Works

Scylla AI video analytics detects persons or vehicles in a specific zone at a specified time.

Scylla can be seamlessly integrated with your existing security infrastructure, connect to cameras directly and monitor the area real-time 24/7.

Alternatively, it can receive the frames that were detected by the embedded motion detection function, filter those that have a human/vehicle and distribute relevant alerts in case of a detection.

Scylla can track individuals while they are in the view of the camera, run real-time vehicles or people counting at your premises, and report cases of loitering and running in the areas of interest.

AI supports

Detecting people and vehicles in restricted areas

Effective false alarm filtering

Loitering detection

Parking area violation detection for vehicles

Dwell time tracking

Heatmaps for traffic analysis

Scylla AI supports

Detecting people and vehicles in restricted areas

Effective false alarm filtering

Loitering detection

Parking area violation detection for vehicles

Dwell time tracking

Heatmaps for traffic analysis

What makes ACT Intrusion Detection & Perimeter Protection stand out

Proven accuracy

Flexible alerting system through the web dashboard and mobile application

It can be deployed both on cloud and on-premise

Cloud implementation does not need any additional hardware

It can utilize face recognition technology to identify the intruder

What makes Scylla Intrusion Detection & Perimeter Protection stand out

Proven accuracy

Flexible alerting system through the web dashboard and mobile application

It can be deployed both on cloud and on-premise

Cloud implementation does not need any additional hardware

Scylla can utilize face recognition technology to identify the intruder

FAQ

Can the IDS be integrated into an existing CCTV network?

ACT Intrusion Detection and Perimeter Protection System is one of the most flexible solutions as it can be easily integrated with most VMS and CCTV systems. Depending on the infrastructure the client already has on site, the integration can be implemented one- or two-way.

 

In case of one-way integration, ACT IDS uses video streams from existing cameras directly or through NVR/DVR they are connected to. The analysis output in this case is shown in the dashboard. In case of two-way integration (e.g. with major VMS providers, such as Mobotix, Genetec, NX Witness, etc), the output can be viewed in the corresponding VMS dashboard.

What is the detection response time?

Typically less than a second. In cloud deployments the response time can slightly increase depending on the client’s upload speed.

What objects can the Intrusion Detection and Perimeter Protection detect?

Currently, the objects detected by the IDS include humans and/or several types of vehicles (car, truck, bus, van, motorcycle).

Does Intrusion Detection and Perimeter Protection offer a cloud version?

Yes, it does. Moreover, almost all ACT products can be deployed on the cloud. In the cloud-hosted scenario, the video/frames should be forwarded from CCTV cameras to the cloud in one of the following ways:
1) Using the proprietary ACT Connector software that connects to the camera, takes the video stream, encodes it and sends packet-by-packet to the cloud, where it is further decoded and analysed. This architecture is favored where there are some restrictions (e.g. a domain, port, etc) in the local network.
2) Utilising the embedded algorithms of the camera (i.e motion detection) that send one or several frames, or a video chunk to the cloud through HTTP/FTP and similar protocols. This scenario is favored when the client is looking to minimize their upload bandwidth.
3) By exposing cameras to the cloud directly. This approach is the least popular due to related technical difficulties and security concerns.

Is ACT Intrusion Detection and Perimeter Protection GDPR and CCPA compliant?

Absolutely. ACT does not store any data that can be considered personal. No footage or images are stored. ACT only stores reported alerts. Alert retention times can be adjusted to comply with the regulations you have in place.

How are shadows and moving objects avoided?

ACT Intrusion Detection and Perimeter Protection System works pretty much the way human vision does – Not only does it see “odd” object in the scene, but it also classifies the origin of it. ACT AI is trained on a huge and versatile dataset, therefore, it can effectively recognise humans or different vehicle types. The alarm is formed only if our AI detects one of these objects or parts of it.

What is the definition of a true and false alarm?

An alert is classified as a true alarm when the prediction of AI corresponds with the reality (i.e. the object of interest is correctly identified, the action sought after is detected, etc.). A false positive is the case when the alert is triggered by mistake. Unfortunately, due to the essentially probabilistic nature of AI the latter are inevitable in most cases. However, due to the elaborate AI and machine learning behind ACT IDS, it can meet any level of production-grade industrial standards. Moreover, we are continuously improving ACT modules where they are retrained on mistakes to make sure the number of false alarms goes even further down with time.

What are the recommended camera parameters?

ACT IDS is essentially camera-agnostic. Most questions on the limitations and camera requirements end up receiving a simplified “rule-of-thumb” answer – if a human can see and identify the object of interest, then the IDS AI will also be able to do that (and in some cases will even outperform due to the integrated zooming and re-checking algorithms).

As for the minimal camera parameters, these will depend on your use case and the object of interest you are trying to detect. Of course, the camera should have a digital output or at least be connected to a DVR that has one. ACT Intrusion Detection and Perimeter Protection System can accept pretty much all the variety of stream types, such as RTSP/RTMP, HTTP, etc. Usually the minimum required resolution starts from HD (1280×720) and 5 FPS. Parameters defining the frame/image quality vary from one camera to another, but we recommend looking into such characteristics as bandwidth, encoding, and sharpness, and improving them if necessary. Lastly, if Cloud+FTP implementation is desired, the camera should have a sensitive motion detection function with a possibility of upload to a FTP server of preferably more than one frame.

How long are alerts stored in history?

The duration of alert storage depends on the client’s data retention policy. By default we offer a storage duration of one month, but this period can be configured to correspond to local policies.

Can ACT IDS work on PTZ cameras?

Yes, ACT IDS easily analyzes video feeds from PTZ cameras. It can even be applied on UAV-mounted or body-worn cameras.

Does the system prevent intrusions?

ACT Intrusion Detection and Perimeter Protection System alerts the corresponding security unit/individual about the act of intrusion. The alert contains invaluable visual and meta- information about the origin of the event of intrusion. Moreover, the system can be connected to ACS (Access Control Systems) to lock infrastructures, alert and disable entry protocols, etc.

What is the distance of the intruder detection capabilities?

The limitations here highly depend on the camera specifications (see the Question 8). The most important factor is the resolution and view angle of the camera that eventually result in the pixel size of the object in the frame streamed by the camera. Similarly, factors such as illumination, capture contrast, video streaming parameters (bandwidth/encoding) are to be considered. As a rule of thumb, the distance can be defined as following: if a human can look at the footage and reliably tell that it’s the object of interest (human/vehicle) within the region of interest, then ACT AI should also be able to do so. ACT IDS installed on 4K drone cameras can detect humans at distances of up to ~250m. Alternatively, one can use the following information to define the limitations: the minimum height of a person on the frame should be ~25 pixels, and that’s 1.2% of 4K images.

How will I be notified if I’ve got an intruder?

The notification can reach the end user through one of the alerting pathways, namely:
1) ACT’s dedicated web-based dashboard that shows alerts and allows to configure the system and monitor your environment,
2) Mobile alerting application,
Client’s VMS dashboard (in case it is supported by ACT IDS, e.g. Milestone, Genetec, NX Witness, etc.),
3) Access Control System notifications, i.e. signal lights and sounds attached to alerting relay boards.

Can it work in harsh environments?

ACT IDS is designed to work in challenging environments where cameras with embedded algorithms misperform. The AI engine it runs on compensates for the drawbacks imposed by demanding conditions including but not limited to poor illumination, somewhat corrupted frames, environmental factors and the effects of weather.

Can IDS work with IR/thermal cameras?

Yes, it can, including border control distance IR/thermal cameras. The DRI parameters (Detection, Recognition and Identification) of ACT IDS will depend on the camera characteristics (contrast ratio, pixel crosstalk, etc). But in general, the solution complies with industry standard DRI requirements, i.e. the recognition limit (the distance at which you can determine an object’s class – is it a human or a car, a truck or a tank, etc) is ~15 pixels for humans and vehicles.

Can it have a watchlist in case I want to detect only people who are not whitelisted?

If Face Recognition Module is deployed together with Intrusion Detection and Perimeter Protection System, it can enable white- and blacklisting of individuals detected on site. However, as face recognition module is a standalone solution that is optional for ACT IDS, a few points are to be considered:
1) To run Face Recognition Module you have to provide additional hardware. Face recognition requires additional ~2Gb GPU memory and some computing capacity.
2) Accuracy of Face Recognition Module in “watchlist implementation” highly depends on a number of external factors, such as the visibility of the face of the individual, the size, the angle of it, possible obscurations, etc. While Intrusion Detection can be triggered when even a small part of a body is in the active area, Face Recognition is more demanding. To boost accuracy of Face Recognition in that respect ACT IDS needs to be implemented together with Person Tracking to increase the chances of identification in cases when the individual’s biometrics are visible. However, Person Tracking is a resource demanding algorithm that will require additional hardware.
3) As mentioned above – Face Recognition Module is a separate product that needs to be purchased separately.

GET YOUR QUOTATIONS FROM US

 

Contact us for more inquiries, technical support and
information regarding our system.