Climbing and incidental contact
11170618 · 2021-11-09
Assignee
Inventors
Cpc classification
G08B29/185
PHYSICS
International classification
Abstract
A method of monitoring a fence or other containments barrier for climbing events by an intruder comprises providing a first and second sensors at different heights on the fence, detecting from each of the sensors signals which are indicative of vibration of the fence, and comparing the signals from the first and second sensors to determine vibration events which change in relation to a height of the intruder on the fence indicative of climbing so as to distinguish climbing events from incidental events and to provide a signal in response thereto.
Claims
1. A method of monitoring a containment barrier for climbing events by an intruder comprising: providing a first motion sensor at a first height on the containment barrier; providing a second motion sensor at a second height on the containment barrier different from the first height of the first sensor; the first and second motion sensors providing respective first and second output signals responsive to motion events, which motion events are caused by vibration and/or deflection of the containment barrier generated on the containment barrier by a climbing event of an intruder climbing the containment barrier; detecting a plurality of the motion events over a time period caused by repeated contacts with the containment barrier by the intruder; for each motion event, obtaining using a control system from each of the first and second motion sensors, said first and second output signals which are caused by the motion events on the containment barrier; comparing using the control system the first and second output signals from the first and second motion sensors from a plurality of the motion events; making a selection using the control system from the plurality of motion events of at least one motion event where there is a difference in the first output signal relative to the second output signal caused by a change in height of the motion event on the containment barrier; where the change in height is caused by the climbing event; and in response to said selection of said at least one motion event using the control system to generate a signal indicative of an alarm condition caused by said climbing event by the intruder.
2. The method of claim 1 wherein comparing the output signals from the first and second motion sensors comprises comparing magnitudes of the output signals which change in relation to the height of the intruder on the containment barrier.
3. The method of claim 1 wherein comparing the output signals from the first and second motion sensors comprises comparing portions of frequency spectra of the output signals representing a range of frequencies which are substantially attenuated by passage through a material of the containment barrier.
4. The method of claim 1 wherein the first and second motion sensors comprise a common length of fiber optical cable with a sensor interrogator operatively coupled thereto.
5. The method of claim 1 further including providing a third motion sensor at a third height on the containment barrier different from the first and second heights.
6. The method of claim 1 wherein the first and second motion sensors are operable at different sensitivities so as to distinguish a non-climbing event from said climbing event.
7. The method of claim 1 wherein the containment barrier comprises a fence.
8. The method of claim 1 wherein a single motion event is analyzed by the control system to determine a location of the single motion event on the containment barrier.
9. The method of claim 1 wherein the control system operates also for monitoring of an amplitude of at least one of said first and second output signals of the first and second motion sensors and detecting threshold crossings of the amplitude.
10. The method of claim 1 wherein the control system operates using a time domain discrimination algorithm and a frequency domain algorithm.
11. The method of claim 10 wherein the frequency domain algorithm does a frequency analysis of the first and second output signals, where a frequency envelope is partitioned into multiple sections that correspond to the primary frequencies for each event type.
12. The method of claim 11 wherein the control system uses a combination of events in a multi-dimensional matrix that analyzes one or more of: relative amplitude of each frequency, a duration of each detected event, a repetition rate of said detected event, the period over which this detected event occurs, and the presence or absence of a time domain step function.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The invention will now be described in conjunction with the accompanying drawings in which:
(2)
(3)
(4)
(5)
(6)
(7) In the drawings, like characters of reference indicate corresponding parts in the different figures.
DETAILED DESCRIPTION
(8) With reference to the accompanying drawings, there is disclosed a method of monitoring a fence 1 for climbing events by an intruder 2. On the fence is mounted a first sensor 4 at a first height H1 on the fence, such as relative to a ground surface G, and a second sensor mounted at a second height H2 on the fence different than the height of the first sensor so that the sensors are disposed at spaced locations across the height of the fence 1. In the illustrated arrangement, each of the sensors 4, 5 is formed by a length of fiber optic cable extending substantially horizontally across the fence and carrying a light signal at a prescribed frequency or wavelength which defines a detection medium which is responsive to vibration of the fence 1. The sensors 4, 5 each generate an output signal 6, 7 indicative of vibration of the fence.
(9) With the sensors 4, 5 so provided on the fence 1, both are operatively connected to a computing system 8 comprising a processor 9 and a memory 10, which are operatively interconnected, for detecting and comparing the sensor output signals 6, 7. By comparing the output signals 6, 7, vibration events, which change in relation to a height of the intruder on the fence, can be determined.
(10) More specifically, magnitudes of the signals 6, 7 which change in relation to the height of the intruder 2 can be compared to confirm that it is in fact a climbing event as opposed to for example an animal contacting the fence, which activity typically comprises repeated strikes each generating an event in the signals of the sensors that are similar in magnitude and frequency signature or characteristics. Furthermore, when an intruder climbs a fence, the relative intensity tracks his motion so that the lower sensor signal is stronger than the upper with the relative intensities becoming similar and then reversing as the climbing approaches and crosses the upper sensor. By tracking the relative intensities between the two sensors 4, 5, one can track the progress of the climb by monitoring a series of the vibration events caused by the intruder contacting the fence as they climb. As both sensors 4, 5 are measuring simultaneously, the comparison of relative intensities negates the unevenness of the steps.
(11) Moreover, portions of frequency spectra of the signals 6, 7 representing a range of frequencies which are substantially attenuated by a material of the fence 1 can be compared to detect and track location of the intruder across the height of the fence 1. That is, as different frequencies travel through the fence at different levels of attenuation, the control system can determine motion by analyzing changes in spectra during a climb.
(12) For a fence fabric in which higher frequency vibrations are relatively unattenuated vs lower frequencies, the control system measures the spectra shifting toward the lower frequency when a sensor is approached. Likewise, a fence fabric that transmits lower frequencies more efficiently will see the spectra shift towards the higher frequency.
(13) In
(14) In
(15) In one arrangement, with use of a sensor interrogator capable of determining location of the intrusion, a looped back single fiber is used as both sensors 4, 5. In other words, the first and second sensors comprise a common length of fiber optic cable with a sensor interrogator operatively coupled thereto to determine the signal at different locations along the length of the common cable which are related to the height of the sensor on the fence and hence to the height of the intruder on the fence.
(16) To increase resolution and granularity, more than two sensors can be utilized such that, for example, a third sensor 13 is provided at a third height on the fence 1 different from the first and second heights H1, H2 of the sensors 4, 5 as shown in
(17) Separate wavelengths can be used for the two fibers, that is, the first and second sensors 4, 5 are operable at different sensitivities so as to distinguish a non-climbing event from a climbing event.
(18) Furthermore, the analysis of the output signal 6, 7 at each sensor 4, 5 may be multi-layered so as to further detect and differentiate the type of intrusion event from a false alarm. This detection method lies significantly in a simple monitoring of the sensor and detecting threshold crossings of amplitude. Normally, however, such a method offers no discrimination between different event types such as cut, climb, and wind events.
(19) Thus, the detection method is multi-layered, and layer 1 thereof consists of two algorithms including a time domain discrimination algorithm and a frequency domain algorithm.
(20) The time domain, at its root level, detects the change in amplitude of the detection signal as a function of time. That is, it monitors absolute change over a time slice, as illustrated in
(21) The frequency domain algorithm does a frequency analysis of the signal from each sensor, such as a Fast Fourier Transform. This frequency envelope is partitioned into multiple sections that correspond to the primary frequencies for each event type. That is, prior analysis of each event type to be detected is carried out to determine time and frequency characteristics of the event. For example, crossover points at 50 Hz and 500 Hz, as shown:
(22) This control system utilizes a combination of events in a multi-dimensional matrix that analyzes one or more of: relative amplitude of each frequency, the duration of each detected event, the repetition rate of said event, the period over which this event occurs, and the presence or absence of a time domain step function.
(23) As tabulated below:
(24) TABLE-US-00001 Relative Amplitude per Presence Freq Band Scale 1-10 Event Repetition Repetition of Time F1 F2 F3 F4 FN Duration Rate Period Domain Wind 1-10 1-10 1-10 1-10 1-10 A Sec B Hz C Hz scale 1-10 Climb 1-10 1-10 1-10 1-10 1-10 .sup. L Sec M Hz.sup. N Hz scale 1-10 Cut 1-10 1-10 1-10 1-10 1-10 X Sec Y Hz Z Hz scale 1-10
(25) For example, a person climbing a fence might step every 1.5 second, with an event lasting 500 mS, over the course of several seconds, with a heavy emphasis on the mid frequencies and presence of a time domain step function.
(26) In another example, a person cutting the fence might show a clip every 500 mS, with an event lasting 100 mS, over the course of tens of seconds, with a heavy emphasis in high frequencies and an absence of a step function.
(27) This interaction of the data allows the system to:
(28) 1) Send out alerts that an unknown episode is occurring on the fence as soon as a signal is received indicative of a potential event.
(29) 2) After the appropriate time, the system indicates the type of alert concerned such as cut or climb. This is carried out by the analysis herein wherein signal is analyzed for the frequency and time characteristics of the event type.
(30) 3) The same analysis allows the analysis to exclude certain events as false alarms if they do not meet the frequency and/or time characteristics determined for the event types.
(31) This methodology can be expanded to accommodate other alarms or variables:
(32) The characteristics of the event types can include many or few frequency bands of potentially varying widths.
(33) The time characteristics of each event type can include more granularity in the time domain that monitors attributes such as repetition rate and period, including a multiple step envelope function showing rise, sustain, and fall times and rates.
(34) The arrangement herein is not limited to sensors which generate signals by optical fibers or other conducts and can use other types of sensors which generate a detectable signal in response to other detectable events such as door opening, manhole cover lift, digging a hole.
(35)
(36) The scope of the claims should not be limited by the preferred embodiments set forth in the examples but should be given the broadest interpretation consistent with the specification as a whole.