ArticlePDF Available

Nuisance alarm suppression techniques for fibre-optic intrusion detection systems

Authors:

Abstract and Figures

The suppression of nuisance alarms without degrading sensitivity in fibre-optic intrusion detection systems is important for maintaining acceptable performance. Signal processing algorithms that maintain the POD and minimize nuisance alarms are crucial for achieving this. A level crossings algorithm is presented for suppressing torrential rain-induced nuisance alarms in a fibre-optic fence-based perimeter intrusion detection system. Results show that rain-induced nuisance alarms can be suppressed for rainfall rates in excess of 100 mm/hr, and intrusion events can be detected simultaneously during rain periods. The use of a level crossing based detection and novel classification algorithm is also presented demonstrating the suppression of nuisance events and discrimination of nuisance and intrusion events in a buried pipeline fibre-optic intrusion detection system. The sensor employed for both types of systems is a distributed bidirectional fibre-optic Mach Zehnder interferometer.
Content may be subject to copyright.
PROCEEDINGS OF SPIE
SPIEDigitalLibrary.org/conference-proceedings-of-spie
Nuisance alarm suppression
techniques for fibre-optic intrusion
detection systems
Seedahmed S. Mahmoud
Yuvaraja Visagathilagar
Jim Katsifolis
Downloaded From: https://www.spiedigitallibrary.org/conference-proceedings-of-spie on 8/21/2017 Terms of Use: https://spiedigitallibrary.spie.org/ss/TermsOfUse.aspx
Nuisance alarm suppression techniques for fibre-optic intrusion
detection systems
Seedahmed S. Mahmoud, Yuvaraja Visagathilagar and Jim Katsifolis
Future Fibre Technologies Pty Ltd.
10 Hartnett Close, Mulgrave, VIC 3170, Australia
ABSTRACT
The suppression of nuisance alarms without degrading sensitivity in fibre-optic intrusion detection systems is important
for maintaining acceptable performance. Signal processing algorithms that maintain the POD and minimize nuisance
alarms are crucial for achieving this. A level crossings algorithm is presented for suppressing torrential rain-induced
nuisance alarms in a fibre-optic fence-based perimeter intrusion detection system. Results show that rain-induced
nuisance alarms can be suppressed for rainfall rates in excess of 100 mm/hr, and intrusion events can be detected
simultaneously during rain periods. The use of a level crossing based detection and novel classification algorithm is also
presented demonstrating the suppression of nuisance events and discrimination of nuisance and intrusion events in a
buried pipeline fibre-optic intrusion detection system. The sensor employed for both types of systems is a distributed
bidirectional fibre-optic Mach Zehnder interferometer.
Keywords: Event classification, fibre-optic sensor, high traffic volume, intrusion detection, nuisance alarms
1. INTRODUCTION
In recent years, high performance distributed fibre-optic sensors have been applied to both outdoor and buried intrusion
detection systems. The success of any intrusion detection system depends on three important performance parameters:
the probability of detection (POD), the nuisance alarm rate (NAR), and the false alarm rate (FAR). The POD provides an
indication of a system’s ability to detect an intrusion. A nuisance alarm is any alarm which is not generated by an event
of interest. Nuisance alarms are typically generated by environmental sources such as rain, wind, snow, wildlife and
vegetation, as well as man-made sources such as traffic crossings, industrial noises and other ambient noise sources.
Since increasing the sensitivity of an intrusion detection system to achieve a high POD will also increase its sensitivity to
nuisance events, signal processing algorithms that maintain the POD and eliminate or minimize nuisance alarms are
crucial in perimeter intrusion detection systems1. The most important challenge for a distributed fibre-optic intrusion
detection system is to minimize the NAR without compromising the system sensitivity or POD for a wide range of
operating environments. The minimization of the NAR of any intrusion detection system, and indeed of any sensing
system, is therefore critical for its successful performance and confidence of operation.
A number of sensor related signal processing algorithms have been presented in the literature for suppressing nuisance
alarms. Jiang et al2 proposed a classification method for a MZ interferometric sensor using wavelet packet transform for
denoising and feature extraction and implemented a neural network as a classifier. This method however would not be
suitable to eliminate nuisance alarms due to torrential rain as the sensor’s signal amplitude would be saturated in the time
domain. Vries3 proposed an acoustic based perimeter intrusion classification system that deploys a neural network with
frequency domain features to detect different types of intrusion events such as climbing, cutting and jumping over the
fence. The system however suffers from performance degradation when the quality of the sound (SNR) generated by the
intruders and the surrounding environment decreases. Moreover, the frequency domain features are not robust enough to
distinguish between nuisance and intrusion events.
smahmoud@fftsecurity.com; phone +61 3 9590-3100; fax +61 3 9560-8000; www.fftsecurity.com
Third Asia Pacific Optical Sensors Conference, edited by John Canning, Gangding Peng,
Proc. of SPIE Vol. 8351, 83513J · © 2012 SPIE · CCC code: 0277-786X/12/$18 · doi: 10.1117/12.915950
Proc. of SPIE Vol. 8351 83513J-1
Downloaded From: https://www.spiedigitallibrary.org/conference-proceedings-of-spie on 8/21/2017 Terms of Use: https://spiedigitallibrary.spie.org/ss/TermsOfUse.aspx
Yousefi et al4 presented a fence breach detection system which can detect activity on the fence and discriminate different
types of activity. The hardware of the system comprises a 3-axis accelerometer and a RISC microprocessor. The system
employs an algorithm that detects activity and non-activity on the fence. It also recognizes the type of breach whether it
is due to rattling caused by strong wind or a person climbing on the fence. This system uses signal variation features
along with the energy of two bandpass filters to separate the rattle and climb frequency components. While this shows
some success, it is not possible to discriminate between classes that have a similar impact on a fence. Moreover, this
algorithm is used to classify a small number of classes (limited to two classes). Min et. al5 proposed a real-time
monitoring system using an audio sensor to detect abnormal activities in the vicinity of buried gas pipes. They extracted
a frequency domain feature using a nonlinear scale filter bank method and cepstral mean subtraction along with a
combination of two classifiers using a Gaussian mixture model and multi-layer perceptron. Their system achieved a 92%
detection rate to abnormal activities such as hammer drilling and digging. The detection rate of intrusion was however
degraded in the presence of background noise such as traffic in the vicinity of the sensor.
In this paper, signal processing algorithms are presented for suppressing nuisance alarms in both outdoor fence-mounted
and buried fibre-optic intrusion detection systems. The use of a real-time level crossing algorithm to suppress rain-
induced nuisance alarms and discriminate between continuous nuisance and non-continuous intrusion events in perimeter
intrusion detection systems is presented. The use of a level crossing based detection method and novel classification
algorithm is also presented for the suppression and discrimination of nuisance events from intrusion events in a buried
intrusion detection system. Results are shown from real systems.
2. FIBRE OPTIC INTRUSION DETECTION SYSTEM
The intrusion detection system used in this work is based on the Future Fibre Technologies Microstrain Locator
technology as applied to fence perimeter and pipeline security applications6. The Microstrain Locator is based on the use
of a bidirectional Mach Zehnder Interferometer (MZI) as a distributed sensor to detect and locate an intrusion anywhere
along the sensing length, LS, as shown in Fig 1. The two sensing fibers and the lead out fibre are typically housed in a
standard single mode fibre-optic cable which is mounted on the perimeter fence. In this paper, the intrusion detection
system will be referred to as the Locator.
Fig. 1. A basic FFT Microstrain Locator system using a bi-directional MZ with input polarisation control.
C1 – C5 are all 50:50 fibre couplers.
The deployed sensing system consists of an industrial computer which houses a highly coherent 1550nm laser source
which injects continuous wave counter-propagating light into the MZ. Two detectors, also housed in the sensing
controller, receive the clockwise (CW) and counter-clockwise (CCW) signals from the MZ to analyze the signals. The
sensing controller also includes polarization controllers PCCW and PCCCW to maximize the MZ’s fringe visibility and
optimize the location accuracy by actively compensating for changes in fibre birefringence. Detection of an event is
based on analyzing the interferometric signals, while an event’s location along the sensing length LS is resolved by
measuring the time difference between received counter propagating signals. Additionally, using the event signals
detected by both detectors it is possible to apply the appropriate signal processing techniques to classify the signals and
Proc. of SPIE Vol. 8351 83513J-2
Downloaded From: https://www.spiedigitallibrary.org/conference-proceedings-of-spie on 8/21/2017 Terms of Use: https://spiedigitallibrary.spie.org/ss/TermsOfUse.aspx
perform both signal recognition and signal discrimination. The installation of a fence-mounted fibre-optic locator system
is shown in Fig. 2.
Fig. 2: A fence-mounted fibre-optic FFT Microstrain Locator system. (SS=start sensor and ES= end sensor).
In buried systems, the sensing cable is typically buried next to the pipeline to detect third party interference (TPI)
activities as shown in Fig. 3. Inevitably it will also be sensitive to other non-intrusion events such as those from nearby
traffic and railway crossings.
Fig. 3 Cross section of a buried fibre-optic intrusion detection system for detecting third party interference.
The quality of installation of the fibre-optic sensing cable in both fence systems and buried systems is critical for
achieving optimal system performance and is very often under-estimated. For example, in fence systems, the fence
construction needs to be built according to the relevant standards and the sensing cable attached correctly. Poor fence
construction and sensor cable attachment contribute to excessive nuisance alarms and long term performance
degradation. While good installation practices will not eliminate nuisance alarms, it will ensure that excessive nuisance
signals are not generated due to hypersensitivity of the fence to environmental noise, and enable optimal performance of
any nuisance mitigation algorithms employed.
3. SUPPRESSION OF RAIN-INDUCED NUISANCE ALARMS IN FENCE SYSTEMS
All perimeter intrusion detection systems (PIDS) will inevitably experience nuisance events. In the case of fence based
PIDS this includes, torrential rain, strong winds, adjacent vehicular traffic, and other man made sources. The ideal way to
deal with these signals is to be able to classify them and make a decision about their nature without compromising
system sensitivity. In this section, a nuisance mitigation technique using a level crossings algorithm will be discussed.
Proc. of SPIE Vol. 8351 83513J-3
Downloaded From: https://www.spiedigitallibrary.org/conference-proceedings-of-spie on 8/21/2017 Terms of Use: https://spiedigitallibrary.spie.org/ss/TermsOfUse.aspx
3.1 Level crossings based nuisance mitigation
Suppression of continuous nuisance alarms such as those induced by torrential rain is one of the most challenging tasks
for outdoor PIDS. A real-time level crossings (LC) algorithm to mitigate rain-induced nuisance alarms in fence based
fibre-optic intrusion detection systems was proposed and implemented7. This algorithm is computationally non-intensive
and it can be used to eliminate rain-induced nuisance alarms for torrential rainfall rates up to and in excess of 100 mm/hr.
The LC-based algorithm is also used to discriminate between continuous nuisances such as rain and non-continuous
intrusion events, which allows for simultaneous detection of intrusion events. The algorithm also employs a dynamic
event threshold to be able to automatically adjust to varying rainfall rates.
The LC algorithm can be defined by the number of level crossings, in the positive direction, of an input vector through a
given threshold and can be expressed as7,8:
()( ){}
=<Ψ= 1
0)1(&)(
N
nthreshnxthreshnxLC , (1)
where x is a signal of length N, the parameter thresh is the level threshold, and the indicator function Ψ is 1 if its
argument is true, or 0 otherwise. By applying Equation 1 to event signals received by the fibre-optic based Locator
system described in Figure 1, a level crossings representation of the detected signal can be formed against blocks of time.
Based on this representation, a number of features can be extracted to suppress nuisance alarms and discriminate
between nuisance and intrusion events.
3.2 Fence System Results
The LC algorithm was integrated into the Locator sensing controller which has been installed in numerous sites
worldwide that experience torrential rainfall. These sites experience rainfall rates up to and in excess of 100 mm/hour (>
4 inches/hr). Results from these sites have demonstrated the elimination of rain-induced nuisance alarms with the
simultaneous detection of intrusion events. The LC-based algorithm is used to discriminate between continuous
nuisances such as rain and non-continuous intrusion events. Due to its continuous nature, torrential rainfall will generate
a fairly consistent level-crossing rate per time block period. This feature can be used to suppress rainfall induced alarms
from the system. By monitoring for any changes in the level crossing rate, non-continuous intrusion events such as fence
climbing or cutting can be detected during the rainfall period. Using a dynamic intrusion event threshold has also proven
to be effective in automatically adjusting to variable rainfall rates. Figure 4 shows an example of the detected torrential
rain signal on a 3.2 km long chain link fence perimeter. The LC representation (see inset Nuisance Level graph) can be
used to detect intrusions which are buried inside the rain signal. The LC algorithm can also be adapted to deal with other
continuous or semi-continuous nuisances such as nearby traffic noise in a similar way.
Fig. 4 Real-time elimination of rain-induced nuisance alarms with simultaneous intrusion detection on a 3.2 km chain link fence.
Proc. of SPIE Vol. 8351 83513J-4
Downloaded From: https://www.spiedigitallibrary.org/conference-proceedings-of-spie on 8/21/2017 Terms of Use: https://spiedigitallibrary.spie.org/ss/TermsOfUse.aspx
4. NUISANCE SUPPRESSION IN BURIED SYSTEMS
Buried-fibre-optic sensors, such as those implemented for protecting buried oil and gas pipelines as well as buried
communications links, are designed to detect physical disturbances generated by third party interference (TPI) which
includes accidental or deliberate tampering, digging or excavation activities. These are susceptible to a range of ground
based nuisance events such as road and railway traffic and other nearby construction activities. These events can reduce
an intrusion detection system’s effectiveness with an unacceptably high rate of nuisance alarms. In this section, some
novel signal processing techniques are outlined to mitigate the effect of these nuisance events on buried intrusion
detection systems by suppressing particular nuisance induced alarms without affecting alarms generated by intrusion
events of interest. Figs. 5a and 5b show detected signal examples of typical intrusion events that should be detected,
while Figs. 6a and 6b show typical signals of nuisance alarms due to traffic that should be rejected on a 2.7 km buried
gas pipeline.
00.5 11.5 22.5
x 10
4
-5
-4
-3
-2
-1
0
1
2
3
4
5
No. of Sample s
Amplitude
Original signal
00.5 11.5 22.5
x 10
4
-5
-4
-3
-2
-1
0
1
2
3
4
5
No. of Samples
Amplitude
Original signal
(a) (b)
Fig. 5 (a) Intrusion signal caused by digging with a pick-axe above a 2.7 km buried gas pipeline protected by a locator system. (b)
Intrusion signal caused by digging with a back-hoe above a 2.7 km buried gas pipeline protected by a locator system.
00.5 11.5 22.5
x 10
4
-2.5
-2
-1.5
-1
-0.5
0
0.5
1
1.5
2
2.5
No. of Sample s
Amplit ude
Original signal
00.5 11.5 22.5
x 10
4
-6
-4
-2
0
2
4
6
No. of Samples
Amplitude
Original signal
(a) (b)
Fig. 6 (a) Nuisance signal from traffic on a nearby road for a 2.7 km gas pipeline intrusion detection system. (b) Strong periodic
nuisance signal from a railway crossing for a 2.7 km gas pipeline intrusion detection system. The railway runs perpendicularly over
the pipeline.
4.1 Pre-processing and feature extraction of the proposed solution
The novel nuisance alarm suppression algorithm described herein consists of an event detection portion, a feature
extracted portion for extracting a number of appropriate signal features from the time domain representation of the
signals, and a simple decision tree classifier. Event detection is based on the previously mentioned LCs algorithm. Fig. 7
shows the pre-processing and feature extraction stages of the nuisance suppression algorithm.
A number of extracted features are generated as shown in Fig. 7. Only three of these features will be considered for
nuisance alarm suppression. These features are described below:
1- Continuity of the signal: This is a measure of how continuous the signal is over its duration. It is determined
by using the maximum amplitude versus segment information from the pre-processing stage (see Fig. 7) and can
be given by.
Proc. of SPIE Vol. 8351 83513J-5
Downloaded From: https://www.spiedigitallibrary.org/conference-proceedings-of-spie on 8/21/2017 Terms of Use: https://spiedigitallibrary.spie.org/ss/TermsOfUse.aspx
(
)
segmentsofNo.
2
threshamplitude with segmentsofNo.
Continuity >
= (2)
The parameter thresh2 is normally set above the system noise of the time domain signal as in the case of LCs.
The maximum possible continuity is unity.
2- Maximum amplitude strength (MAS) (count %): To evaluate the MAS feature, first the amplitude strength
of each segment needs to be measured. The amplitude strength relates to how much of a signal is above a given
amplitude threshold, Thresh1, and is defined by equation 3. The parameter Thresh1 is normally application
dependent. After evaluating the amplitude strength using equation 3, the MAS feature is calculated as the
maximum value calculated by equation 3 over the whole duration of the signal (see Fig. 7). It is effectively a
measure of what percentage of a signal is above a given threshold value and is given as a percentage value. This
feature is important for distinguishing digging events from traffic nuisances that have similar continuity values.
The intrusion signals will typically have higher maximum amplitude strengths.
(
)
()
100
segmentspecifiedtheinsamplesofsamplestotal
1
ThreshsegmentspecifiedtheinsamplesofNo.
segmenteachofstrength amplitudeThe
>
= (3)
3- Maximum deviation (MD): The first step towards the evaluation of MD is by the evaluation of the maximum
amplitude in each segment as is the case of the continuity feature (see Fig. 7). The MD is then calculated by
subtracting the mean of the segment’s amplitudes from the maximum segment’s amplitude.
Maximum deviation = Maximum segment amplitude – Mean segment amplitude (4)
This feature is important to discriminate between digging intrusion events and adjacent nuisance events of
comparably long continuities, even if they have roughly similar amplitudes. In this situation the digging events
will have a higher maximum deviation owing to their higher variation in segment maxima. This can be seen by
comparing the two signals represented by Fig. 5b (intrusion) and Fig. 6b (adjacent nuisance) where there are
more periods of inactivity in the digging signal (lower in amplitude) when compared with the continuous
nuisance signal. This translates into a higher maximum deviation for the digging signal.
Fig. 7 New alarming system feature extraction method
Proc. of SPIE Vol. 8351 83513J-6
Downloaded From: https://www.spiedigitallibrary.org/conference-proceedings-of-spie on 8/21/2017 Terms of Use: https://spiedigitallibrary.spie.org/ss/TermsOfUse.aspx
4.2 Classification Using Simple Decision Tree
By using the features described in the previous section in the right combination it is possible to suppress a large number
of nuisance alarms in buried intrusion detection systems. This can be done by implementing a decision tree. Decision
trees represent a series of IF…THEN type rules which are linked together and can be used to classify or predict events
based upon the values of a select number of features. For this work we use a simple decision tree to discriminate between
intrusion and nuisance events. Neural networks can also be used with these features to discriminate between true alarms
and nuisance events. Intrusion events will generate alarms while nuisance events will be ignored.
Practical data from two sites have been tested using the proposed algorithm. Table 1 shows the values of the features for
the intrusion and nuisance events in Fig. 5 and 6, respectively. The values in Table 1 are used to derive appropriate
threshold values, Thresh_1, Thresh_2, Thresh_3, and Thresh_4 for the decision tree as shown in Fig. 8. The algorithm
successfully classified digging events accurately (Fig. 5a and 5b) while traffic nuisances (such as those in Fig. 6a and 6b)
were rejected.
Fig 8 Practical example of the decision tree
Table 1: Feature values of intrusion and nuisance events.
Features Values
Event Type Continuity MAS MD Node decision
Intrusion (hand and
assisted digging, Fig. 5b)
0.4 34.86 3.595 Node-2
Vehicular traffic (adjacent
traffic, Fig. 6a)
1 1.86 0.76 Node-3
Road intersection and
train crossings, Fig. 6b
1 18.99 0.4712 Node-3
Proc. of SPIE Vol. 8351 83513J-7
Downloaded From: https://www.spiedigitallibrary.org/conference-proceedings-of-spie on 8/21/2017 Terms of Use: https://spiedigitallibrary.spie.org/ss/TermsOfUse.aspx
5. CONCLUSIONS
A number of signal processing techniques for suppressing nuisance alarms in a fibre-optic intrusion detection system
have been proposed and presented. The use of a level crossings based algorithm for suppressing torrential rain-induced
nuisance alarms in fence-based fibre-optic perimeter intrusion detection systems has demonstrated its effectiveness
against torrential rainfall rates in excess of 100 mm//hr. It has also demonstrated the successful simultaneous detection of
intrusion events during rainfall periods. A level crossing based detection and novel classification algorithm has also been
applied to buried fibre-optic pipeline intrusion detection systems. The use of a decision tree classification algorithm has
demonstrated the effective classification of both traffic induced nuisance events and digging and excavation intrusion
events. Future work is focusing on increasing the library of signal features to achieve the classification of more intrusion
and nuisance events.
REFERENCES
[1] Tarr, S., and Leach, G., “The dependence of detection system performance on fence construction and detector
location,” Proceedings of the International Carnahan Conference on Security Technology, pp. 196-200, (1998).
[2] Jiang, L., Liu, X., Zhang, F., “Mutli-target recognition used in airport fibre fence warning system”, Proceedings of
the Ninth International Conference on Machine Learning and Cybernetics, pp. 1126- 1129 Qingdao, (2010).
[3] J. De Vries, “A low cost fence impact classification system with neural networks,” in IEEE Africon, pp. 131-136,
Vol. 2, (2004).
[4] A. Yousefi, A. A. Dibazar, and Theodore Berger, “Intelligent Fence Intrusion Detection System: Detection of
Intentional Fence Breaching and Recognition of Fence Climbing,” IEEE International Conference on Technologies
for Homeland Security, Boston, (2008).
[5] Min, H., Lee, C., Lee, J. and Park, C. H., “Abnormal signal detection in gas pipes using neural networks”, 33rd
Annual Conference of the IEEE Industrial Electronics, pp. 2503-2508, Taiwan, 2007.
[6] Katsifolis, J. and McIntosh, L., “Apparatus and method for using a counter-propagating signal method for locating
events”, Patent No US 7,499,177 (2009).
[7] Mahmoud, S. and Katsifolis, J.,”Elimination of rain-induced nuisance alarms in distributed fibre-optic perimeter
intrusion detection systems,” Proceedings of SPIE, vol. 7316, Paper 7316-3, (2009).
[8] Mahmoud, S. and Katsifolis, J., “Robust event classification for a fibre-optic perimeter intrusion detection system
using level crossing features and artificial neural networks,” Proceedings of SPIE, vol. 7677, Paper 6, (2010).
Proc. of SPIE Vol. 8351 83513J-8
Downloaded From: https://www.spiedigitallibrary.org/conference-proceedings-of-spie on 8/21/2017 Terms of Use: https://spiedigitallibrary.spie.org/ss/TermsOfUse.aspx
Conference Paper
Full-text available
The protection of critical and sensitive infrastructures such as public buildings, power plants, nuclear plants, oil and gas pipelines and wells, offshore oil facilities, medical facilities, etc cannot be overemphasized especially in an area where there is high rate of vandalism and terrorism. There is a growing concern in Nigeria concerning the rampant vandalization of petrolatum and gas pipelines that deliver critical petroleum products across the length and breadth of the country for the survival of the national economy. Power infrastructures such as transformers, electricity cables and other critical power equipment are also targets to vandals and thieves. In the North East region of Nigeria, Telecommunication Base stations have been target of attacks by Boko Haram and ISWAP terrorists operating in that area. Nation's airports, military facilities are also targets to terrorist targets. Perimeter security fencing or security is vital for successful monitoring and detection of unwanted movement or intrusion into any of these critical assets be it above-the-ground, underwater or buried underground assets. Perimeter security can be installed to monitor, track, and classify intrusions into any critical assets whether remote or nearby. This paper explored all the intricacies and operational methodologies of using wireless and wired fibre optic perimeter security in monitoring, tracking and detecting unwanted intrusion into any critical assets for the overall protection of these assets against any form of vandalism and terrorism.
Conference Paper
Full-text available
Perimeter fencing is widely used to isolate and protect public and private places such as airports, military bases, power stations and construction zones against unauthorized accesses. Fence structures merely prevent a percentage of intrusions or postpone them. A higher level of security is needed to monitor and investigate activities on or around the fences. The Fence Intrusion Detection System (FIDS) is one of Perimeter Intrusion Detection Systems (PIDS) focusing on the fence intrusions. In general, there is no system practically available to classify suspicious activities; whether the activity was due to the strong wind turbulent or climbing of a person on the fence.
Article
Discriminating between intrusion and nuisance events without compromising sensitivity is a key performance parameter for any outdoor perimeter intrusion detection system. This is especially the case for intrusion and nuisance events which may have a similar impact on a perimeter fence. In this paper, a robust event classification system using features based on level crossings is presented for the detection and recognition of intrusion and non-intrusion events in an outdoor fence-mounted intrusion detection system for a range of operating environments and fence styles. The proposed classification system is applied to a distributed fiber-optic Mach Zehnder (MZ) mounted on a perimeter fence. It consists of a pre-processing stage employing high resolution time-frequency distribution, a novel event detection and feature extraction scheme based on level crossings, and a classification algorithm using a supervised neural network. Experimental results are presented showing accurate classification of different intrusion and non-intrusion events such as fence-climbing, fence-cutting, stone-throwing and stick-dragging. These results demonstrate the robustness of the proposed algorithm for various types of fence fabric and operating environments.
Article
One of the most important challenges of distributed fiber-optic intrusion detection systems is to minimize the nuisance alarm rate without compromising the probability of detection in a wide range of operating environments. This involves eliminating nuisance alarms caused by non-intrusion events such as torrential rain without compromising their sensitivity to intrusion events. An effective yet computationally non-intensive event recognition and discrimination technique is presented for eliminating rain-induced nuisance alarms. Results from real intrusion detection systems are presented showing the elimination of rain-induced nuisance alarms for torrential rainfall rates in excess of 4 inches/hr without any penalty to the simultaneous detection sensitivity of intrusion events.
Conference Paper
In this paper, we present a real-time system to detect abnormal events on gas pipes, based on the signals which are observed through the audio sensors attached on them. First, features are extracted from this signal so that they are robust to noise and invariant to the distance between a sensor and a spot at which an abnormal event like an attack on the gas pipes occurs. Then, a classifier is constructed to detect abnormal events using neural networks. It is a combination of two neural network models, a Gaussian mixture model and a multi-layer perceptron, for the reduction of miss and false alarms. The former works for miss alarm prevention and the latter for false alarm prevention. The experimental result with real data from the actual gas system shows that the propose system is effective in detecting the dangerous events in real-time having an accuracy of 92.9%.
Conference Paper
For the shortage of an ultra-long-distance auto-alarming system at the airports, a new fiber optic perimeter security system based on the M-Z interferometers is proposed. This system can be used to identify the invasion of walkers, little animals and vehicles within BP neural network. Firstly, the input signal was preprocessed to select the vibration signals which includes intrusion and takes wavelet transformed in order to remove the noise with appropriate threshold. Secondly, the feature is extracted within wavelet packet. Finally, the invasion behavior which often occurs is identified within BP neural network. Experiments show that, in the complex working environments, this system is able to identify intrusions with an accuracy rate more than 96.8%.
Conference Paper
Due to a high rate in live stock theft and farm intrusions, securing property is a problem in South Africa. Research is necessary to investigate possible improvements. By analyzing the acoustical vibrations that are generated on a game farm or security fence during entry, intrusions can be detected. Owners of protected property can receive an early warning. Different type of intrusions can be distinguished since they generate different vibrations. A point sensor is used to detect vibrations generated at a distance from the sensor. This proposed system is part of a more elaborate farm information system and is not intended to function as a stand-alone security system
Conference Paper
There is little published data to show how intruder detection system performance is affected by the construction of the fence or by the position the sensor is mounted on the fence. We compare false alarm data for sensors mounted either on a double welded-mesh fabric or single welded-mesh clad with a steel sheet. Each fence construction is used on the Prison estate for England and Wales. We study false alarm data taken over a 6 month period for four different detection systems. We consider how false alarm rates are affected by wind and the presence of wildlife; and look at time between alarms, and the percentage of alarm free days for each fence. We also analyse data from two detection systems each installed at both the bottom and top of each fence with a view to identifying: whether the positioning of detection systems both at the top and bottom are necessary to detect cutting and climbing attacks; whether mounting the upper sensor in the coil is effective in detecting attacks; and whether the top or bottom of the fence is more susceptible to false alarms
Apparatus and method for using a counter-propagating signal method for locating events
  • J Katsifolis
  • L Mcintosh
Katsifolis, J. and McIntosh, L., "Apparatus and method for using a counter-propagating signal method for locating events", Patent No US 7,499,177 (2009).