Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 19

TOPIC : AUTOMATION

OF ELECTRIC FENCES
FOR SURVEILLANCES

By aman pratap singh


Guidance of dr. ajay verma sir
WHAT IS AN ELECTRIC FENCES?

An electric fence is a barrier that uses electric shocks to deter animals and people from crossing a
boundary.

The voltage of the shock may have effects ranging from discomfort to death.

Most electric fences are used today for agricultural fencing and other forms of animal control,
although they are also used to protect high-security areas such as military installations or prisons,
where potentially lethal voltages may be used.
TYPES OF FENCES:

HIGH SECURITY FENCES ( FOR BORDERS SECURITY


PURPOSES,PRISONS ETC.)

AGRICULTURE FENCES

FOREST (ANIMAL) FENCES

HOME SECURITY FENCES


WHY BORDER SECURITY & SURVEILLANCE?

 Border security and surveillance is a 24/7 operation that can’t afford downtime
or periods of reduced readiness.

 Guarding against illegal immigration, smuggling, and terrorism demands


reliable long-range threat detection and positive identification of potential
threats all day, all night, and in all conditions.
WHAT ARE THE • Wide-area perimeter surveillance of

MAIN rural and mountainous regions


surrounded by wildlife.

CHALLENGES • A wide range of different threats to


automatically detect, including UAVs,
OF BORDER RHIBs, crawlers, swimmers etc. 
• Border surveillance systems must be
SURVEILLANCE able to bear harsh environments in
remote locations.
? • Actionable, real-time intelligence
allowing immediate action by patrols in
the field.
WHY AUTOMATION HAD BEEN REQUIRED FOR BORDER
SECURITY:

 ELECTRIC FENCING along the border but the enemies are too smart. They have developed
chemicals which they spray on this fence to cut at two points to make an entry into India or any
other country.
 So Due to above problem an invisible LASER SYSTEM & algorithms has been came into
existence on borders for smart and heavy monitoring for intruder.
 the advantages of the system were having a two-tier security, low false alarm rate, use of
wireless hooters and provision of intrusion coordinates.
 But images and videos coming via this system are helping us a lot in nabbing intruders. The
images are monitored real time by the staff of the Border Security Force and even the Army.
ELECTRIC FENCES WITHOUT INVISIBLE LASER
‘INVISIBLE’ LASER WALLS TO BOLSTER
SECURITY ALONG BORDER

 A laser fence or laser wall is a mechanism to detect


objects passing the line of sight between the laser
 source and the detector.
  Stronger lasers can be used to injure entities
passing the laser beam. In fiction, laser fences may
have the ability to stop intruders by blocking or
injuring them
 LASER Technology has been used by many countries.
 And one is india that The "laser walls" or fence are being
monitored by Border Security Force (BSF) which guards
the Indo-Pak Border in Jammu and Kashmir, Punjab,
Rajasthan and Gujarat,etc.
AUTOMATED INVISIBLE LASER FENCES FOR SECURITY…
LASER TECHNOLOGIES
In this method, there are four steps of security system .
First one is fence border with electric current is streamed in it.
The second one is a Laser alarm system with guns attached to it via
solenoid linear actuator.
Third one is camera surveillance and last one is manual surveillance. Here,
we are designing the second method of surveillance.
A condition can arise sometimes when the intruders are smarter enough
than the surveillance system. Intruders can use a LASER source to
increase the intensity of the photoresistor that will lead to the infiltration at
the border easily.
PICTURES OF SOME LASER
SECURITY FENCES.
 A condition can arise sometimes when the intruders are
smarter enough than the surveillance system. Intruders can
use a LASER source to increase the intensity of the
photoresistor that will lead to the infiltration at the border
easily.
LIMITATIONS  In this process, the Security LASER won’t work due to the
OF LASER function of other LASER but the other LASER which is
used by intruder’s, increases the intensity of the
FENCES photoresistor hence current will flow simultaneously in the
circuit and no alarm, and Solenoid linear actuator won’t
give any command to the weapon system.
 Hence an intensity meter should be used with the system
that will always check out the intensity of the LASER.
A NEW LATEST TECHNOLOGY “ FIBRE OPTICS” FOR SECURITY:

 This fiber optic monitoring system converts a standard telecoms fiber optic cable
into an array of distributed sensors capable of detecting changes in pressure,
temperature, stress and acoustics.
 Using advanced algorithms, this system can classify and locate activities such as
people, vehicle movement, low flying aircraft, digging, gunfire and many other
events.
 SYSTEM OPERATIONS
PICTORIAL  MULTI-THREAT DETECTION

REPRESENTATION OF 

DEPLOYMENT OPTIONS AND APPLICATIONS
Personnel (10ft range)

FIBRE CABLE • Vehicles (20ft range)


• Manual digging (30ft range)
FENCES WORKS… • Shallow tunnelling (20-30ft range)
MULTI- THREAT DETECTION

USING alogorithms technique to classify and locate activities such as people, vehicle
movement, low flying aircraft, digging, gunfire and many other events.

With this insight, agents and field patrol gain a complete picture of the location, scale
and type of threat detected—enabling rapid, more informed decisions that result in
faster, more efficient responses.
SYSTEM OPERATIONS

 All alerts are displayed in real time using a map display that allows operators to
monitor very long distances.
 Alerts can be activated or suppressed in different zones, depending on the
environment, threat profile or time of day (e.g. vehicle alerts along a road during the
day vs. night time).
 System alerts can be relayed to PTZ cameras or UAVs for visual assessment, ground
crew mobile devices, or remote command and control centres.
 Alerts can also be filtered for sector-specific operational centers, while management
oversees the full system.
 Standard Burial (direct buried or in
conduit):
This deployment enables the detection of

DEPLOYMENT
surface activity such as:
• Personnel (10ft range)
• Vehicles (20ft range)
OPTIONS AND •

Manual digging (30ft range)
Shallow tunnelling (20-30ft range)

APPLICATION • Fence or Wall Mounted (direct buried or


in conduit):-

S
This deployment enables the ability to
detect physical interference with asset,
such as climbing, sawing, cutting and
other tampering.
CONCLUSION

 Border surveillance system is a critical process in security assessment. India-Pakistan, India-


Bangladesh Border length is almost double to US Mexico border.
 Most awaited technologies for border security has been used by US MILITARY .
 New and Innovative ideas, prototype should be chosen.
 the research work carried out in this paper proposes a very secure alarm setup in order to set up
the most efficient surveillance solution.
 The development of a multi-secure alarm setup will ensure that the infiltration on border are
reduced to a large number.
 In this research, we conducted many experiments and verified operations and as a result, we did
not face too much difficulty to make co-ordination with the fence border security system.
THANK U…

You might also like