skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 119564 Find in a Library
Title: Perimeter Protection: Define, Detect, and Defend
Journal: Security Management  Volume:33  Issue:8  Dated:(August 1989)  Pages:73-78
Author(s): J C Alexander
Date Published: 1989
Page Count: 6
Type: Issue Overview
Format: Article
Language: English
Country: United States of America
Annotation: Guided radar technology and digital processing enhance accurate detection of perimeter intrusions.
Abstract: Guided radar technology creates a detection zone between a pair of ported coaxial cables that have been constructed to leak electromagnetic energy at a low VHF frequency. Pairs of such cables are buried around the protected perimeter, and the electromagnetic coupling between the cables produces a detection zone or radar fence. Interaction with local soil patterns and other mediums forms a sensitivity profile unique to each pair of perimeter cables. A digital copy of this profile is stored in a computer, which monitors changes. A patented application of digital processing to closed circuit television (CCTV), known as DAVID (digital automatic video intrusion detector), produces an effective human-machine interface. This interface equips the CCTV system to monitor automatically video images from the surveillance zone. It detects movements that require human attention and furnishes graphic enhancements to help a guard assess the nature of the intrusion. Modem digital signal processing can analyze the size, shape, and movement patterns of the video change. It can scan multiple cameras and point to the exact location in the picture where a potential intrusion has occurred.
Main Term(s): Alarm systems
Index Term(s): Facility security; Surveillance equipment
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.