Training methods in video analysis

Artificial intelligence (AI) in video surveillance will continue to gain momentum thanks to rapid technological developments. A status quo.

The term artificial intelligence is often equated - somewhat inflationarily - with many equivalent terms. But what is actually a simple analysis and where does artificial intelligence come in? Whether it's a self-driving car, voice recognition, or an AI-enabled camera, the foundation of any system that makes decisions on its own is data analysis. For example, existing data sets are often scanned for certain patterns in order to make decisions or predict events. An AI makes use of this analysis and makes assumptions on its own. Decisions and predictions are future-based and do not rely solely on existing data. It is important to distinguish between different forms of intelligent analysis.

Deep learning is part of a broad family of machine learning methods based on neural learning networks. © depositphotos

What does AI actually mean?

Weak AI (called Narrow AI or Artificial Narrow Intelligence [ANI]) is conditioned to perform specific tasks. Weak AI describes a majority of all robust AI applications such as Apple's Siri, Amazon's Alexa or IBM Watson. We speak of so-called strong AI, a theoretical form of AI, if it had intelligence comparable to that of humans. This would then have acquired an actual consciousness, which would be able to solve problems independently and plan events for the future. An artificial superintelligence (ASI) that would surpass the human brain is still of a theoretical nature, but this does not rule out the possibility that researchers are already working on its development. Intelligent video analytics is usually referred to when software-based analytics modules for operation on servers, recorders or in cameras are applied in the automatic detection of security-related objects or events. These enable real-time object detection, object tracking, identification and scene interpretation. Depending on the settings, time, date, focal length and shutter speed can be extracted from the so-called metadata of the video streams. To obtain and extend this pool of aggregated metadata in different scenes and views, an extremely large number of training units of classified scenes and objects are required.

One thing is certain: the use of metadata and technical tools increases the efficiency and reliability of video data analysis enormously. Discrete GPUs (Graphics Processing Unit) of graphics cards today use their own video memory. Algorithms operating directly in the camera use dedicated GPUs conditioned for video analysis. Additional computing power can be provided via various systems. Whether this is via the company's own servers and with its own IT environment (on-premise), via server-based data processing (cloud-based approaches) or via hybrid approaches.
Due to increasing computing power, it will be possible to integrate better and better algorithms over the years. It was thus only a small step to reconstruct three-dimensional scenes from a 2D video image. In the meantime, it is no longer only possible to recognize objects, but also to register further attributes regarding speed, size, direction and behavior of a route in a procedural way. Moore's Law", according to which computing power nearly doubles every 18 months, should continue to help determine increasingly valid objects of interest.

Edge-based analysis

A security camera equipped with analytics not only recognizes a person using deep learning and converts video information into data, but also creates metadata. In practice, the spectrum enables AI to recognize a car, a person, or a bicycle, for example, or to track an entire scene. The more data that is included, the more scenarios can be trained. Humans are currently still quite a bit smarter than deep learning algorithms: In the video domain, training methods require 100,000 to millions of data sets to produce a broadly accurate result. For example, classification is based on different objects such as human, animal, object and camera angle. Current cameras have powerful processors, with which parallel operation in video analysis and encoding of the video data is often possible by a processor of the camera. This is then referred to as edge-based analysis. However, server-based video analysis is currently still considered the most common solution, in which two different system architectures can also be implemented, enabling, for example, multiple analysis modules in parallel operation.

Video surveillance
Digital 4.0 concept and blockchain technology. © depositphotos

Typical use scenarios of AI in video security systems

The field of application of AI in video security systems opens up a very broad spectrum. It ranges from early fire detection, car license plate recognition, facial recognition, skin temperature analysis and people counting to the prediction of possible thefts (behavioral), accompanied by audio analysis or the observation of traffic incidents. Typical case studies of traffic solutions are based on counting, traffic flow counting, license plate recognition, traffic density and distance. A so-called event detection (ED) system is able to immediately detect all desired events in a tunnel or on an open stretch of road, such as regulations, tunnel ventilation shutdowns, traffic lane closures.

Prerequisites for a successful use of AI in video security technology

The use of the best AI-based products depends on the camera/lens unit and the intended application. Not only the resolution, object quality, but also the viewing distance or angle, the illumination and the tilt angle of an IP camera play a crucial role in surveillance. A good trust of the operator in the supply chain of the AI solution is therefore indispensable. This can be promoted through transparency and regular exchange between operator, installer and manufacturer. Criteria such as the type, origin and scope of the training data provide a clear picture. For example, it can be discussed whether improved algorithms can be retrofitted into the system and whether they can be trained under all conditions (for example, for conditions such as summer/winter, day/night and weather conditions).

Compliance with the General Data Protection Regulation (GDPR) is mandatory under all circumstances. Some providers of IP cameras make statements about the accuracy of detection. But what do technical statements of an accuracy of 95 percent mean, for example? Example: If an AI-based facial recognition system is to be used to identify a criminal person, in this case an accuracy of 99.9 percent would still result in a false positive rate of 100 people out of 100,000 faces. Crucial questions in this context are: What error rates are acceptable for the particular application planned? How and under what circumstances did the data accuracies come about? Just as important, however, are the basic specifications of the manufacturers and developers.

Training methods in video analysis
Intelligent smoke detection. © Fike Video Analytics

AI in video security technology still lacks both industry or normative standards and ethical standards. Therefore, there will still be some learning curves to master in AI-based video security technology. Due to the complexity of the topic, the Swiss Association of Security System Installers (SES Association) advises that, in the sense of a "proof of concept," providers offer a test installation in the object, if possible, to verify whether the operator's expectations can be met by the manufacturer's technology. It should be ensured that exactly the camera and lighting technologies as well as other framework conditions for an optimal use of all equipment can be claimed for the purpose of an application in the test phase.

If multiple AI-based solutions are to be considered, care should be taken to use the same camera signals to feed into the AI in order to understand a true comparison in terms of different conditions such as day/night and weather conditions.

Future possibilities

The spectrum of AI-based solutions will still hold open many exciting developments. In the medium to long term, AI is likely to contribute to a significant reduction in false alarms, which will become particularly important with remote switching of 24/7 control centers and a significant reduction in the burden of centralizing information so that PSAPs can better focus on real alarms without increasing PSAP staff. Also, in general, increased AI camera support will help save tremendous time in forensic evaluations. Minute attributes and specialized search functions for people with the same outerwear, such as blue pants, can lead to extremely fast search results with enormous amounts of data. Even image distortions of extreme wide-angle lenses will one day be a thing of the past thanks to AI-based image correction. Even insects in front of a camera lens will not always necessarily lead to false alarms.

Summary of the document "Artificial Intelligence in Video Security Technology" from the Swiss Association of Security System Installers (SES) (to be published soon) and the German BHE Association.

One in eight apprentices suffers an occupational accident every year

Many cuts on the hands or splinters in the eyes: The risk of accidents among apprentices is almost twice as high as that of semi-skilled workers. Three areas of the body are particularly at risk.

Accident risk
Image: depositphotos

Thousands of young people started their apprenticeships at the beginning of August. The current accident figures show that starting a career can be not only interesting but also dangerous.

By far the most common injury to apprentices in the course of their work is to their hands (42 percent). These accidents often occur during classic craft activities such as cutting, planing or drilling. In these cases, the majority of apprentices are cut, stabbed, scratched or scraped.

The second most common injuries are those affecting the eyes (16 percent), with apprentices most often being struck in the eye by splinters or chips of metal or wood while working with machinery.

Lower legs, ankles and feet are the third most frequently affected (13 percent). Almost half of these cases are trip and fall accidents. A strikingly high number of these accidents occur due to missteps or falls on stairs.

One in eight apprentices suffers an occupational accident every year

Every year, there are around 25,000 occupational accidents involving apprentices, two of which are fatal. "Every year, one in eight apprentices suffers an occupational accident. This means that the risk of apprentices suffering an accident is almost twice as high as that of employees who have completed their training," explains Reto Kellerhals. At Suva, he is in charge of the prevention campaign "Safe and healthy apprenticeship", which draws attention to the risks of accidents for apprentices.

The reasons why apprentices have an increased risk of accidents are obvious. In most cases, they are still inexperienced when it comes to handling machines and tools and underestimate the dangers in the workplace due to their lack of professional experience. In addition, they lack routine and a systematic way of working.

Vocational trainers and supervisors have a decisive influence

In this context, vocational trainers and supervisors have a crucial role. On the one hand, they are responsible for instruction and have a supervisory duty towards the learners. For example, by pointing out that protective goggles are mandatory when working on machines. "Employees also show an increased risk of accidents in the first few years after completing their apprenticeship. This is because young employees generally still have little routine in the work processes after their apprenticeship and are constantly confronted with new activities. In addition, they are sometimes unaware of the risks of injury. That's why it's important to support young employees in their day-to-day work, even after they have completed their apprenticeship," says Kellerhals.

On the other hand, vocational trainers and supervisors have an important role model function to show where the dangers lurk in the workplace and how to deal with them. "The prevention culture in the company has a decisive influence on whether learners dare to ask questions if they are uncertain or to say stop at the moment of danger," says Kellerhals. The latter in particular is crucial to preventing accidents.

Source: Press release 

Tunnel safety in Sins

The southwest bypass is intended to relieve the village center of Sins and the access axis from traffic. The heart of the bypass - the Letten tunnel - has been open since September 2021. A complete safety system from Siemens ensures safe travel through the 912-meter tunnel.

Safety system
© Siemens

It was one of the largest and most complex construction projects in the canton of Aargau in recent years: the Sins southwest bypass. Three years after the official start of construction, the joy of all involved is great. The opening of the Letten tunnel is a long-awaited relief from backlogs and through traffic. Despite high demands on planning, design and construction, this project of the century was successfully realized all around. This is also the opinion of the project manager for operational safety facilities (BSA), Martina Tobler.

Highest safety in the tunnel

People traveling through the Letten tunnel in the future can feel safe - thanks to the installed and interlinked safety systems. Fire detection in the tunnel driving space is handled by two different detection systems. These differ in thermal (heat) and optical (smoke) fire detection. Thus, all possible fire scenarios are reliably detected. The Fibro Laser thermal detection system from Siemens supports smoke detectors and video cameras. Through thermal detection, the Fibro Laser shows the location, the direction of propagation and the location of the fire to the nearest meter. In addition, the newly developed smoke algorithm for the detection of moving and stationary fire sources is used for the first time in the Letten tunnel.

Should a fire occur despite all safety measures, the modern video and smoke detection system from Siemens helps to locate the fire site as quickly as possible. Not only is a fire detected by the video system, but also traffic jams, lost loads and stationary vehicles.

Tunnel safety in Sins
Concreting work with concrete pump at the cut-and-cover tunnel Letten. © Canton Aargau

The safe evacuation of endangered persons in the event of an incident is also ensured by a public address system - a first in a Swiss tunnel. This system has very good speech intelligibility. In the event of an emergency, this ensures an orderly and rapid evacuation of the tunnel.

All systems are coordinated with each other and function as a unit in an emergency. The detected hazard alarms are transmitted to the operations center, which is protected by the Sinteso fire alarm system. This enables potential hazards to be detected at an early stage, consequential damage to be prevented, and safety in the tunnel to be ensured.

Vitamin D may help with depression

Vitamin D may alleviate depressive symptoms because the vitamin regulates some functions of the central nervous system. These are the findings of a study led by the University of Eastern Finland.

Vitamin D Depression
Image: Pixabay

Vitamin D may alleviate depression in adults, according to a meta-study by an international team of researchers under the power of the University of Eastern Finland suggests. The experts evaluated dozens of studies from all over the world according to scientific criteria.

Antidepressants conditionally effective

Depressive symptoms cause a significant burden of disease worldwide. The therapeutic effectiveness of current antidepressants is often insufficient, which is why nutritional researchers, for example, are seeking new ways to alleviate symptoms. According to researcher Tuomas Mikola, vitamin D regulates central nervous system functions, disorders of which have been linked to depression. In addition, cross-sectional studies have observed a link between depressive symptoms and vitamin D deficiency, he said.

The new meta-analysis on associations between vitamin D supplementation and depression is the largest published to date. Previous studies have examined the effectiveness of vitamin D in alleviating depressive symptoms in adults in different populations. They included patients with depression, the general population, and people with various physical illnesses. The results showed that vitamin D supplementation was more effective than placebo in relieving depressive symptoms. There was wide variation in the doses of vitamin D used, but typically it was 50 to 100 micrograms per day.

320 million people affected

The results are not conclusive, Mikola says. That's why he proposes to specifically research what effect vitamin D administration has on depressed people, administered in addition to standard drug treatment. A solution to the problem would be a blessing for mankind, because according to World Health Organization more than 320 million people worldwide.

Source: Pressetext.com

BSI warns against overly complex passwords

In a communiqué, the Digital Consumer Protection Advisory Board of the German Federal Office for Information Technology (BSI) warns against regularly changing passwords and overly complex password phrases. Above all, the imposed obligation to constantly change passwords is a shot in the foot, because users then usually use recurring patterns that could be easy to guess. 

Federal Office in safety engineering
Image: depositphotos

In a Communication the Advisory Council for Digital Consumer Protection at the German Federal Office for Information Technology (BSI) warns against passwords that are too complex and against forcing users to constantly change passwords. This can also backfire, because users then usually reuse simple patterns. This is also against the background of the fact that compromised passwords must be changed immediately. The Council also warns that device manufacturers often store location passwords in the settings and leave users in the dark about this. The attacked parties then bear the security risk.

Password manager: still not very common

Two-factor authentication is known to only 43 percent of all Internet users aged 16 and over. SMS messages and codes via e-mail as a second layer of protection are the most frequently used 2FA methods. The first commandment is to choose a different password for each account. In addition, it is always better to use longer passwords or phrases consisting of several words, which are easier to remember. The use of password managers is still not very widespread. Many users are skeptical because they cannot always verify whether the passwords stored there are really secure. The authors state that there is always a residual risk. However, the risks should be weighed against greater risks such as password recovery, the BSI complains. In addition, many users do not know that the digital key managers also provide protection when passwords are entered on fake websites.

Source: BSI/Heise, editorial office  

Sitting correctly is a matter of attitude

For most people, sitting is an unavoidable part of their everyday working life and, if they do not exercise regularly enough, it can be the cause of considerable damage to the spine and intervertebral discs.

regular exercise cause
Around 150 small muscles along the spine provide stability. © Haider Bioswing

Back pain is the inglorious number one single diagnosis every year and is also one of the most expensive illnesses in Germany, according to the German health insurance company DAK Gesundheit. According to the BKK umbrella organization, spinal and skeletal disorders accounted for 24.3 of all days of incapacity to work in 2019.

The musculature lives from movements

Lack of movement is the big problem for muscles - and the more support functions are offered, the weaker they become. This is especially true on office chairs, which, although usually designed according to ergonomic principles, often place too much emphasis on supporting the body and less on promoting movement. However, the body's 650 or so muscles are naturally programmed for movement and need alternating tension and relaxation.

If the range of movement provided by nature is regularly ignored and the musculature is increasingly forced to perform only "rigid holding work" (isometrics) under tension, especially when working at a computer screen, tension is pre-programmed. In order to prevent greater damage, the pain receptors (nociceptors) in the neck, lumbar region or shoulders prophylactically signal during the course of the day to "demand" additional movement.

More active sitting
The sensorimotor data flow must be additionally promoted when sitting. © Haider Bioswing

Three layers as a basis for a stable back

Three superimposed, interlocking and coordinated layers of muscles perform a wide variety of tasks in the back:

  • Stabilization and straightening
  • Flexion and extension
  • Rotation

Particular importance is attached to the small muscles close to the spine and very small, which pull from vertebral body to vertebral body: They are naturally responsible for stabilizing the spine - but unfortunately, due to our lifestyle characterized by supports and lack of movement, they are usually too weak to do justice to their task.

The individual muscles are controlled by the brain and nervous system, which in parallel process information from countless movement receptors, eyes, balance, sense of touch and other sources in order to generate suitable movement or - in the case of office sitting - mainly holding and stabilization programs.

More active sitting
Sitting properly is a "matter of attitude." Image: depositphotos

What role does the brain play?

The advantage of such endogenous programs is that they run automatically and the brain needs less energy to control them. The disadvantage is that even non-physiological programs are activated if they have been trained long enough. This explains the many back complaints that frequent sitters in particular often complain about.

The brain has the task of analyzing, evaluating and perfectly coordinating all available data and information in milliseconds. The better the incoming movement data, the better the coordination ability. If there is little input, for example during concentrated screen work, the movement input drops rapidly and the nervous system can no longer optimally control the complicated muscle play.

In complex systems, the interaction of all components plays a major role. If one part of the chain is too weak to fulfill the goal, the brain looks for an alternative solution.

Special office chair can help

In the case of permanently necessary stabilization of the spine, the control mechanism accesses a muscle group whose actual task is not to stabilize the vertebral bodies. If this muscle group is therefore permanently under tension (e.g. during computer screen or office work), metabolic residues are no longer properly eliminated and the brain sends warning messages in the form of pain:

However, if the movement impulses emanating from the seated person are not slowed down but reflected, an interesting solution arises in two respects:

  1. The constant small movements automatically train the stabilizing muscles of the spine, which are proven to become stronger.
  2. Based on these regular movements, the brain receives relevant movement data, which can stimulate the circuitry in the brain and thereby optimize the coordination of muscle control.

Sitting becomes exercise training

Office chairs with the Bioswing system follow this principle. An oscillating mechanism integrated under the seat precisely decouples and reflects the micro-vibrations that occur when sitting, thus ensuring a continuous increase in movement during work. The system works automatically, centering the body and offering the musculature alternating tension and relaxation. Sitting thus becomes a daily exercise routine. Back pain can thus be effectively prevented. In addition, sitting on office chairs with the Bioswing system is said to be very comfortable.

Source: This article appeared originally on the platform mendo-movo.com, an information service of the Heidelberg Institute for Health Management GmbH. 

Security gap in wireless door locks from Abus

According to the German Federal Office for Information Security (BSI), a wireless door lock from Abus can be hacked. This would allow unauthorized access to buildings or apartments. 

Abus
Current wireless door lock Hometech Pro CFA3100. (Image: Abus)

The German Federal Office for Information Security (BSI) warns in a communication against the use of the digital door lock HomeTec Pro CFA3000 from the manufacturer Abus. According to the BSI's findings, the vulnerability means that attackers in the vicinity can lock and unlock the wireless lock by exploiting the vulnerability and thus gain unauthorized access to buildings, offices or apartments.

The manufacturer confirmed the vulnerability to the BSI and stated that the product in question was a discontinued model that had been replaced by a successor model since March 2021. Among other things, the more secure, new model is equipped with an enclosed keycard and can be identified by a unique QR code. In addition, the packaging of the new model is printed with a Bluetooth logo.

The German Federal Office recommends replacing the product. The case shows once again that information security is a prerequisite for sustainable successful digitization, the BSI complains.

Source: BSI/Editorial Office

Breathable updates at Helly Hanson

Based in Norway, Helly Hansen knows that working conditions can change quickly and long-lasting workwear is in demand for assured comfort. With the addition of "BRZ", the new collection from the Norwegians promises to be even more comfortable and flexible. SAFETY-PLUS was allowed to be present at a "hands-on".

Breathable updates
Image: Helly Hanson

"Trusted by Professionals" is a leitmotif of Helly Hansen. Because not only product development, but also the stories told by extreme athletes have always underlined the importance of the brand, said Oliver Brunner, Area Sales Manager Austria Workwear at Hellly Hansen at a press event in Ludesch, Austria. In addition to the safety teams of mountain railroads, Wucher Helicopter GmbH and the Swiss Heliswiss International AG are among those partners who have been equipped with uniform and CI-compliant protective clothing. Helly Hansen has been cooperating with Heliswiss for more than five years.
The core business of the Vorarlberg-based rescue service provider lies in transporting loads to hard-to-reach areas and in rescue operations. According to Helly Hansen, there is a lot to be said for uniform protective clothing. The crew is optimally protected against water, wind and cold by the uniform protective gear, without having to forego comfort, breathability and freedom of movement, it was said in Ludesch. The opulent colors and reflective stripes ensure increased visibility in poor lighting conditions.

Helly Hansen
Image: Simon Gröflin

Home Advantages

You always rush ahead of the future, said Andreas Pohl-Larsen, Product Director at Helly Hansen. Work on the current portfolio began two and a half years ago. Helly Hansen breathes an airy breeze into its current summer collection. The focus is on lightweight workwear for warmer conditions. Under the "BRZ" design, Helly Hansen integrates several breathable vents into its set of pants and jackets at once. The basic self-ventilating concept focused primarily on combining ventilation, comfort and versatility, said Helly Hansen's product director from Norway. Still, he said, the goal was to develop protective work gear weighing less than 350 grams in any case. Features such as good stretching and lightweight fabric with the ventilation louvers are intended to serve workers from different occupational groups. Thanks to the lightweight textiles, comfort is maintained for several hours of work. Practical: The workwear has so many pockets that tools are always within reach. The desire to integrate at least two smartphone pockets, for example, was also incorporated, as many construction workers carry both their business phone and their private cell phone.

Breathable updates
The breathable BRZ construction is used in the BRZ ICU Jacket, among others. Image: Helly Hanson

The introduction of "BRZ" to Helly Hansen's traditional Hi-Vis ICU and Chelsea Evolution collection is designed to take flexibility and comfort to a new level. Particularly when working indoors and in warm and dry working conditions, the yellow and orange-black pants and jackets cut a fine figure with their lightweight fiber fabric made from a 4-way stretch material and well thought-out pocket positioning. The garments are air-conditioned by mesh-like laser-cut ventilation slats. The concept of functional workwear with its adaptability to fluctuating temperatures runs through the entire collection. On the Chelsea Evolution BRZ pants, for example, the mesh ventilation in the side seam allows cool air to be fanned in at any time. This works surprisingly well, as we found out in our hands-on experience. The ventilation can be adjusted to the environment depending on how the zippers are opened. Fully opened zippers of the side ventilation pockets are never visually disturbing. If the ventilation pockets are open from the inside, cooler ambient temperatures quickly become noticeable. In this case, it's better to protect yourself from colds by thinking about zipping them up early on.

Breathable updates
For two years now, Wucher Helicopter and Swiss Helicopter have been using standardized Helly Hansen uniforms. Picture: Simon Gröflin

Luminous material with long lasting capacity

The ICU workwear line is aimed primarily at modern craftsmen and women who are exposed to a variety of different working conditions. The company is also not scantily clad with additional labels and certifications. Especially since future scenarios such as complete workwear made of recyclable PET materials are increasingly becoming a possibility, these influences are not bypassing the Norwegians. For example, the company has been working with industry partners for some time to reduce the negative impact of single-use plastics. Since 2021, more than 70 percent of the fabric volume has been certified according to "Bluesign" or "Oekotex". The company has also set itself higher goals, such as water-free dyeing technology for lower water and energy consumption and lower CO2 emissions. More than 40 percent of Helly Hansen's new collection is therefore already dyed water-free in the lining and mesh.

The winter collection will also feature phosphorescent luminescent strips, which Helly Hansen says will shimmer brightly in the dark for up to eight hours at night. Other properties of the luminous material include a fast absorption time of five minutes of daylight. The luminous properties are also guaranteed at minus 30 degrees and under water.

Breathable updates
The Kensington Low BOA will be available in summer 2022, along with a variety of other styles. Image: Helly Hanson

Work shoes for harsh conditions

In the footwear collection, Helly Hansen aims to offer professional equipment for the harshest conditions. For example, the Kensington Low BOA is equipped with an extremely elastic, abrasion-resistant midsole (EVA and eTPU) that provides optimal cushioning and stability with every step. In addition, the shoe has a strong outsole for the best possible grip, a fashionable knit surface and molded TPU coverings. With its added metal-free protection against nail penetration and thanks to various reflective details, the safety shoe seems versatile and safe with its solid BOA closure system. One can wear the foot protection well both during and outside working hours.
The second safety shoe, the Manchester Mid, also comes with metal-free protection that provides additional shielding from nail penetration. The protective shield was realized by a safety toe cap consisting of a non-metallic, puncture-resistant plate and metal-free hardware. Thanks to the cushioning and lightweight EVA midsole, abrasion-resistant polyester surface and water-repellent air mesh lining promises comfort and safety in any workplace, while the reflective details additionally increase visibility.

 

Federal administration tests video identification system

The requirements for access to federal systems remain high. In order to increasingly explore the opportunities and risks, the federal administration is currently testing a new Identity Access Management (IAM). It is operated by the Federal Office of Information Technology.

Federal systems remain high
Image: depositphotos

Until now, employees of the federal administration have been equipped with a smart card for secure access to internal applications. However, this always requires the person to be present on site in person. The federal administration is therefore testing a new procedure with a video ID check.

An electronic means of access must always be cryptographically secured. In addition, a user is usually only activated after he or she has presented a photo ID that can be checked by the federal administration. With an alternative access option via video, this procedure is now to be simplified at the federal level so that people no longer have to travel to be checked. In the future, a smart card will no longer be provided for access. In the future, users will be able to use their own smartphone as an additional security layer to ensure identification via video. The cryptographic security of the login will be carried out in the same way as the smartphone with the certificate preinstalled on Swiss SIMs and eSIMs (Mobile ID). The next step planned is a user-neutral security check according to FIDO standardThis can be used, for example, to replace a smartphone with a certified security key in the form of a USB stick.

The new procedure is primarily used for external employees and service providers. Citizens are not affected by the innovation. The Federal Office of Information Technology, Systems and Telecommunication of the Federal Department of Finance is responsible for implementing the system.

Source: Federal Chancellery, Editorial Office

Asbestos: Inhalation prohibited

Products containing asbestos have been banned in Switzerland since 1990. Not all asbestos deposits have been eliminated. Every handyman and do-it-yourselfer must be aware of the associated health hazards.

Asbestos: Inhalation prohibited
Craftsmen, beware! There are still countless buildings built before 1990 where you can expect to come across asbestos. ©Suva

Even today, workers can come into contact with a wide variety of building materials containing asbestos - especially during demolition work in the course of conversions. Asbestos is found in particular in panel adhesives and plaster, in plastic floor coverings, false ceilings, paints or mastics, as well as in asbestos-cement products on the building envelope and in sewer pipes. In buildings built before 1990, those performing maintenance, renovation and deconstruction work must expect to encounter asbestos-containing material during their work. This applies in particular to construction workers, carpenters, electricians, plumbers, painters, plasterers, roofers and façade builders. Decades can pass from inhalation of asbestos dust to the onset of asbestos disease. Therefore, prevention is important now during remodeling work.

Clarify asbestos before construction begins

If a builder or architect is planning to convert or renovate a building constructed before 1990, a building inspection is required beforehand. For this purpose, he should call in a building diagnostician at an early stage. During this inspection, the expert will check the building for possible asbestos deposits, have suspicious materials examined in the laboratory and prepare further measures in the event that asbestos removal is necessary.

The advantages of early detection of asbestos

Early detection of pollutants is necessary for compliance with legal requirements relating to employee safety and environmental protection. At the same time, planning and cost security are improved. If there is a suspicion that particularly hazardous substances such as asbestos may be present during a conversion, the employer must identify the hazards in detail. In a second step, the risks must be assessed. Based on this, the necessary measures must be planned.

Asbestos: Inhalation prohibited
Asbestos fibers can form tumors deep in the lungs, larynx and nearby organs, even after 30 years. © Suva

Involve asbestos specialists

Work that may release significant quantities of asbestos fibers that are hazardous to health may only be carried out by recognized asbestos abatement companies. These companies are obliged to notify Suva of any remediation work (for example, remediation of weakly bound asbestos). The directive prescribes protective measures such as the wearing of respirators, protective suits and the sealing off of the remediation zone as well as the erection of warning signs. Before the protective measures are lifted, the asbestos concentration in the remediation zone must be checked by means of a clearance measurement.

Resilience and availability in video technology

In security technology, the topic of availability has always been essential; after all, the relevant protection goals of a security concept should also function in the event of malfunctions and failures, especially of the power supply. In the area of the IT system "video technology", however, this is not the case.

Resilience and availability in video technology

Let us first consider the hardware architecture of such a system: there is always a field level in which the cameras are arranged. The following level is already the final one for small systems, namely the server level, which is consolidated with the functions of image storage, image output and alarm management in said small applications. Larger applications require dedicated hardware levels for the following application-typical functions:

  • Storage takes place as close to the camera as possible on special hardware that is optimized for permanent read/write access.
  • Video management is a classic server application, alarm management and video
    analysis as well (with the latter shifting more and more to the cameras).
  • The image output is realized by clients.
  • And last but not least, of course, the ubiquitous data network that makes communication between all levels possible in the first place.

Different risks

It can be seen that these levels are exposed to the adversities of everyday life to varying degrees. The camera, especially the remote camera, is exposed to the full force of wind and weather, the environment of a client is more manageable, and servers should be located in an absolute IT comfort zone. But how do you protect yourself against power supply problems at these levels?

Cameras availability

Let's start with the cameras: Does the old model still apply here, that short power failures of individual cameras do not have a war-deciding effect, because they are localized and can be handled after reconnection? Probably not, because usually cameras and
whose supporting infrared spotlights are supplied via PoE (Power over Ethernet). Thus, the power supply usually comes from a PoE switch and in this way from an environment that is easy to secure.

However, there are length restrictions for lines, both in terms of data transmission and electrical power transmission. Especially in large properties, one is therefore forced to provide decentralized units that connect the far-flung periphery. But do these also have to be supplied with uninterruptible power? Yes, they must.

A PoE switch can start up again automatically after a power failure, but it can take several minutes before it is fully available again. And since this switch represents a kind of "consolidation point", all connected cameras will then fail for the aforementioned period.

Resilience and availability in video technology
© AdobeStock# 172338980

Availability of servers and image storage

At the server and image storage level, there is little room for discussion on the tolerability of power supply disruptions, because if it were not available, the entire application would be lost and data loss in the storage systems would also be conceivable. Consequently, all the stops of the emergency power supply must be pulled out at this level.
And the client level? Well, what good is a running video system that can't display images? Sometimes quite a lot, namely when the system is primarily used for recording and thus for documentation. And otherwise? The loss of a client is always annoying and troublesome, but scenarios are conceivable that make the whole thing manageable, starting with additional clients that get a power supply from other segments and ending with notebooks, which, as we all know, have an emergency power supply on board.

Decentralized UPS

And how do you design the emergency supply on the individual levels? The maximum requirement is: everything on UPS (uninterruptible power supply)! The already above mentioned, partly wide spatial extension of typical video systems forces us also here to think about decentralized systems, because also in the design of UPS networks electrotechnical conditions like loop impedance and voltage drop have to be considered. And the fact that UPS are known to be able to supply only limited short-circuit currents does not make matters any better.

What bridging time?

Decentralized, but with which bridging times? We don't want to use the UPS time to shut down the system, but to continue operating the entire application. And emergency diesel generators are by no means always available, so we assume this worst-case scenario:

The bridging time of the UPS must thus correspond to the time that should still be available for the application in the event of a long-term disrupted network. This can be one hour if an area is cleared after this time and the protection goals are then no longer relevant. However, quasi-endless monitoring may also be required, namely if one needs to continue to protect the property in an apocalyptic powerless crisis. Whatever the outcome of this individual risk assessment, it is likely that the UPS solution will have to be rated in the hourly rather than the minute range.

However, it should be noted here that the engineering art of planning and UPS measurement does reveal some surprising results: For example, let's assume a total power requirement of the application of 5 kilowatts (kW) and want a bridging time of 24 hours. Then we obviously need a system that can provide this 5 kW for 24 hours. So far, so good, but how does battery charging work - especially in terms of timing? From various functional tests, it is known that an 8-minute UPS in the data center will have regained about 80 percent of its capacity after about one hour of charging - regardless of its size. It should then be fully charged again after 80 minutes. Makes a factor of 10, namely 8 minutes bridging time, 80 minutes charging time.

Transferred to our example, this would mean 240 hours with a 24-hour bridging time, i.e. 10 days of charging time. This is not possible. The whole thing can only be controlled by significantly oversizing the UPS system. This makes higher charging currents possible, along with shorter charging times. In practice, for example, a UPS (50 kW) enlarged by a factor of 10 would be used, which could then supply the 5 kW for a longer period. This UPS is of course significantly larger and more expensive, but allows acceptable charging times.

Conclusion

So to keep the important pillar of video technology alive in the security concept even in adverse circumstances, it is not enough to put a few 19-inch UPS in racks. Advocates of effective and crisis-proof concepts view the topic as a holistic process and take into account the peculiarities of different levels within
of an architecture.

This technical article appeared in the printed edition SicherheitsForum 3-2022 in our dossier "Video Security". 

You want to read the articles of this issue? Then close right now here a subscription.

Water sports accidents are expensive

The lakes and the sea attract water sports such as stand up paddling, wakeboarding, surfing and kite surfing. However, these sports also have an impact on the number of accidents. According to Suva, around 13,100 water sports accidents occur each year.

Water sports accidents are expensive
Image: depositphotos

According to Suva, no less than 300 accidents per year are due to "Stand Up Paddling". The accidents occur mainly in the months of June, July and August. The age group most frequently affected is between 35 and 54. Three quarters of the reported accidents are falling accidents, because the people involved often lose their balance and injure themselves on the board or when they hit the sea. Injuries and bruises to the torso, back and buttocks are then common, followed by sprains to the hands and feet.

Particularly high costs: wakeboard accidents

The number of windsurfing and surfing accidents has doubled in the last ten years, as Suva further writes. Currently, the statistics amount to 1200 registered accidents per year. Annually, this means running costs of 3.6 million Swiss francs or an average of 4200 Swiss francs per accident. However, sports enthusiasts from old to young (between 25 and 54 years of age) are affected, with men (60 percent) being injured more frequently on average.

40 percent of surfing accidents occur in the Mediterranean countries of Spain, Portugal and France, while Switzerland records only 13 percent.

Accident insurers pay 1.6 million Swiss francs per year for wakeboard accidents, or standing activities on a board pulled over the surface of the water by a motorboat. Sixty percent of the reported accidents involve men between the ages of 25 and 44. Particularly costly were 440 accidents involving kitesurfing (3.8 million Swiss francs). On average, a kiteboarding accident costs 8100 francs.

Source: Suva/Editorial Office 

get_footer();