DVTel Ioimage stands the test of time

April 2013 Perimeter Security, Alarms & Intruder Detection

First Quantum Minerals, a British Columbia based mining and metals company, appointed C3 Shared Services, to design and install a tailor-made state-of-the-art intelligent security surveillance system to protect the highly sensitive areas at their Zambian copper mine.

The system was installed in the latter part of 2010 and comprised a solution incorporating CCD cameras, high-speed domes and DVTel’s ioimage intelligent video analytics to protect the perimeter and monitor all processes within the plant.

The intelligent video analytics are programmed to detect and alert the control room operators to any intrusions on the perimeter, while the high-speed domes allow for the finer details within the plant to be monitored. This particular surveillance system has a very high probability of detection with a very low false alarm rate. The solution offers FQML’s control room operators the ability not only to monitor all security sensitive areas from a single control room in real-time, but to be notified automatically in the event of a security breach.

C3 also provided surveillance at the external main gate and the plant gate. Security at these entrances is integrated with the advanced video management system situated in the control room. The control room, also designed by C3, is the heart of the security system. Operators in this control room have access to all the cameras on the perimeter as well as the internal cameras. The intelligent video analytics will automatically alert the operators as to the exact location of any attempted breaches or intrusions on perimeter. This automated intelligent ability prevents operators getting fatigued by having to watch numerous cameras as they can confidently rely on the analytics to monitor the perimeter effectively.

Three years later and the system is still very effective and going strong. Since the initial project in 2010, C3 has added further cameras combined with analytics to the three new falcon areas, the upgraded gold plant and the perimeter. C3 continues to provide on-going support and maintenance for the system.

Nick Grange, technical director of C3 says, “At the time of the installation DVTels’ ioimage was a market leader in intelligent video analytics and still today, with all the other emerging competitors on the market, DVTels’ ioimage continues to be a reliable and extremely effective video analytics brand. C3 has supported this brand for over seven years now and we continue to see extremely good results and happy clients.”

For more information contact C3 Shared Services, +27 (11) 312 2041,  [email protected] www.c3ss.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Three thousand design drawings as a starting point
C3 Shared Services Fire & Safety
C3 Shared Services was tasked with the design of a fire detection system, which factored in a longevity of at least 15 years. The detailed engineering and design project encompassed over 3000 design drawings and calculation sheets.

Read more...
Wireless security makes its mark
Perimeter Security, Alarms & Intruder Detection
Alarms have always had a wireless component since the first monitoring control room was launched, but internally, homes and companies used to install cables to connect various sensors and devices to the control panel.

Read more...
Smart, reliable detection in any conditions
OPTEX Perimeter Security, Alarms & Intruder Detection
In its discussions with companies operating in South and Southern Africa’s detection and alerting technologies market, SMART Security Solutions spoke to OPTEX for more information on its solutions and technologies.

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
Directory of suppliers
Perimeter Security, Alarms & Intruder Detection
The Directory of Product and Solution Suppliers for the alarm, intrusion, and perimeter markets includes details of companies that provide security and risk mitigation products, advice, and services to these verticals.

Read more...
Visual verification raises the security game
Technews Publishing Inhep Electronics Holdings Videofied SA Editor's Choice Perimeter Security, Alarms & Intruder Detection
Incorporating alarm signals with live surveillance footage, visual verification enables a human observer in a control room (onsite or offsite) to gain a clear understanding of the situation, thereby facilitating informed decision-making.

Read more...
Two systems to enhance the efficacy of intrusion detection
Perimeter Security, Alarms & Intruder Detection
The OPTEX RedScan Pro and RedScan mini-Pro sensors, as well as the company’s Fibre SenSys solution, are highly accurate intrusion detection systems that employ two very different yet powerful technologies, providing two types of intrusion detection solutions.

Read more...
From wireless alarms to smart homes
Elvey Security Technologies Perimeter Security, Alarms & Intruder Detection Products & Solutions
The final brand SMART Security Solutions features in its discussions with companies operating in South and southern Africa’s detection and alerting technologies market is DSC, distributed in the region by Elvey Security Technologies.

Read more...
Hadeda-proof sensor technologies
Reditron Perimeter Security, Alarms & Intruder Detection
SMART Security Solutions highlights Takex, represented locally by Reditron, speaking to Gordon Moore, Reditron’s National Sales Director, and Mark Crichton, Takex Channel Manager for South Africa.

Read more...
What not to do: Key ‘don’ts’ in perimeter security systems
Fang Fences & Guards Perimeter Security, Alarms & Intruder Detection
Many people know what to do when securing a perimeter; in this article, Johan van Wyk highlights the important ‘don’ts’ to consider when implementing a turnkey perimeter security solution.

Read more...